Soft Computing

, Volume 21, Issue 9, pp 2451–2464 | Cite as

Personalized cryptography in cognitive management

Methodologies and Application

Abstract

One of the existing problems of information management is an information security. In this aspects one of possible solution is divide information between a group of persons authorized to manage this information. Information sharing processes allow to protect the information from disclosure. In this paper, the process of division of the information has been enhanced by biometric identification stage. Secure information processes with biometric identification are used to manage very important and strategic data. This paper presents the questions of personal cryptography understood as a combination of the tasks of classifying information and biometric techniques used for this kind of tasks. The techniques of biometric data marking are present on the examples of data division and sharing protocols, expanded by the stages of personal identification and verification. This kind of solutions is presented for the tasks of dividing appropriately the shared secret information. Moreover, we shall present the management process of shadow sets, i.e., of parts of the divided, secret information. The processes of secret data management are refer to tasks of cognitive management, understood as management executed on the basis of understanding the meaning of the processed data.

Keywords

Personalized cryptography Biometrics in data sharing protocols Cognitive systems 

References

  1. Castiglione A, Cepparulo M, De Santis A, Palmieri F (2010) Towards a lawfully secure and privacy preserving video surveillance system. In: Buccafurri F, Semeraro G (eds) E-commerce and web technologies. 11th international conference, EC-Web 2010, Bilbao, Spain, September 1–3, 2010 (Lecture notes in business information processing), vol 61. pp 73–84Google Scholar
  2. Enokido T, Takizawa M (2011) Purpose-based information flow control for cyber engineering. IEEE Trans Ind Electron (TIE) 58(6):2216–2225CrossRefGoogle Scholar
  3. Grossberg S (2012) Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Netw 37:1–47CrossRefGoogle Scholar
  4. Hachaj T, Ogiela MR (2010) Automatic detection and lesion description in cerebral blood flow and cerebral blood volume perfusion maps. J Signal Process Syst Signal Image Video Technol 61(3):317–328CrossRefGoogle Scholar
  5. Menezes A, van Oorschot P, Vanstone S (2001) Handbook of applied cryptography. CRC Press, WaterlooMATHGoogle Scholar
  6. Nakamura S, Duolikun D, Takizawa M (2015a) Read-abortion (RA) based synchronization protocols to prevent illegal information flow. J Comput Syst Sci 81(8):1441–1451MathSciNetCrossRefMATHGoogle Scholar
  7. Nakamura S, Duolikun D, Enokido T, Takizawa M (2015b) A write abortion-based protocol in role-based access control systems. Int J Adapt Innov Syst 2(2):142–160CrossRefGoogle Scholar
  8. Nakamura S, Duolikun D, Enokido T, Takizawa M (2015c) A flexible read-write abortion protocol to prevent illegal information flow among objects. J Mobile Multimedia 11(3&4):263–280Google Scholar
  9. Nakamura S, Duolikun D, Enokido T, Takizawa M (2016) A read-write abortion (RWA) protocol to prevent illegal information flow in role-based access control systems. Int J Space-Based Situat Comput 6(1):43–53CrossRefGoogle Scholar
  10. Ning Y, Liu J, Yan L (2012) Uncertain aggregate production planning. Soft Comput 17:617–624CrossRefGoogle Scholar
  11. Ogiela L (2010) Computational intelligence in cognitive healthcare information systems. In: Bichindaritz I, Vaidya S, Jain A et al (eds) Computational intelligence in healthcare 4: advanced methodologies, studies in computational intelligence, vol 309. Springer-Verlag, Berlin, Germany, pp 347–369Google Scholar
  12. Ogiela L (2012) Semantic analysis in cognitive UBIAS & E-UBIAS systems. Comput Math Appl 63(2):378–390MathSciNetCrossRefGoogle Scholar
  13. Ogiela L (2013) Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122:58–69CrossRefGoogle Scholar
  14. Ogiela L (2014) Towards cognitive economy. Soft Comput 18(9):1675–1683CrossRefGoogle Scholar
  15. Ogiela L (2016) Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob Comput 29:130–141CrossRefGoogle Scholar
  16. Ogiela MR, Ogiela U (2008) Linguistic approach to cryptographic data sharing. In: 2nd international conference on future generation communication and networking, Hainan, Peoples Republic of China, 13–15 December 2008, IEEE FGCN: Proceedings of the 2008 second international conference on future generation communication and networking, vol 1, 2. IEEE Computer Soc, LOS ALAMITOS, CA, USA, pp 377–380Google Scholar
  17. Ogiela MR, Ogiela U (2009a) Security of linguistic threshold schemes in multimedia systems. In: Damiani E, Jeong J, Howlett RJ et al (eds) New directions in intelligent interactive multimedia systems and services 2, Studies in computational intelligence, vol 226. Springer-Verlag, Berlin, pp 13–20Google Scholar
  18. Ogiela MR, Ogiela U (2009b) Shadow generation protocol in linguistic threshold schemes. In: Slezak D, Kim TH, Tang WC et al (eds) Security technology, communications in computer and information science, vol 58. Springer-Verlag, Berlin, Germany, pp 35–42Google Scholar
  19. Ogiela L, Ogiela MR (2014) Cognitive systems for intelligent business information management in cognitive economy. Int J Inf Manag 34(6):751–760CrossRefMATHGoogle Scholar
  20. Ogiela L, Ogiela MR (2015a) Efficiency of cognitive information systems supporting enterprise management tasks. In: Barolli L et al (eds) 9th international conference on innovative mobile and internet services in ubiquitous computing (IMIS), Blumenau, Brazil, 08–10 July 2015, pp 166–170Google Scholar
  21. Ogiela L, Ogiela MR (2015b) Management information systems. In: Park JJ, Pan Y, Chao HC et al (eds) Ubiquitous computing application and wireless sensor. 2nd FTRA international conference on ubiquitous computing application and wireless sensor network (UCAWSN), South Korea, 07–10 July 2014 (Lecture notes in electrical engineering), vol 331, pp 449–456Google Scholar
  22. Schneier B (1996) Applied cryptography: protocols, algorithms and source code in C. Wiley, LondonMATHGoogle Scholar
  23. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613MathSciNetCrossRefMATHGoogle Scholar
  24. TalebiFard P, Leung VCM (2011) Context-aware mobility management in heterogeneous network environments. J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 2(2):19–32Google Scholar
  25. Tang S (2004) Simple secret sharing and threshold RSA signature schemes. J Inf Comput Sci 1:259–262Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  1. 1.Cryptography and Cognitive Informatics Research Group, AGH University of Science and TechnologyKrakówPoland
  2. 2.Department of Advanced SciencesHosei UniversityKoganei-shi, TokyoJapan

Personalised recommendations