Abstract
In data protection processes, security is increasingly being used, which is to some extent related to the creator of a given solution. Data security techniques based on the use of personal methods of securing information are increasingly used. Such solutions guarantee full data protection. This paper presents personalized data security techniques dedicated to advanced data protection processes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, C.-K., Lin, C.-L., Chiang, C.-T., Lin, S.L.: Personalized information encryption using ECG signals with chaotic functions. Inf. Sci. 193, 125–140 (2012)
Chomsky, N.: Language and Problems of Knowledge: The Managua Lectures. MIT Press, Cambridge (1988)
Ghosh, A.M., Grolinger, K.: Edge-cloud computing for internet of things data analytics: embedding intelligence in the edge with deep learning. IEEE Trans. Industr. Inf. 17(3), 2191–2200 (2021)
Mackenzie, O.J. (ed.): Information Science and Knowledge Management. Springer, Berlin (2006)
Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) CISIS 2017. AISC, vol. 611, pp. 82–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61566-0_8
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manag. 57(5), 102260 (2020)
Ogiela, L., Ogiela M.R.: Cognitive security paradigm for cloud computing applications. Concurr. Comput. Pract. Exp. 32(8), e5316 (2020)
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes new challenges in computational collective intelligence. Stud. Comput. Intell. 244, 327–336 (2009)
Ogiela, M.R., Ogiela, U.: Linguistic cryptographic threshold schemes. Int. J. Future Gener. Commun. Network. 2(1), 33–40 (2009)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)
Acknowledgments
This work has been supported by Pedagogical University of Krakow research Grant No. BN.711-79/PBU/2021.
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, U., Takizawa, M., Ogiela, L. (2022). Personalized Cryptographic Protocols for Advanced Data Protection. In: Barolli, L., Chen, HC., Enokido, T. (eds) Advances in Networked-Based Information Systems. NBiS 2021. Lecture Notes in Networks and Systems, vol 313. Springer, Cham. https://doi.org/10.1007/978-3-030-84913-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-030-84913-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-84912-2
Online ISBN: 978-3-030-84913-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)