This paper will present the authorsâ?? own techniques of secret data management and\nprotection, with particular attention paid to techniques securing data services. Among the solutions\ndiscussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential)\ndata sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of\nprotecting and securing data against unauthorized acquisition. Data-sharing protocols will execute\nthe tasks of securing a special type of information, i.e., data services. The area of data protection\nwill be defined for various levels, within which will be executed the tasks of data management and\nprotection. The authorsâ?? solution concerning securing data with the use of cryptographic threshold\ntechniques used to split the secret among a specified group of secret trustees, simultaneously enhanced\nby the application of linguistic methods of description of the shared secret, forms a new class of\nprotocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring\nto the service management and securing will be dedicated to various levels of data management.\nThese levels could be differentiated both in the structure of a given entity and in its environment.\nThere is a special example thereof, i.e., the cloud management processes. These will also be subject\nto the assessment of feasibility of application of the discussed protocols in these areas. Presented\nsolutions will be based on the application of an innovative approach, in which we can use a special\nformal graph for the creation of a secret representation, which can then be divided and transmitted\nover a distributed network.
Loading....