Details

A Review for Data Fragmentation in Cloud Computing

Qays Jabbar Abed

Ph. D. Student, High Institute of Technology, Lebanese University, Lebanon

Dr. Rami Tawil

Associate Professor, Faculty of Science Lebanese University, Lebanon

19-23

Vol: 12, Issue: 3, 2022

Receiving Date: 2022-05-20 Acceptance Date:

2022-07-05

Publication Date:

2022-07-21

Download PDF

http://doi.org/10.37648/ijrst.v12i03.004

Abstract

The importance of network security is demonstrated by preserving data from being stolen or tampered with by attackers. The computerized cloud supports the protection of both large and small data as well as authorized remote access. Although its protection is secured in the cloud, it needs to use additional methods to enhance data protection from attackers. In this paper, we present the various methods that researchers used to protect data through the computerized cloud, as the diversity in the use of methods led to obtaining good results, albeit to varying degrees. Which relieved data fragmentation using multiple technologies and storing it in the cloud, and some used data encryption methods. The aim of this research is to present different types of methods used in the field of data protection across the network via the cloud, which provides an opportunity for researchers to present research that addresses the gaps in order to obtain better results.

Keywords: data fragmentation; cloud computing; network security

References

  1. M. Bahrami and M. Singhal, 'The Role of Cloud Computing Architecture in Big Data', Information Granularity Big Data and Computational Intelligence, pp. 275-295, 2015.
  2. Z. Yan, R. Deng and V. Varadharajan, 'Cryptography and Data Security in Cloud Computing', Information Sciences, vol. 387, pp. 53-55, 2017.
  3. Cloud Security Alliance, 'Top Threats to Cloud Computing', CSA, 2010.
  4. P. Kumar, P. Raj and P. Jelciana, 'Exploring Data Security Issues and Solutions in Cloud Computing', Procedia Computer Science, vol. 125, pp. 691-697, 2018.
  5. R. Hegarty and J. Haggerty, 'Extrusion detection of illegal files in cloud-based systems', International Journal of Space-Based and Situated Computing, vol. 5, no. 3, pp. 150, 2015.
  6. Santos, N., Lentini, S., Grosso, E., Ghita, B.V., & Masala, G.L. Performance analysis of data fragmentation techniques on a cloud server. Int. J. Grid Util. Comput., 10, 392-401, 2019.
  7. Lentini, S., Grosso, E., Masala, G.L. A Comparison of Data Fragmentation Techniques in Cloud Servers. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V.(eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. 2018 https://doi.org/10.1007/978-3-319-75928-9_50
  8. Patni, P. D., and S. N. Kakarwal. 'Security Enhancement of Data in Cloud using Fragmentation and Replication.' International Journal of Engineering and Management Research (IJEMR) 6.5 (2016): 492-497.
  9. N. L. Santos, B. Ghita and G. L. Masala, 'Enhancing Data Security in Cloud using Random Pattern Fragmentation and a Distributed NoSQL Database,' 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), 2019, pp. 3735-3740, doi: 10.1109/SMC.2019.8914454.
  10. Hudic, Aleksandar, Shareeful Islam, Peter Kieseberg, Sylvi Rennert, and Edgar R. Weippl. 'Data confidentiality using fragmentation in cloud computing.' International Journal of Pervasive Computing and Communications (2013).
  11. Chavan, Mrs Radhika, and S. Y. Raut. 'Cloud Security Solution: Fragmentation and Replication' International Journal of Advance Research and Innovative Ideas in Education 2, no. 4 (2016).
  12. Kapusta, Katarzyna, and Gerard Memmi. 'A fast fragmentation algorithm for data protection in a multi-cloud environment.' arXiv preprint arXiv:1804.01886 (2018).
  13. D.Suneetha, D.Rathna Kishore, G.G.S.Pradeep. ' Data Security Model Using Artificial Neural Networks and Database Fragmentation in Cloud Environment' International Journal of Recent Technology and Engineering (IJRTE), ISSN: 2277-3878, Volume-8 Issue-2, July 2019.
  14. Archana M, and Mallikarjun Shastry P M, “A Method for Text Data Fragmentation to Provide Security in Cloud Computing.” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-9 Issue-2, December, 2019.
  15. Rabab M.Nabawy, Heba El Beh, Hamdi M. Mousa,' Securing Big Data Using Mixed Fragmentation Based On Multi-Cloud Environment', International Journal of Scientific & Technology Research (IJSTR). Volume 9 - Issue 3, March 2020
Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.