Skip to main content

Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 971))

Abstract

In this paper will be presented new ideas of application of security procedures for data and services management in distributed computer infrastructures, and in Cloud Computing. Services management in Cloud Computing will be connected with application of secure cognitive information systems supporting management activities and securing data using blockchain technologies and distributed ledger. Application of distributed ledger enables the development of decentralized management protocols, which allow verification of all performed operations by all authorized parties. Such protocols give the opportunity to create secure and efficient data sharing protocols in structures, where all authorized entities are equal and can independently verify the type of operations, and instances that process such data.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Larios-Hernández, G.J.: Blockchain entrepreneurship opportunity in the practices of the unbanked. Bus. Horiz. 60, 865–874 (2017)

    Article  Google Scholar 

  2. Li, J., Wu, J., Chen, L.: Block-secure: blockchain based scheme for secure P2P cloud storage. Inf. Sci. 465, 219–231 (2018)

    Article  Google Scholar 

  3. Jallow, A.K., Demian, P., Anumba, Ch.J., Baldwin, A.N.: An enterprise architecture framework for electronic requirements information management. Int. J. Inf. Manag. 37, 455–472 (2017)

    Article  Google Scholar 

  4. Ogiela, L.: Cognitive information systems in management sciences. Elsevier, Academic Press (2017)

    Google Scholar 

  5. Ogiela, L., Ogiela, M.R. Management Information Systems. LNEE, vol. 331, pp. 449–456 (2015)

    Google Scholar 

  6. Ogiela, M.R., Ogiela, U.: Grammar encoding in DNA-like secret sharing infrastructure. In: Kim, T.-h., Adeli, H. (eds.) ACN/AST/ISA/UCMA -2010. LNCS, vol. 6059, pp. 175–182. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13577-4_15

    Chapter  MATH  Google Scholar 

  7. Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T.-h., Adeli, H., Robles, R.J., Balitanas, M. (eds.) AST 2011. CCIS, vol. 195, pp. 31–35. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24267-0_5

    Chapter  Google Scholar 

  8. Kshetri, N.: Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10), 1027–1038 (2017)

    Article  Google Scholar 

  9. Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)

    Google Scholar 

  10. Ogiela, L., Ogiela, M.R.: Data mining and semantic inference in cognitive systems. In: Xhafa, F., Barolli, L., Palmieri, F., et al. (eds.) 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), Italy, pp. 257–261 (2014)

    Google Scholar 

  11. Ogiela, L.: Towards cognitive economy. Soft. Comput. 18, 1675–1683 (2014)

    Article  Google Scholar 

  12. Ogiela, M.R., Ogiela, L.: On using cognitive models in cryptography. In: IEEE AINA 2016 - The IEEE 30th International Conference on Advanced Information Networking and Applications, Crans-Montana, Switzerland, pp. 1055–1058 (2016). https://doi.org/10.1109/aina.2016.159

  13. Ogiela, M.R., Ogiela, L.: Cognitive keys in personalized cryptography. In: IEEE AINA 2017 - The 31st IEEE International Conference on Advanced Information Networking and Applications, Taipei, Taiwan, pp. 1050–1054 (2017). https://doi.org/10.1109/aina.2017.164

  14. Hahn, Ch., Hur, J.: Efficient and privacy-preserving biometric identification in cloud. ICT Express 2, 135–139 (2016)

    Article  Google Scholar 

  15. Reyna, A., Martín, C., Chen, J., Soler, E., Díaz, M.: On blockchain and its integration with IoT. Challenges and opportunities. Futur. Gener. Comput. Syst. 88, 173–190 (2018)

    Article  Google Scholar 

  16. Alsuhibany, S.: Evaluating the usability of optimizing text-based CAPTCHA generation. Int. J. Adv. Comput. Sci. Appl. 7(8), 164–169 (2016)

    Google Scholar 

  17. Bursztein, E., Bethard, S., Fabry, C., Mitchell, J., Jurafsky, D.: How good are humans at solving CAPTCHAs? A large scale evaluation. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 399–413 (2010)

    Google Scholar 

  18. Krzyworzeka, N., Ogiela, L.: Visual CAPTCHA for data understanding and cognitive management. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) BWCCA 2017. LNDECT, vol. 12, pp. 249–255. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-69811-3_22

    Chapter  Google Scholar 

  19. Ogiela, L.: Cognitive computational intelligence in medical pattern semantic understanding. In: Guo, M.Z., Zhao, L., Wang, L.P. (eds.) ICNC 2008: Fourth International Conference on Natural Computation, vol. 6, Proceedings, Jian, Peoples R China, 18–20 October, pp. 245–247 (2008)

    Google Scholar 

  20. Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11, 405–414 (2017)

    Article  Google Scholar 

  21. Osadchy, M., Hernandez-Castro, J., Gibson, S., Dunkelman, O., Perez-Cabo, D.: No bot expects the DeepCAPTCHA! Introducing immutable adversarial examples, with applications to CAPTCHA generation. IEEE Trans. Inf. Forensics Secur. 12(11), 2640–2653 (2017)

    Article  Google Scholar 

  22. Carniani, E., Costantino, G., Marino, F., Martinelli, F., Mori, P.: Enhancing video surveillance with usage control and privacy-preserving solutions. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 7(4), 20–40 (2016)

    Google Scholar 

  23. Kim, J.S., Pan, S.B.: A study on EMG-based biometrics. J. Internet Serv. Inf. Secur. (JISIS) 7(2), 19–31 (2017)

    Google Scholar 

Download references

Acknowledgements

This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek R. Ogiela .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ogiela, M.R., Ogiela, L. (2019). Secure Data and Services Management in Distributed Structures and in the Cloud with Application of Blockchain Technologies. In: You, I., Chen, HC., Sharma, V., Kotenko, I. (eds) Mobile Internet Security. MobiSec 2017. Communications in Computer and Information Science, vol 971. Springer, Singapore. https://doi.org/10.1007/978-981-13-3732-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3732-1_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3731-4

  • Online ISBN: 978-981-13-3732-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics