2019
DOI: 10.1002/cpe.5316
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive security paradigm for cloud computing applications

Abstract: Summary This article presents new paradigms of confidential data protection. New classes of paradigms are dedicated to enhancing the already‐known cryptographic solutions belonging to the group of data sharing schemes. Data sharing schemes are dedicated to executing data protection tasks by means of splitting data into parts (called shadows) and distributing those shadows among a group of secret trustees. This process is enriched by linguistic and biometric solutions to guarantee protection of the shared data … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 49 publications
(25 citation statements)
references
References 19 publications
(75 reference statements)
0
24
0
Order By: Relevance
“…Nevertheless, there are two types of apps, that is apps that make use of centralized or decentralized databases. In both cases, when individual A meets B, their smartphones exchange encrypted id-codes [ 42 ]. If A becomes positive, the status of his app is updated.…”
Section: Contact Tracingmentioning
confidence: 99%
“…Nevertheless, there are two types of apps, that is apps that make use of centralized or decentralized databases. In both cases, when individual A meets B, their smartphones exchange encrypted id-codes [ 42 ]. If A becomes positive, the status of his app is updated.…”
Section: Contact Tracingmentioning
confidence: 99%
“…In the paper “Cognitive security paradigm for cloud computing applications” by L. Ogiela and M.R. Ogiela new paradigms of data security were described. The presented algorithms are dedicated to enhancing the cryptographic data sharing schemes.…”
Section: The Main Topics Of Coginnov 2018 Special Issuementioning
confidence: 99%
“…7,8,[10][11][12][13][14] In this group of protocols, apart from the classic information splitting algorithms, there are also new classes of threshold schemes, including both linguistic and biometric threshold schemes. 15 A detailed description of these threshold schemes can be found in other works. [3][4][5][9][10][11][12][13][14][15][16][17] In this work, we shall discuss new classes of threshold schemes based on cognitive processes of concealed data description.…”
Section: Introductionmentioning
confidence: 99%
“…15 A detailed description of these threshold schemes can be found in other works. [3][4][5][9][10][11][12][13][14][15][16][17] In this work, we shall discuss new classes of threshold schemes based on cognitive processes of concealed data description. The gist of the proposed solution is a possibility to specify some nonrepetitive semantic features of the concealed data and the application of such type of information in the process of its concealment.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation