Abstract
Security and privacy are key issues in modern cloud computing. This paper focuses on data fragmentation techniques and it shows how these techniques can impact the global performance of a cloud service. Based on Amazon AWS, different fragmentation techniques are implemented and compared for several different types of file; the comparison is extended to AES encryption techniques in order to better evaluate the system performance and better understand potential effects on the overall security of the system. The presented results can be of great importance in the development of multi cloud and Fragmentation as a Service (FaaS) systems, targeting applications like large scale data mining and management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Velte, A., Velte, T., Elsenpeter, R.: Cloud Computing: A Practical Approach. McGraw-Hill, New York (2010)
Masala, G.L.C., Ruiu, P., Grosso, E.: Biometric authentication and data security in cloud computing. In: Computer and Network Security Essentials, pp. 337–355. Springer (2017)
Li, X., Shen, Y., Zhang, J.: The verifiable secure schemes for resisting attacks in cloud deduplication services. Inter. J. Grid Utility Comp. 7(3), 184–189 (2016)
Hegarty, R., Haggerty, J.: Extrusion detection of illegal files in cloud-based systems. Int. J. Space-Based Situated Comput. (IJSSC) 5(3) (2015)
Hababeh, I.: A novel cloud computing data fragmentation service design for distributed systems. In: 2011 International Conference on Parallel and Distributed Processing Techniques and Applications (2011)
Bahrami, M., Singhal, M.: A light-weight permutation based method for data privacy in mobile cloud computing. In: 3rd IEEE International Conference Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 189–198 (2015)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard (2002)
Memmi, G., Kapusta, K., Lambein, P., Qiu, H.: Data Protection: Combining Fragmentation, Encryption, And Dispersion (ITEA2-CAP WP3 Final Report), November 2016
AWS Amazon. https://aws.amazon.com, update November 2017
Kapusta, K., Memmi, G.: Data protection by means of fragmentation in distributed storage systems. In: International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS) (2015). Télécom ParisTech, CNRS, LTCI, UMR 5141
Gharajedaghi, J.: Systems Thinking: Managing Chaos and Complexity: A Platform for Designing Business Architecture. Elsevier (2011)
Prabhu, M., Paramesha, K.: An approach for efficient utilization of public cloud storage and security data. In: IRJET, May 2017
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Lentini, S., Grosso, E., Masala, G.L. (2018). A Comparison of Data Fragmentation Techniques in Cloud Servers. In: Barolli, L., Xhafa, F., Javaid, N., Spaho, E., Kolici, V. (eds) Advances in Internet, Data & Web Technologies. EIDWT 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 17. Springer, Cham. https://doi.org/10.1007/978-3-319-75928-9_50
Download citation
DOI: https://doi.org/10.1007/978-3-319-75928-9_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-75927-2
Online ISBN: 978-3-319-75928-9
eBook Packages: EngineeringEngineering (R0)