2018
DOI: 10.1007/978-3-319-92231-7_1
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Security on Cloud Servers Using Data Fragmentation Technique and NoSQL Database

Abstract: Cloud computing has become so popular that most sensitive data are hosted on the cloud. This fast-growing paradigm has brought along many problems, including the security and integrity of the data, where users rely entirely on the providers to secure their data. This paper investigates the use of the pattern fragmentation to split data into chunks before storing it in the cloud, by comparing the performance on two different cloud providers. In addition, it proposes a novel approach combining a pattern fragment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The most used fragmentation in the analyzed works is the horizontal one. The “Other” category shows the number of articles that use a type of fragmentation that is not any of the other three, such as the fragmentation of documents in [ 82 , 83 , 84 , 85 , 86 , 87 ], fragmentation of videos in [ 88 ], grid fragmentation in [ 95 ], among others. Of the papers that addressed horizontal fragmentation, 4 also included CBIR ([ 1 , 40 , 41 , 49 ]).…”
Section: Classification Of Research Papersmentioning
confidence: 99%
See 1 more Smart Citation
“…The most used fragmentation in the analyzed works is the horizontal one. The “Other” category shows the number of articles that use a type of fragmentation that is not any of the other three, such as the fragmentation of documents in [ 82 , 83 , 84 , 85 , 86 , 87 ], fragmentation of videos in [ 88 ], grid fragmentation in [ 95 ], among others. Of the papers that addressed horizontal fragmentation, 4 also included CBIR ([ 1 , 40 , 41 , 49 ]).…”
Section: Classification Of Research Papersmentioning
confidence: 99%
“…In [ 86 ], Santos & Masala proposed a novel approach that combines a pattern fragmentation technique with a NoSQL database to organize and manage fragments. The experiments were carried out at different cloud service providers and three types of files were used, docx, jpg, and pdf, all with 100 kb in size.…”
Section: Description Of the Set Of Work By Categorymentioning
confidence: 99%
“…di Vimercati et al [6] presents the model for Data Confidentiality in cloud data using fragmentation and encryption techniques. The symmetric encryption is adopted for uploaded data in cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Only the clients had access to the decryption keys making it is difficult for the attackers to get the data. The work presented in [11] [15]proposed a new technique to fragment the original file to chunks, they used random pattern fragmentation for splitting data, each split file had the same length as the associated pattern. Moreover, the aim of using this method is to protect the data from attackers, as the attackers do not know the information about the length of each split data, therefore, they cannot get the data.…”
Section: Literature Reviewmentioning
confidence: 99%