Abstract
This paper presents an idea of intelligent service management processes in the Cloud. The main aspects are application of threshold schemes for secure distributed service providing. Authors propose a new idea of secure service management using sharing techniques. Those technigues are dedicated to secure processes as well as secret spllitting and sharing, and seems to be very usefull for securing all data/service and all parts of them. The proposed idea of cognitive service management and data/information sharing in the Cloud, include the use of cognitive data analysis algorithms, cryptographic data splitting and sharing techniques, schemes for hiding information and cognitive management systems. The novelty of proposed solutions lays in considering the characteristic and main profiles of provided cloud services, as well as semantic meaning of distributed information, thanks to the application of cognitive information systems.


Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Albus JS, Meystel AM (2001) Engineering of mind – an introduction to the science of intelligent systems, A Wiley-Interscience Publication John Wiley & Sons, Inc
Ateniese G, Blundo C, de Santis A, Stinson DR (1996) Visual cryptography for general access structures. Inf Comput 129:86–106
Beguin P, Cresti A (1995) General short computational secret sharing schemes. Lect Notes Comput Sci 921:194–208
Blakley B, Blakley GR, Chan AH, Massey JL (1993) Threshold schemes with disenrollment. In: Brickell EF (ed) advances in cryptology — CRYPTO’ 92. CRYPTO 1992. Lecture Notes in Computer Science, vol 740. Springer, Berlin, Heidelberg, pp 540–548
Branquinho J (ed) (2001) The foundations of cognitive science. Clarendon Press, Oxford
Chomsky N (1988) Language and problems of knowledge: the Managua lectures. MIT Press, Cambridge
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (eds) Advances in cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg, pp 469–472
Huaizahi L, Mukesh S (2007) Trust management in distributed systems. Computer 40(2):45–53
Jatoth C, Gangadharan GR, Fiore U, Buyya R (2017) QoS-aware big service composition using MapReduce based evolutionary algorithm with guided mutation. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.07.042
Mackenzie OJ (ed) (2006) Information science and knowledge management. Springer-Verlag, Berlin
Menezes A, van Oorschot P, Vanstone S (2001) Handbook of applied cryptography. CRC Press, Boca Raton
Meystel AM, Albus JS (2002) Intelligent systems – architecture, design, and control. A Wiley-Interscience Publication John Wiley & Sons, Inc., Canada
Ogiela L (2012) Semantic analysis in cognitive UBIAS & E-UBIAS systems. Comput Math Appl 63(2):378–390
Ogiela L (2015) Advanced techniques for knowledge management and access to strategic information. Int J Inf Manag 35:154–159
Ogiela L (2015) Intelligent techniques for secure financial management in cloud computing. Electron Commer Res Appl 14(6):456–464
Ogiela L (2016) Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob Comput 29:130–141
Ogiela MR, Ogiela U (2008) Linguistic approach to cryptographic data sharing, 2nd International Conference on Future Generation Communication and Networking, vol. 1–2, Hainan, PEOPLES R CHINA, 13–15 December, pp. 377–380
Ogiela L, Ogiela MR (2014) Data mining and semantic inference in cognitive systems, in: Xhafa F., Barolli L., Palmieri F., et al. (Eds.), 2014 International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS 2014), University Salerno, Salerno, Italy, 10–12 September, pp. 257–261
Ogiela MR, Ogiela U (2014) Secure information management using linguistic threshold approach. Advanced information and knowledge processing. Springer, London
Ogiela L, Ogiela MR (2016) Bio-inspired cryptographic techniques in information management applications, the IEEE 30th international conference on advanced information networking and applications (IEEE AINA-2016), Crans-Montana, Switzerland, 23–25 March, pp. 1059–1063
Ogiela MR, Ogiela L (2016) Data understanding techniques for management application and cryptography, in: Xhafa F., Barolli L., Snasel V., et al. (Eds.), 8th international conference on intelligent networking and collaborative systems (INCoS), Ostrava, Czech Republic, 07–09 September 2016, Book Series: International Conference on Intelligent Networking and Collaborative Systems, pp. 40–43
Ogiela L, Ogiela MR (2017) Insider threats and cryptographic techniques in secure information management. IEEE Syst J 11(2):405–414
Ogiela U, Ogiela L (in press) Linguistic technigues for cryptographic data sharing algorithms. Journal of Concurrency and Computation: Practice and Experience. https://doi.org/10.1002/cpe.4275
Ogiela L, Ogiela MR, Ogiela U (2016) Efficiency of strategic data sharing and management protocols, the 10th international conference on innovative mobile and internet services in ubiquitous computing (IMIS-2016), 6–8 July, Fukuoka, Japan, pp. 198–201
Ogiela MR, Ogiela U (2011) Secure information management in hierarchical structures, in : Kim T.H., Adeli H., Robles R.J., et al. (Eds.), 3rd International Conference on Advanced Science and Technology (AST 2011), Jeju Island, South Korea, 15-17 June 2011, Advanced Computer Science and Information Technology, Book Series: Communications in Computer and Information Science, vol. 195, pp. 31–35
Ogiela U, Takizawa M, Ogiela L (2018) Security of selected secret sharing schemes, in: Barolli L., Enokido T. (Eds.), Innovative Mobile and Internet Services in Ubiquitous Computing, Advances in Intelligent Systems and Computing 612, Springer International Publishing AG, pp. 395–400
Schneier B (1996) Applied cryptography: protocols, algorithms, and source code in C. Wiley, New York
Shamir A. (1979) How to share a secret, communications of the ACM, s. 612–613
Tipton HF (2007) Information security management handbook. Auerbach, Boca Raton
van Bakel J (1984) Automatic semantic interpretation: a computer model of understanding natural language. Foris Publications, Dordrecht
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
Author information
Authors and Affiliations
Corresponding author
Additional information
Highlights
•We propose a cognitive approach for supporting data management.
•Proposed idea of semantic-based information sharing in the Cloud.
•Application of security solutions for supporting management processes.
Rights and permissions
About this article
Cite this article
Ogiela, L., Ogiela, M.R. Towards cognitive service management and semantic information sharing in the Cloud. Multimed Tools Appl 77, 18625–18635 (2018). https://doi.org/10.1007/s11042-017-5302-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-5302-9