Abstract

This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.

Highlights

  • The processes of intelligent data management and securing are currently focused on combining the processes of safe storage of secret, confidential or strategic and developmental information with the processes of secret data management

  • Intelligent data management and protection processes in cloud computing focus on the execution of cryptographic data protection protocols. In this group of protocols an important role is played by the secret-sharing protocols enriched by the process of linguistic description of the concealed data meaning

  • The processes of linguistic meaning description of the protected strategic information can be executed with consideration of various levels of semantic knowledge relating to the concealed secrets; at the same time, the method of meaning description implies the selection of an appropriate grammar structure

Read more

Summary

Introduction

The processes of intelligent data management and securing are currently focused on combining the processes of safe storage of secret, confidential or strategic and developmental information with the processes of secret data management. The data protection process is not the execution of a secret information complete securing process, but subject to the processes of storage or distribution [1,2,3,4,5,6]. Data with great importance-strategic or secret-are subject to special protection. Joint implementation of the security processes relating to the data protection in entities responsible for their protection is always subject, to a greater or smaller extent, to attempts of attacks on significantly important data [11,12]. Among the cryptographic data sharing techniques we can differentiate a class of information sharing protocols, within which cryptographic schemes are applied implementing

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call