Mbarek Marwan ; Ali Kartit ; Hassan Ouahmane - A Secured Data Processing Technique for Effective Utilization of Cloud Computing

jdmdh:4085 - Journal of Data Mining & Digital Humanities, January 2, 2018, Special Issue on Scientific and Technological Strategic Intelligence (2016) - https://doi.org/10.46298/jdmdh.4085
A Secured Data Processing Technique for Effective Utilization of Cloud ComputingArticle

Authors: Mbarek Marwan 1,2; Ali Kartit 3,4; Hassan Ouahmane 3,4

Digital humanities require IT Infrastructure and sophisticated analytical tools, including datavisualization, data mining, statistics, text mining and information retrieval. Regarding funding, tobuild a local data center will necessitate substantial investments. Fortunately, there is another optionthat will help researchers take advantage of these IT services to access, use and share informationeasily. Cloud services ideally offer on-demand software and resources over the Internet to read andanalyze ancient documents. More interestingly, billing system is completely flexible and based onresource usage and Quality of Service (QoS) level. In spite of its multiple advantages, outsourcingcomputations to an external provider arises several challenges. Specifically, security is the majorfactor hindering the widespread acceptance of this new concept. As a case study, we review the use ofcloud computing to process digital images safely. Recently, various solutions have been suggested tosecure data processing in cloud environement. Though, ensuring privacy and high performance needsmore improvements to protect the organization's most sensitive data. To this end, we propose aframework based on segmentation and watermarking techniques to ensure data privacy. In this respect,segementation algorithm is used to to protect client's data against untauhorized access, whilewatermarking method determines and maintains ownership. Consequentely, this framework willincrease the speed of development on ready-to-use digital humanities tools.


Volume: Special Issue on Scientific and Technological Strategic Intelligence (2016)
Published on: January 2, 2018
Accepted on: December 8, 2017
Submitted on: November 23, 2017
Keywords: data processing,security,digital humanities,cloud computing,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]

References

Consultation statistics

This page has been seen 2410 times.
This article's PDF has been downloaded 793 times.