Cognitive Informatics Approaches for Data Sharing and Management in Cloud Computing

  • Marek R. OgielaEmail author
  • Lidia Ogiela
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 773)


In this paper will be described possible applications of cognitive information systems to intelligent and secure information management tasks in Fog and Cloud computing. In particular will be presented the ways of using some semantic descriptors and personal characteristics for creation of protocols dedicated to confidential distribution and secure data management in different distributed environments. The new paradigm of cognitive cryptography will be also described.


Cognitive systems Cryptographic techniques Cognitive cryptography 



This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.


  1. 1.
    Lyon, R.F.: Human and Machine Hearing: Extracting Meaning from Sound. Cambridge University Press (2017)Google Scholar
  2. 2.
    LeCun, Y., Bengio, Y., Hinton, G.: Deep learning. Nature 521, 436–444 (2015)CrossRefGoogle Scholar
  3. 3.
    Hahn, Ch., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Express 2, 135–139 (2016)CrossRefGoogle Scholar
  4. 4.
    Arigbabu, O.A., Ahmad, S.M.S., Adnan, W.A.W., Yussof, S.: Integration of multiple soft biometrics for human identification. Pattern Recogn. Lett. 68, 278–287 (2015)CrossRefGoogle Scholar
  5. 5.
    Gomez-Barrero, M., Maiorana, E., Galbally, J., et al.: Multi-biometric template protection based on Homomorphic Encryption. Pattern Recogn. 67, 149–163 (2017)CrossRefGoogle Scholar
  6. 6.
    Ogiela, L.: Cognitive Information Systems in Management Sciences. Elsevier, Academic Press (2017)CrossRefGoogle Scholar
  7. 7.
    Ogiela, L., Ogiela, M.R.: Management information systems. LNEE, vol. 331, pp. 449–456 (2015)Google Scholar
  8. 8.
    Bisantz, A.M., Burns, C.M., Fairbanks, R.J. (eds.): Cognitive Systems Engineering in Health Care. CRC Press, Boca Raton (2014)Google Scholar
  9. 9.
    Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014) Salerno, Italy, pp. 257–261 (2014)Google Scholar
  10. 10.
    Li, L., Yan, ChC, Chen, X., et al.: Distributed image understanding with semantic dictionary, and semantic expansion. Neurocomputing 174, 384–392 (2016)CrossRefGoogle Scholar
  11. 11.
    Cox, I.J., Miller, M.L., Bloom, J., Fridrich, J., Kalker, J.: Digital Watermarking and Steganography. Morgan Kaufmann Publishers, Burlington (2008)Google Scholar
  12. 12.
    Han, L., Xie, Q., Liu, W.: An improved biometric based authentication scheme with user anonymity using elliptic curve cryptosystem. Int. J. Netw. Secur. 19(3), 469–478 (2017)Google Scholar
  13. 13.
    Jin, Z., Teoh, A.B.J., Goi, B.-M., Tay, Y.-H.: Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recogn. 56, 50–62 (2016)CrossRefGoogle Scholar
  14. 14.
    Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016 - The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, 23–25 March 2016, pp. 1055–1058 (2016)Google Scholar
  15. 15.
    Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 - The 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, 27–29 March 2017, pp. 1050–1054 (2017)Google Scholar
  16. 16.
    Ogiela, M.R., Ogiela, U.: Linguistic approach to cryptographic data sharing. In: FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, Hainan Island, China, vol. 1, pp. 377–380 (2008)Google Scholar
  17. 17.
    Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. Lecture Notes in Computer Science, vol. 6059, pp. 175–182 (2010)Google Scholar
  18. 18.
    Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information Manage. IEEE Syst. J. 11, 405–414 (2017)CrossRefGoogle Scholar
  19. 19.
    Vernon, D.: Artificial Cognitive Systems: A Primer. MIT Press, Cambridge (2014)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Cryptography and Cognitive Informatics Research GroupAGH University of Science and TechnologyKrakowPoland

Personalised recommendations