Impact of Sharing Algorithms for Cloud Services Management
In this paper will be presented a classification of sharing algorithms dedicated to secure services management in Cloud Computing. Especially will be described an impact of sharing processes in service protocols, realised in the Cloud. Service management procedures can be used at different levels, so the impact of service management processes will be analysed at all of them. Also will be presented the impact of service management and cloud data sharing protocols, on decision-making processes in management-support systems, using linguistic and biometric threshold schemes.
KeywordsSharing algorithm Cloud Computing Data management process Data management levels Linguistic threshold scheme Biometric threshold scheme
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
This work was supported by JSPS KAKENHI grant number 15H0295.
- 5.Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016)Google Scholar
- 8.Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)zbMATHGoogle Scholar
- 12.Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)Google Scholar