Influence of Management and Sharing Protocols for Decision Making Processes in Cloud Computing

In this paper will be evaluated influence of proposed sharing technologies for efficiency of decision making procedures in particular sectors or companies. Especially, such evaluation will be done for Cloud and Fog based procedures and services. Presented research justified the great importance of proper selection of efficient management services for particular task or distributed operations. Especially, presented solutions will be dedicated to Cloud and Fog Computing. The main idea will be describe with application of semantic aspects, dedicated to service management application. Services management protocols in the cloud and the fog can be realized with application of secure important and strategic idea.

[1]  Urszula Ogiela,et al.  Classification of Cognitive Service Management Systems in Cloud Computing , 2017, BWCCA.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  Lidia Ogiela,et al.  Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..

[4]  Marek R. Ogiela,et al.  Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.

[5]  Lidia Ogiela Advanced techniques for knowledge management and access to strategic information , 2015, Int. J. Inf. Manag..

[6]  Lidia Ogiela,et al.  Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..

[7]  Marek R. Ogiela,et al.  Bio-Inspired Cryptographic Techniques in Information Management Applications , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[8]  Amos Beimel,et al.  Secret-Sharing Schemes for Very Dense Graphs , 2014, Journal of Cryptology.

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  Marek R. Ogiela,et al.  Secure Information Management in Hierarchical Structures , 2011 .

[11]  Marek R. Ogiela,et al.  Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[12]  Stephen Grossberg,et al.  Adaptive Resonance Theory: How a brain learns to consciously attend, learn, and recognize a changing world , 2013, Neural Networks.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.