Cognitive Approaches for Medicine in Cloud Computing

This paper will present the application potential of the cognitive approach to data interpretation, with special reference to medical areas. The possibilities of using the meaning approach to data description and analysis will be proposed for data analysis tasks in Cloud Computing. The methods of cognitive data management in Cloud Computing are aimed to support the processes of protecting data against unauthorised takeover and they serve to enhance the data management processes. The accomplishment of the proposed tasks will be the definition of algorithms for the execution of meaning data interpretation processes in safe Cloud Computing.Highlights• We proposed a cognitive methods for data description.• Proposed a techniques for secure data in Cloud Computing.• Application of cognitive approaches for medicine was described.

[1]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[2]  Marek R. Ogiela,et al.  Data Mining and Semantic Inference in Cognitive Systems , 2014, 2014 International Conference on Intelligent Networking and Collaborative Systems.

[3]  Lidia Ogiela,et al.  Intelligent techniques for secure financial management in cloud computing , 2015, Electron. Commer. Res. Appl..

[4]  Rory O'Connor,et al.  Design methods for software architectures in the service‐oriented computing and cloud paradigms , 2017, Softw. Pract. Exp..

[5]  Lidia Ogiela,et al.  Cryptographic techniques of strategic data splitting and secure information management , 2016, Pervasive Mob. Comput..

[6]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[7]  Lidia Ogiela,et al.  Semantic analysis in cognitive UBIAS & E-UBIAS systems , 2012, Comput. Math. Appl..

[8]  Marek R. Ogiela,et al.  Efficiency of Strategic Data Sharing and Management Protocols , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[9]  Marek R. Ogiela,et al.  Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[10]  Yue Xu,et al.  A unified face identification and resolution scheme using cloud computing in Internet of Things , 2018, Future Gener. Comput. Syst..

[11]  Marek R. Ogiela,et al.  Secure Information Management in Hierarchical Structures , 2011 .

[12]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Urszula Ogiela,et al.  Linguistic techniques for cryptographic data sharing algorithms , 2018, Concurr. Comput. Pract. Exp..

[14]  Marek R. Ogiela,et al.  Insider Threats and Cryptographic Techniques in Secure Information Management , 2017, IEEE Systems Journal.

[15]  Angelos D. Keromytis,et al.  I am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).