A Review for Data Fragmentation in Cloud Computing
Qays Jabbar Abed
Ph. D. Student, High Institute of Technology, Lebanese University, Lebanon
Dr. Rami Tawil
Associate Professor, Faculty of Science Lebanese University, Lebanon
19-23
Vol: 12, Issue: 3, 2022
Receiving Date:
2022-05-20
Acceptance Date:
2022-07-05
Publication Date:
2022-07-21
Download PDF
http://doi.org/10.37648/ijrst.v12i03.004
Abstract
The importance of network security is demonstrated by preserving data from being stolen or tampered with by attackers. The computerized cloud supports the protection of both large and small data as well as authorized remote access. Although its protection is secured in the cloud, it needs to use additional methods to enhance data protection from attackers. In this paper, we present the various methods that researchers used to protect data through the computerized cloud, as the diversity in the use of methods led to obtaining good results, albeit to varying degrees. Which relieved data fragmentation using multiple technologies and storing it in the cloud, and some used data encryption methods. The aim of this research is to present different types of methods used in the field of data protection across the network via the cloud, which provides an opportunity for researchers to present research that addresses the gaps in order to obtain better results.
Keywords:
data fragmentation; cloud computing; network security
References
- M. Bahrami and M. Singhal, 'The Role of Cloud Computing Architecture in Big Data', Information Granularity Big Data and Computational Intelligence, pp. 275-295, 2015.
- Z. Yan, R. Deng and V. Varadharajan, 'Cryptography and Data Security in Cloud Computing', Information Sciences, vol. 387, pp. 53-55, 2017.
- Cloud Security Alliance, 'Top Threats to Cloud Computing', CSA, 2010.
- P. Kumar, P. Raj and P. Jelciana, 'Exploring Data Security Issues and Solutions in Cloud Computing', Procedia Computer Science, vol. 125, pp. 691-697, 2018.
- R. Hegarty and J. Haggerty, 'Extrusion detection of illegal files in cloud-based systems', International Journal of Space-Based and Situated Computing, vol. 5, no. 3, pp. 150, 2015.
- Santos, N., Lentini, S., Grosso, E., Ghita, B.V., & Masala, G.L. Performance analysis of data fragmentation techniques on a cloud server. Int. J. Grid Util. Comput., 10, 392-401, 2019.
- Lentini, S., Grosso, E., Masala, G.L. A Comparison of Data Fragmentation Techniques in Cloud Servers. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V.(eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. 2018 https://doi.org/10.1007/978-3-319-75928-9_50
- Patni, P. D., and S. N. Kakarwal. 'Security Enhancement of Data in Cloud using Fragmentation and Replication.' International Journal of Engineering and Management Research (IJEMR) 6.5 (2016): 492-497.
- N. L. Santos, B. Ghita and G. L. Masala, 'Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database,' 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2019, pp. 3735-3740, doi: 10.1109/SMC.2019.8914454.
- Hudic, Aleksandar, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, and Edgar R. Weippl. 'Data confidentiality using fragmentation in cloud computing.' International Journal of Pervasive Computing and Communications (2013).
- Chavan, Mrs Radhika, and S. Y. Raut. 'Cloud Security Solution: Fragmentation and Replication' International Journal of Advance Research and Innovative Ideas in Education 2, no. 4 (2016).
- Kapusta, Katarzyna, and Gerard Memmi. 'A fast fragmentation algorithm for data protection in a multi-cloud environment.' arXiv preprint arXiv:1804.01886 (2018).
- D.Suneetha, D.Rathna Kishore, G.G.S.Pradeep. ' Data Security Model Using Artificial Neural Networks and Database Fragmentation in Cloud Environment' International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8 Issue-2, July 2019.
- Archana M, and Mallikarjun Shastry P M, “A Method for Text Data Fragmentation to Provide Security in Cloud Computing.” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-9 Issue-2, December, 2019.
- Rabab M.Nabawy, Heba El Beh, Hamdi M. Mousa,' Securing Big Data Using Mixed Fragmentation Based On Multi-Cloud Environment', International Journal of Scientific & Technology Research (IJSTR). Volume 9 - Issue 3, March 2020
Back