Skip to main content

2014 | Buch

Secure Information Management Using Linguistic Threshold Approach

insite
SUCHEN

Über dieses Buch

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing information and methods of its reconstruction.

This is why techniques of advanced splitting and reconstruction of information form the primary subject of Secure Information Management Using Linguistic Threshold Approach, whose main purpose is to discuss the so-called linguistic threshold schemes for information sharing. An attempt is also made to describe the opportunities of using these techniques to create new models of managing strategic information shared within a commercial organisation or a state institution. Such information is specially protected, and its contents are used only if the authorised users are enabled to access it. This monograph attempts to define a model structure of information flow and for assigning information shares to particular groups of individuals concerned. The proposed information flow model can be integrated into practical solutions within any organisation or institution, improving the functionality of its legacy information systems.

The use of strong mathematical cryptographic models to manage information constitutes a scientific innovation and a demonstration of the methods and opportunities of using advanced techniques for confidentially exchanging information in tasks supporting data flow within a commercial organisation.

The interdisciplinary nature of the solutions proposed means that the subject of linguistic threshold schemes forming part of intelligent information management becomes a new challenge for the research and application work carried out.

The authors of this monograph hope that it will guide readers on an interesting journey through the cutting edge solution in the field of secure information management.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
One of the fastest developing subjects associated with applying modern information technologies to manage processes at commercial organisations comprises the acquisition, the flow as well as planning, controlling, analysing, designing and defining detailed actions which forms the main component of the information management process. Scientific research in this field is interdisciplinary in nature and based on knowledge of management, mathematics and information theory, particularly knowledge engineering. The significance and wide popularity of this subject has justified distinguishing a new line of research, called Information Management [1–4]. A new subject, namely the techniques for protecting and encrypting (hiding) important information and protected information [5], has merged with the line of research on the subject and problems of information management. The problems of information encryption and protection are rooted in cryptography, which mainly uses algorithms for ensuring data confidentiality and information division techniques, as well methods of reconstructing information.
Marek R. Ogiela, Urszula Ogiela
Chapter 2. Fields of Application, Methods of and Current Trends in Information Management
Abstract
Topics of information management are coming up not only in the literature of the subject [1–4] but also in everyday life. Aspects of these topics are particularly worthy of attention as this process increasingly expands beyond the boundaries of a specific business organisation – an enterprise – and is becoming widespread in politics, culture, science and, obviously, in business. This is because information management processes encompass not just simple information processing and analysis, but primarily its acquisition, collecting and transmission.
Marek R. Ogiela, Urszula Ogiela
Chapter 3. Types of Information Splitting and Sharing Techniques
Abstract
Of the many topics which information management is concerned with, one important problem is ensuring the partial or complete confidentiality of, and the selective access by authorised persons to information resources. These problems become particularly significant for important information which is vital to the development of the company or for in-house secrets of a given corporation. As such data is frequently stored in a digital format on company computers, it becomes necessary to develop new solutions and procedures facilitating sharing such important information between persons belonging to authorised bodies (e.g. board members or groups of people given access to such information). Such opportunities for managing information arise due to the use of certain mathematical techniques originating in the fields of cryptography and steganography. However, these fields are focused on ways of encrypting information (cryptography) or hiding it (steganography), [1]. In this case, we are looking for formulas allowing information (sometimes also confidential) to be split in a way that makes its retrieval possible only for authorised persons. Information undergoing this procedure may be secret or overt, but with the reservation that it can be reconstructed only as a result of the joint action of the group of persons authorised to do so. Secret information may be split, for instance, within institutions or groups securing the operations of the state [2, 3]. Information of a lower confidentiality level may be split within corporations or even small enterprises. The techniques discussed here are universal and can be applied to any type of information that can be presented in an electronic format.
Marek R. Ogiela, Urszula Ogiela
Chapter 4. Model of Multilevel Information Splitting and Management in an Organization
Abstract
Information is split within commercial organizations regardless of its type, the method of its processing or the purpose for which the organization collects it. The significance of information splitting may depend on the method of its splitting, the purpose of splitting it and the meaning of this information. The significance of information sharing, on the other hand, may depend on its strategic importance and the meaning it contains for the specific organization. If information is important and of great materiality for the organization or for e.g. external organizations, then it makes sense to attempt sharing this information to protect it and secure it from disclosure to unauthorized persons (or organizations). When defining the type of information to undergo the splitting or sharing process, we should consider its ‘character’ determined by its confidentiality, significance and importance, because only important information determines the method of its splitting and the sense of doing so.
Marek R. Ogiela, Urszula Ogiela
Chapter 5. Proposition of Sharing Techniques Based on the Mathematical Linguistic Approach
Abstract
This chapter presents novel solutions of the secret data sharing algorithm based on the concept of mathematical linguistics, which are used to split and share information in various companies. The essence of the presented approach is a linguistic concept stemming from the theory of formal languages, which concept is used in recording, analysing and interpreting various types of data treated as elements of a certain formal language [1].
Marek R. Ogiela, Urszula Ogiela
Chapter 6. Methodological Aspects of Information Sharing and Management in Organizations
Abstract
The significance of information splitting and sharing in a commercial organization seems indisputable, as it results from the very nature of the correct use of information. Information found in an enterprise of any kind constitutes its huge asset, strength and advantage, can give it a position distinguishing it from other similar companies in the hierarchy and properly determine its place on the market. Information possessed by a commercial organisation is its strength and driving force, while the lack of a definition of significant information within an organisation represents its weakness [1].
Marek R. Ogiela, Urszula Ogiela
Chapter 7. Features of Linguistic Threshold Schemes
Abstract
In the discussion of strategic data splitting and sharing algorithms it has become necessary to embed linguistic algorithms of information splitting and data reconstruction in the solutions presented in this publication. The essence of this approach, representing an interdisciplinary topic straddling the border between the subjects of commercial organisation management and of information theory, is an attempt to use cryptographic methods more commonly applied in engineering and technical fields for purposes for which such solutions have not yet been proposed, but for which they appear equally capable of doing their job – for management.
Marek R. Ogiela, Urszula Ogiela
Chapter 8. Summary
Abstract
Methods of dividing information and techniques of its linguistic sharing are now emerging as new solutions that can contribute to processes of hiding information/data not accessible to a broader group [1–3]. Thanks to them, confidential or secret information of any sort can be effectively encrypted, divided between the confidants of the secret, and then these confidants or a selected group of them can reconstruct it using the appropriate algorithms and grammatical rules specified during the definition of formal grammars [4].
Marek R. Ogiela, Urszula Ogiela
Backmatter
Metadaten
Titel
Secure Information Management Using Linguistic Threshold Approach
verfasst von
Marek R. Ogiela
Urszula Ogiela
Copyright-Jahr
2014
Verlag
Springer London
Electronic ISBN
978-1-4471-5016-9
Print ISBN
978-1-4471-5015-2
DOI
https://doi.org/10.1007/978-1-4471-5016-9