Abstract
In this paper, new approaches for secure data management will be described. Presented methods will be a semantic-based procedures, which for data handling use a semantic content and meaning. Such methods are designed for efficient data protection in cloud or distributed systems. Application of such procedures allow to significantly increase the security strength of existing solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ogiela, L., Ogiela, M.R.: Cognitive security paradigm for cloud computing applications. Concurr. Comput. Pract. Exp. 32(8), e5316 (2020). https://doi.org/10.1002/cpe.5316
Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. SCI, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28
Ogiela, U., Ogiela, L.: Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comput. Pract. Exp. 30(3), e4275 (2018). https://doi.org/10.1002/cpe.4275
Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) CISIS 2017. AISC, vol. 611, pp. 82–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61566-0_8
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela, L., Ogiela, M.R., Ogiela, U.: Efficiency of strategic data sharing and management protocols. In: The 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2016), 6–8 July 2016, Fukuoka, Japan, pp. 198–201 (2016). https://doi.org/10.1109/IMIS.2016.119
Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manag. 57(5), 102260 (2020)
Ancheta, R.A., Reyes Jr., F.C., Caliwag, J.A., Castillo, R.E.: FEDSecurity: implementation of computer vision thru face and eye detection. Int. J. Mach. Learn. Comput. 8, 619–624 (2018)
Gil, S., et al.: Transformative effects of IoT, blockchain and artificial intelligence on cloud computing: evolution, vision, trends and open challenges. Internet Things 8, 100118 (2019)
Yang, S.J.H., Ogata, H., Matsui, T., Chen, N.-S.: Human-centered artificial intelligence in education: seeing the invisible through the visible. Comput. Educ. Artif. Intell. 2, 100008 (2021)
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, U., Takizawa, M., Ogiela, L. (2022). Semantic-Based Techniques for Efficient and Secure Data Management. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 450. Springer, Cham. https://doi.org/10.1007/978-3-030-99587-4_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-99587-4_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99586-7
Online ISBN: 978-3-030-99587-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)