Skip to main content
Log in

Cognitive Approaches for Medicine in Cloud Computing

  • Image & Signal Processing
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

This paper will present the application potential of the cognitive approach to data interpretation, with special reference to medical areas. The possibilities of using the meaning approach to data description and analysis will be proposed for data analysis tasks in Cloud Computing. The methods of cognitive data management in Cloud Computing are aimed to support the processes of protecting data against unauthorised takeover and they serve to enhance the data management processes. The accomplishment of the proposed tasks will be the definition of algorithms for the execution of meaning data interpretation processes in safe Cloud Computing.

Highlights

• We proposed a cognitive methods for data description.

• Proposed a techniques for secure data in Cloud Computing.

• Application of cognitive approaches for medicine was described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.

Similar content being viewed by others

References

  1. Menezes, A., van Oorschot, P., and Vanstone, S., Handbook of applied cryptography. Waterloo: CRC Press, 2001.

    Google Scholar 

  2. Mora, M. et al., Design methods for software architectures in the service-oriented computing and cloud paradigms. Software-Practice & Experience 48(2):263–267, 2018.

    Article  Google Scholar 

  3. Ogiela, L., Semantic analysis in cognitive UBIAS & E-UBIAS systems. Computers & Mathematics with Applications 63(2):378–390, 2012.

    Article  Google Scholar 

  4. Ogiela, L., Intelligent techniques for secure financial management in cloud computing. Electronic Commerce Research and Applications 14(6):456–464, 2015.

    Article  Google Scholar 

  5. Ogiela, L., Cryptographic techniques of strategic data splitting and secure information management. Pervasive and Mobile Computing 29:130–141, 2016.

    Article  Google Scholar 

  6. L. Ogiela, M.R. Ogiela, “Data mining and semantic inference in cognitive systems”, in: F. Xhafa, L. Barolli, F. Palmieri, et al. (Eds.), 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), University Salerno, Salerno, Italy, 10-12 September 2014, pp. 257-261.

  7. Ogiela, L., Ogiela, M. R., and Ogiela, U., “Efficiency of strategic data sharing and management protocols”, The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6-8, Fukuoka, Japan, pp. 198-201, 2016.

  8. Ogiela, L., and Ogiela, M. R., Insider threats and cryptographic techniques in secure information management. IEEE Systems Journal 11(2):405–414, 2017.

    Article  Google Scholar 

  9. M.R. Ogiela, U. Ogiela, “Linguistic approach to cryptographic data sharing”, 2nd International Conference on Future Generation Communication and Networking, vol. 1-2, Hainan, China, 13-15 December 2008, pp. 377-380.

  10. Ogiela, M. R., and Ogiela, U., “Secure information management in hierarchical structures”, in : T.H. Kim, H. Adeli, R.J. Robles, et al. (Eds.), 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15-17 June 2011, Advanced Computer Science and Information Technology, Book Series: Communications in Computer and Information Science, vol. 195, 2011, pp. 31-35.

  11. Ogiela, U., and Ogiela, L., Linguistic technigues for cryptographic data sharing algorithms. Journal of Concurrency and Computation: Practice and Experience, in press. https://doi.org/10.1002/cpe.4275.

  12. Pengfei, H. et al., A unified face identification and resolution scheme using cloud computing in Internet of Things. Future Generation Computer Systems-The International Journal of Escience 81:582–592, 2018.

    Article  Google Scholar 

  13. Schneier, B., “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, Wiley, 1996.

  14. Shen, J., at all., “Anonymous and Traceable Group Data Sharing in Cloud Computing”. IEEE Transactions on Information Forensics and Security 13:912–925, 2018.

    Article  Google Scholar 

  15. Suphannee, S., Iasonas, P., and Angelos, K., “I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs”, 1st IEEE European Symposium on Security and Privacy (Euro S&P), Saarbruecken, GERMANY, 21-24 Martch 2016, pp. 388-403.

Download references

Funding

This study was funded by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Urszula Ogiela.

Ethics declarations

Conflict of Interest

Authors declares that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

This article is part of the Topical Collection on Image & Signal Processing

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ogiela, U., Takizawa, M. & Ogiela, L. Cognitive Approaches for Medicine in Cloud Computing. J Med Syst 42, 70 (2018). https://doi.org/10.1007/s10916-018-0918-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-018-0918-5

Keywords