Skip to main content

Application of Personalized Cryptography in Cloud Environment

  • Conference paper
  • First Online:
  • 1685 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 1))

Abstract

In this paper will be described the way of using personalized cryptography algorithms in cloud computing applications. Personal information may be used in creation advanced security protocols, which may be also applied for cloud data and services security and management. Such protocols may play important role in advanced secure management applications and intelligent access control to secure data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ogiela, L., Ogiela, M.R.: Cognitive systems for intelligent business information management in cognitive economy. International Journal of Information Management, 34 (2014) 751-760

    Google Scholar 

  2. Hachaj, T., Ogiela, M.R.: CAD system for automatic analysis of CT perfusion maps. Opto-Electronic Review, 19 (2011) 95-103

    Google Scholar 

  3. Shi, J., Lam, K-Y.: VitaCode: Electrocardiogram Representation for Biometric Cryptography in Body Area Networks. 1st International Conference on Ubiquitous and Future Networks, Hong Kong, China, Jun 07-09 (2009) 112-115

    Google Scholar 

  4. Ogiela, L.: Semantic analysis and biological modelling in selected classes of cognitive information systems. Mathematical and Computer Modelling, 58 (2013) 1405-1414

    Google Scholar 

  5. Kumar, A., Kumar, A.: Adaptive management of multimodal biometrics fusion using ant colony optimization. Information Fusion 32 (2016) 49–63

    Google Scholar 

  6. Shi, J., Lam, K-Y.: VitaCode: Electrocardiogram Representation for Biometric Cryptography in Body Area Networks. 1st International Conference on Ubiquitous and Future Networks, Hong Kong, China, Jun 07-09 (2009) 112-115

    Google Scholar 

  7. Ogiela, L., Ogiela, M.R.: Cognitive systems and bio-inspired computing in homeland security. Journal of Network and Computer Applications, 38 (2014) 34-42

    Google Scholar 

  8. Ogiela, M.R., Ogiela, U.: Linguistic Approach to Cryptographic Data Sharing, FGCN 2008 – The 2nd International Conference on Future Generation Communication and Networking, December 13-15, 2008, Hainan Island, China, 1 (2008) 377–380

    Google Scholar 

  9. Bajwa, G., Dantu, R.: Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. Computers & Security 62 (2016) 95-113

    Google Scholar 

  10. Hani, M.K., Marsono, M.N., Bakhteri, R.: Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm. Future Generation Comp. Syst. (2013) 800–810

    Google Scholar 

  11. Nandakumar, A.K.J.K., Pankanti, S.: Fingerprint-based fuzzy vault: Implementation and performance. In: IEEE Transactions on Information Forensics and Security. 2 (2007) 744–757

    Google Scholar 

  12. Ogiela, M.R., Ogiela, U.: Grammar Encoding in DNA-Like Secret Sharing Infrastructure. 2nd International Conference on Advanced Science and Technology (AST), Miyazaki, Japan, Jun 23-25, 2010. LNCS 6059, (2010) 175-182

    Google Scholar 

  13. Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. in: D. Slezak, T.H. Kim., W.C. Tang et all., Security Technology, Communications in Computer and Information Science 58 (2009) 35-42

    Google Scholar 

  14. Ogiela, L.: Towards cognitive economy. Soft Computing 18 (2014) 1675-1683

    Google Scholar 

  15. Ogiela, L., Ogiela, M.R.: Management Information Systems. in: J.J. Park, Y. Pan, H.C. Chao, et all., 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN), South Korea, 07-10 July 2014, Ubiquitous Computing Application and Wireless Sensor, Lecture Notes in Electrical Engineering 331 (2015) 449-456

    Google Scholar 

  16. Ogiela, L.: Cognitive informatics in image semantics description, identification and automatic pattern understanding. Neurocomputing 122 (2013) 58-69

    Google Scholar 

  17. Ogiela, L.: Cognitive Computational Intelligence in Medical Pattern Semantic Understanding. in: M. Guo, L. Zhao, L. Wang (Eds.), Fourth International Conference on Natural Computation, ICNC 2008, Jinan, Shandong, China, 18-20 October, 2008, 245-247

    Google Scholar 

  18. Ogiela, L.: Computational Intelligence in Cognitive Healthcare Information Systems. in: I. Bichindaritz, S. Vaidya, A. Jain et all., Computational Intelligence in Healthcare 4: Advanced Methodologies, Studies in Computational Intelligence 309 (2010) 347-369

    Google Scholar 

  19. Ogiela, L.: Data management in cognitive financial systems. International Journal of Information Management 33 (2013) 263-270

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Ogiela, M.R., Ogiela, L. (2017). Application of Personalized Cryptography in Cloud Environment. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49109-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49108-0

  • Online ISBN: 978-3-319-49109-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics