Abstract
In this paper will be presented user-oriented security protocols, and its application in dispersed computing systems. Modern security solutions can use selected personal features, and create personalized security protocols oriented for particular users. Such techniques can also be applied in dispersed computing systems, which work in distributed infrastructure, processing data originating from different sources. In this paper we’ll describe selected security methods, which especially can be applied in dispersed environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ogiela, L., Ogiela, M.R.: Cognitive security paradigm for cloud computing applications. Concurr. Comput.: Pract. Exp. 32(8), e5316 (2020). https://doi.org/10.1002/cpe.5316
Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
Ogiela, U., Ogiela, L.: Linguistic techniques for cryptographic data sharing algorithms. Concurr. Comput. Pract. Exp. 30(3), e4275 (2018). https://doi.org/10.1002/cpe.4275
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. SCI, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28
Ogiela, M.R., Ogiela, U., Ogiela, L.: Secure information sharing using personal biometric characteristics. In: Kim, T.-H., Kang, J.-J., Grosky, W.I., Arslan, T., Pissinou, N. (eds.) FGIT 2012. CCIS, vol. 353, pp. 369–373. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35521-9_54
Koptyra, K., Ogiela, M.R.: Steganography in IoT: information hiding with APDS-9960 proximity and gestures sensor. Sensors 22(7), 2612 (2022). https://doi.org/10.3390/s22072612
Ogiela, M.R., Koptyra, K.: Visual pattern embedding in multi-secret image steganography. In: ICIIBMS 2015 - International Conference on Intelligent Informatics and BioMedical Sciences, Okinawa, Japan, 28–30 November 2015, pp. 434–437. IEEE (2015). ISBN 978-1-4799-8562-3/15
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manag. 57(5), 102260 (2020)
Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F.: Text compression and encryption through smart devices for mobile communication. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 672–677 (2013). https://doi.org/10.1109/IMIS.2013.121
Acknowledgments
This work has been supported by the AGH University of Science and Technology research Grant No 16.16.120.773.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, U., Ogiela, M.R. (2022). Personalized Security Solutions in Dispersed Computing. In: Barolli, L., Miwa, H. (eds) Advances in Intelligent Networking and Collaborative Systems. INCoS 2022. Lecture Notes in Networks and Systems, vol 527. Springer, Cham. https://doi.org/10.1007/978-3-031-14627-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-14627-5_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-14626-8
Online ISBN: 978-3-031-14627-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)