Abstract
In this paper will be presented a classification of sharing algorithms dedicated to secure services management in Cloud Computing. Especially will be described an impact of sharing processes in service protocols, realised in the Cloud. Service management procedures can be used at different levels, so the impact of service management processes will be analysed at all of them. Also will be presented the impact of service management and cloud data sharing protocols, on decision-making processes in management-support systems, using linguistic and biometric threshold schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
van Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela, L.: Intelligent techniques for secure financial management in cloud computing. Electron. Commer. Res. Appl. 14(6), 456–464 (2015)
Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manage. 35(2), 154–159 (2015)
Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130–141 (2016)
Ogiela, L., Ogiela, M.R.: Bio-inspired cryptographic techniques in information management applications. In: IEEE 30th International Conference on Advanced Information Networking and Applications (IEEE AINA), Switzerland, 23–25 March 2016, pp. 1059–1063 (2016)
Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)
Ogiela, L., Takizawa, M.: Personalized cryptography in cognitive management. Soft. Comput. 21, 2451–2464 (2017)
Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.H., Adeli, H., Robles, R.J., et al. (eds.) 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15–17 June 2011. Communications in Computer and Information Science, vol. 195, pp. 31–35 (2011)
Ogiela, U., Takizawa, M., Ogiela, L.: Visual captcha application in linguistic cryptography. Concurr. Comput.: Pract. Exp. J. 30(2), 1–8 (2018). https://doi.org/10.1002/cpe.4362
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Tang, S.: Simple secret sharing and threshold RSA signature schemes. J. Inf. Comput. Sci. 1, 259–262 (2004)
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
This work was supported by JSPS KAKENHI grant number 15H0295.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, L., Takizawa, M., Ogiela, U. (2020). Impact of Sharing Algorithms for Cloud Services Management. In: Barolli, L., Hellinckx, P., Enokido, T. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2019. Lecture Notes in Networks and Systems, vol 97. Springer, Cham. https://doi.org/10.1007/978-3-030-33506-9_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-33506-9_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-33505-2
Online ISBN: 978-3-030-33506-9
eBook Packages: EngineeringEngineering (R0)