Vše

Co hledáte?

Vše
Projekty
Výsledky výzkumu
Subjekty

Rychlé hledání

  • Projekty podpořené TA ČR
  • Významné projekty
  • Projekty s nejvyšší státní podporou
  • Aktuálně běžící projekty

Chytré vyhledávání

  • Takto najdu konkrétní +slovo
  • Takto z výsledků -slovo zcela vynechám
  • “Takto můžu najít celou frázi”

Intelligent and semantic threshold schemes for security in cloud computing

Identifikátory výsledku

  • Kód výsledku v IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F21%3A10246969" target="_blank" >RIV/61989100:27240/21:10246969 - isvavai.cz</a>

  • Výsledek na webu

    <a href="https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.5247" target="_blank" >https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.5247</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1002/cpe.5247" target="_blank" >10.1002/cpe.5247</a>

Alternativní jazyky

  • Jazyk výsledku

    angličtina

  • Název v původním jazyce

    Intelligent and semantic threshold schemes for security in cloud computing

  • Popis výsledku v původním jazyce

    This article presents new methods of securing data with particular emphasis on their applications in Cloud Computing. Methods of hiding data dedicated to processes of its security will be illustrated by cryptographic techniques, particularly data splitting protocols. Cryptographic information sharing algorithms are a particularly important type of techniques allowing confidential or secret data to be secured. These algorithms have been enhanced with new classes of solutions, including semantic protocols of secret sharing. The innovation of this solution consists in the presentation of smart data securing algorithms that use techniques of the semantic sharing of secret information. The information subjected to the process of splitting and hiding can take various forms, including that of services. Because of this aspect, namely, the various forms of the secret, and the use of universal information hiding techniques, a particularly important aspect of the solutions presented here is the ability to use them in various areas of data security. One of such areas comprises Cloud Computing, which forms the leading subject of this publication. In this article, the authors describe intelligent cryptography techniques dedicated to security services data. The most important achievement is the introduction of a new class of data encryption protocols, such as semantic threshold schemes.

  • Název v anglickém jazyce

    Intelligent and semantic threshold schemes for security in cloud computing

  • Popis výsledku anglicky

    This article presents new methods of securing data with particular emphasis on their applications in Cloud Computing. Methods of hiding data dedicated to processes of its security will be illustrated by cryptographic techniques, particularly data splitting protocols. Cryptographic information sharing algorithms are a particularly important type of techniques allowing confidential or secret data to be secured. These algorithms have been enhanced with new classes of solutions, including semantic protocols of secret sharing. The innovation of this solution consists in the presentation of smart data securing algorithms that use techniques of the semantic sharing of secret information. The information subjected to the process of splitting and hiding can take various forms, including that of services. Because of this aspect, namely, the various forms of the secret, and the use of universal information hiding techniques, a particularly important aspect of the solutions presented here is the ability to use them in various areas of data security. One of such areas comprises Cloud Computing, which forms the leading subject of this publication. In this article, the authors describe intelligent cryptography techniques dedicated to security services data. The most important achievement is the introduction of a new class of data encryption protocols, such as semantic threshold schemes.

Klasifikace

  • Druh

    J<sub>imp</sub> - Článek v periodiku v databázi Web of Science

  • CEP obor

  • OECD FORD obor

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Návaznosti výsledku

  • Projekt

  • Návaznosti

    S - Specificky vyzkum na vysokych skolach

Ostatní

  • Rok uplatnění

    2021

  • Kód důvěrnosti údajů

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Údaje specifické pro druh výsledku

  • Název periodika

    Concurrency Computation Practice and Experience

  • ISSN

    1532-0626

  • e-ISSN

  • Svazek periodika

    33

  • Číslo periodika v rámci svazku

    2

  • Stát vydavatele periodika

    US - Spojené státy americké

  • Počet stran výsledku

    8

  • Strana od-do

  • Kód UT WoS článku

    000603667800024

  • EID výsledku v databázi Scopus

    2-s2.0-85063768872