Personalized cryptography in cognitive management
- 133 Downloads
One of the existing problems of information management is an information security. In this aspects one of possible solution is divide information between a group of persons authorized to manage this information. Information sharing processes allow to protect the information from disclosure. In this paper, the process of division of the information has been enhanced by biometric identification stage. Secure information processes with biometric identification are used to manage very important and strategic data. This paper presents the questions of personal cryptography understood as a combination of the tasks of classifying information and biometric techniques used for this kind of tasks. The techniques of biometric data marking are present on the examples of data division and sharing protocols, expanded by the stages of personal identification and verification. This kind of solutions is presented for the tasks of dividing appropriately the shared secret information. Moreover, we shall present the management process of shadow sets, i.e., of parts of the divided, secret information. The processes of secret data management are refer to tasks of cognitive management, understood as management executed on the basis of understanding the meaning of the processed data.
KeywordsPersonalized cryptography Biometrics in data sharing protocols Cognitive systems
This work has been supported by the National Science Centre, Republic of Poland, under Project Number DEC-2013/09/B/HS4/00501.
Compliance with ethical standards
Conflict of interest
The authors declare that they has no conflict of interest.
This article does not contain any studies with human participants or animals performed by any of the authors.
- Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. 11th international conference, EC-Web 2010, Bilbao, Spain, September 1–3, 2010 (Lecture notes in business information processing), vol 61. pp 73–84Google Scholar
- Nakamura S, Duolikun D, Enokido T, Takizawa M (2015c) A flexible read-write abortion protocol to prevent illegal information flow among objects. J Mobile Multimedia 11(3&4):263–280Google Scholar
- Ogiela L (2010) Computational intelligence in cognitive healthcare information systems. In: Bichindaritz I, Vaidya S, Jain A et al (eds) Computational intelligence in healthcare 4: advanced methodologies, studies in computational intelligence, vol 309. Springer-Verlag, Berlin, Germany, pp 347–369Google Scholar
- Ogiela MR, Ogiela U (2008) Linguistic approach to cryptographic data sharing. In: 2nd international conference on future generation communication and networking, Hainan, Peoples Republic of China, 13–15 December 2008, IEEE FGCN: Proceedings of the 2008 second international conference on future generation communication and networking, vol 1, 2. IEEE Computer Soc, LOS ALAMITOS, CA, USA, pp 377–380Google Scholar
- Ogiela MR, Ogiela U (2009a) Security of linguistic threshold schemes in multimedia systems. In: Damiani E, Jeong J, Howlett RJ et al (eds) New directions in intelligent interactive multimedia systems and services 2, Studies in computational intelligence, vol 226. Springer-Verlag, Berlin, pp 13–20Google Scholar
- Ogiela MR, Ogiela U (2009b) Shadow generation protocol in linguistic threshold schemes. In: Slezak D, Kim TH, Tang WC et al (eds) Security technology, communications in computer and information science, vol 58. Springer-Verlag, Berlin, Germany, pp 35–42Google Scholar
- Ogiela L, Ogiela MR (2015a) Efficiency of cognitive information systems supporting enterprise management tasks. In: Barolli L et al (eds) 9th international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Blumenau, Brazil, 08–10 July 2015, pp 166–170Google Scholar
- Ogiela L, Ogiela MR (2015b) Management information systems. In: Park JJ, Pan Y, Chao HC et al (eds) Ubiquitous computing application and wireless sensor. 2nd FTRA international conference on ubiquitous computing application and wireless sensor network (UCAWSN), South Korea, 07–10 July 2014 (Lecture notes in electrical engineering), vol 331, pp 449–456Google Scholar
- TalebiFard P, Leung VCM (2011) Context-aware mobility management in heterogeneous network environments. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 2(2):19–32Google Scholar
- Tang S (2004) Simple secret sharing and threshold RSA signature schemes. J Inf Comput Sci 1:259–262Google Scholar