Mbarek Marwan ; Ali Kartit ; Hassan Ouahmane - A Secured Data Processing Technique for Effective Utilization of Cloud Computing

jdmdh:4085 - Journal of Data Mining & Digital Humanities, 2 janvier 2018, Numéro spécial sur la veille stratégique scientifique et technologique (2016) - https://doi.org/10.46298/jdmdh.4085
A Secured Data Processing Technique for Effective Utilization of Cloud ComputingArticle

Auteurs : Mbarek Marwan 1,2; Ali Kartit 3,4; Hassan Ouahmane 3,4

Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools.


Volume : Numéro spécial sur la veille stratégique scientifique et technologique (2016)
Publié le : 2 janvier 2018
Accepté le : 8 décembre 2017
Soumis le : 23 novembre 2017
Mots-clés : data processing,security,digital humanities,cloud computing,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]

1 Document citant cet article

Statistiques de consultation

Cette page a été consultée 2679 fois.
Le PDF de cet article a été téléchargé 929 fois.