دانلود رایگان مقاله انگلیسی تکنیک های رمزنگاری شناختی برای مدیریت اطلاعات هوشمند - الزویر 2018

عنوان فارسی
تکنیک های رمزنگاری شناختی برای مدیریت اطلاعات هوشمند
عنوان انگلیسی
Cognitive cryptography techniques for intelligent information management
صفحات مقاله فارسی
0
صفحات مقاله انگلیسی
7
سال انتشار
2018
نشریه
الزویر - Elsevier
فرمت مقاله انگلیسی
PDF
کد محصول
E6656
رشته های مرتبط با این مقاله
مهندسی فناوری اطلاعات، کامپیوتر
گرایش های مرتبط با این مقاله
مهندسی نرم افزار و امنیت اطلاعات
مجله
مجله بین المللی مدیریت اطلاعات - International Journal of Information Management
دانشگاه
AGH University of Science and Technology - Cryptography and Cognitive Informatics Research Group - Poland
کلمات کلیدی
مدیریت اطلاعات هوشمند، رمزنگاری شناختی، اطلاعات معنایی و شخصی، اشتراک گذاری داده ها
چکیده

ABSTRACT


This paper discusses the foundations of cognitive cryptography used to secure information by splitting it and distributing the split parts among selected groups of secret trustees. The process of concealing data by its splitting and distributing secret parts (shadows) with the use of cognitive techniques will be discussed. Cognitive cryptography describes the possibilities of using personal information contained in individual biometric traits. At the same time, it will be presented as an innovative solution allowing the holder of a secret shadow to be identified based on their characteristic biometrics and their semantic features. Cognitive cryptography is used to manage strategic information. By using techniques for splitting and sharing this type of data as well as utilising individual biometric traits in the entire process of distributing all shadows of the concealed and split information makes the proposed cognitive cryptography techniques an innovative, extremely useful tool for securing data of major importance.

نتیجه گیری

5. Conclusions


Cognitive cryptographic techniques are dedicated to protecting and securing datasets of particularly high and material significance. They are dedicated to protecting data that is classified, confidential, strategic and frequently called a secret because of its significance. In cognitive cryptography, it is particularly legitimate to use personal information contained in biometric information sets, as well as semantic information which is unambiguously used to identify the individual features of all protocol users.


Personal information is contained in the datasets held by each protocol participant, because they are embedded in individual biometrics. During the personal identification process, these biometrics and their features are unambiguously used to properly assign the biometric features to the specific person. Then, in the personal verification process, they are used to assess whether the specific biometric features characterise the correct protocol participant.


Hence cognitive cryptography is used to protect information based on the biometric analysis of individual features used to conceal this information. The ability to utilise biometric features and description to identify and verify protocol participants in secret data management allows the shares to be correctly assigned to secret holders, and conversely, the holders to their features. These types of solutions used for managing information of great significance indicate the areas in which intelligent information management can be applied. The word ‘intelligent' applies to semantic solutions which use non-standard biometric features that can be described and interpreted in processes of the semantic interpretation of personal traits.


بدون دیدگاه