Mbarek Marwan ; Ali Kartit ; Hassan Ouahmane - A Secured Data Processing Technique for Effective Utilization of Cloud Computing

jdmdh:4085 - Journal of Data Mining & Digital Humanities, January 2, 2018, Special Issue on Scientific and Technological Strategic Intelligence (2016) - https://doi.org/10.46298/jdmdh.4085
A Secured Data Processing Technique for Effective Utilization of Cloud Computing

Authors: Mbarek Marwan ; Ali Kartit ; Hassan Ouahmane

    Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools.


    Volume: Special Issue on Scientific and Technological Strategic Intelligence (2016)
    Published on: January 2, 2018
    Accepted on: December 8, 2017
    Submitted on: November 23, 2017
    Keywords: data processing,security,digital humanities,cloud computing,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]

    Share

    Consultation statistics

    This page has been seen 1975 times.
    This article's PDF has been downloaded 702 times.