Advertisement

Impact of Sharing Algorithms for Cloud Services Management

  • Lidia OgielaEmail author
  • Makoto Takizawa
  • Urszula Ogiela
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 97)

Abstract

In this paper will be presented a classification of sharing algorithms dedicated to secure services management in Cloud Computing. Especially will be described an impact of sharing processes in service protocols, realised in the Cloud. Service management procedures can be used at different levels, so the impact of service management processes will be analysed at all of them. Also will be presented the impact of service management and cloud data sharing protocols, on decision-making processes in management-support systems, using linguistic and biometric threshold schemes.

Keywords

Sharing algorithm Cloud Computing Data management process Data management levels Linguistic threshold scheme Biometric threshold scheme 

Notes

Acknowledgments

This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

This work was supported by JSPS KAKENHI grant number 15H0295.

References

  1. 1.
    van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)zbMATHGoogle Scholar
  2. 2.
    Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)CrossRefGoogle Scholar
  3. 3.
    Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manage. 35(2), 154–159 (2015)CrossRefGoogle Scholar
  4. 4.
    Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130–141 (2016)CrossRefGoogle Scholar
  5. 5.
    Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016)Google Scholar
  6. 6.
    Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)CrossRefGoogle Scholar
  7. 7.
    Ogiela, L., Takizawa, M.: Personalized cryptography in cognitive management. Soft. Comput. 21, 2451–2464 (2017)CrossRefGoogle Scholar
  8. 8.
    Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)zbMATHGoogle Scholar
  9. 9.
    Ogiela, U., Takizawa, M., Ogiela, L.: Visual captcha application in linguistic cryptography. Concurr. Comput.: Pract. Exp. J. 30(2), 1–8 (2018).  https://doi.org/10.1002/cpe.4362CrossRefGoogle Scholar
  10. 10.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)zbMATHGoogle Scholar
  11. 11.
    Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Pedagogical University of KrakowKrakówPoland
  2. 2.Department of Advanced SciencesHosei UniversityKoganei-shiJapan

Personalised recommendations