Premium
Cognitive security paradigm for cloud computing applications
Author(s) -
Ogiela Lidia,
Ogiela Marek R.
Publication year - 2019
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.5316
Subject(s) - computer science , novelty , computer security , cloud computing , cryptography , biometrics , secret sharing , data sharing , confidentiality , theoretical computer science , medicine , philosophy , alternative medicine , theology , pathology , operating system
Summary This article presents new paradigms of confidential data protection. New classes of paradigms are dedicated to enhancing the already‐known cryptographic solutions belonging to the group of data sharing schemes. Data sharing schemes are dedicated to executing data protection tasks by means of splitting data into parts (called shadows) and distributing those shadows among a group of secret trustees. This process is enriched by linguistic and biometric solutions to guarantee protection of the shared data by means of biometric labeling or by means of user verification with the application of meaning interpretation of individual secret parts. The novelty in this solution is in the application of cognitive algorithms to describe correctly the shared secret. Cognitive paradigms guarantee an execution of information concealment protocols and their division at various levels of knowledge held by individual protocol participants. The paradigms of cognitive description of the concealed data have been introduced into a new class of data sharing protocols, ie, into the linguistic‐biometric threshold schemes. A special feature of the proposed solution is its universality, which is a possibility to apply the here‐discussed threshold schemes in the processes of data concealment with varying importance. At the same time, this solution can be applied to execute data protection tasks against unauthorized acquisition or disclosure. This paper will present also the possibilities of application of the paradigms presented here to conceal data dedicated to the data management processes.