Improving Data Security in Cloud Computing Using Data Fragmentation

Authors

  • Mr. Mahesh J. Kanase Lecturer, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author
  • Bhagyashri A. Alase Students, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author
  • Vrushali V. Chougule Students, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author
  • Pranjali S. Dhobale Students, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author
  • Tabasum M. Nadaf Students, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author
  • Nilambika R. Naikwade Students, Department of Computer Science and Engineering, DKTE’s Yashwantrao Chavan Polytechnic Ichalkaranji, Maharashtra, India Author

DOI:

https://doi.org/10.32628/IJSRST25121192

Keywords:

Cloud Computing, Data Security, Data Fragmentation, Encryption, Secure Data Distribution

Abstract

Cloud computing has revolutionized data storage and processing by offering scalability, flexibility, and cost efficiency. However, it introduces significant security challenges, particularly concerning data privacy and protection against unauthorized access. Traditional encryption methods, while effective, are not always sufficient to mitigate sophisticated attacks such as data breaches or insider threats. Data fragmentation emerges as a robust supplementary approach to enhance data security in cloud environments. This paper explores the concept of data fragmentation, which involves dividing data into smaller fragments and distributing them across multiple storage nodes or regions. By storing fragmented data in disparate locations and combining it with encryption, the risk of unauthorized data access is significantly reduced. Even if one fragment is compromised, the attacker cannot reconstruct meaningful information without access to all fragments and decryption keys.

Downloads

Download data is not yet available.

References

https://ieeexplore.ieee.org/document/8079737

https://www.researchgate.net/publication/236136013_Data_C onfidentiality_using_Fragmentation_in_Cloud_Computing

https://arxiv.org/abs/1804.01886

https://arxiv.org/abs/1707.00445

https://www.kohezion.com/blog/data-fragmentation

J. Smith and M. Johnson, ―Data Fragmentation Techniques for Secure Cloud Storage,‖ in Advanced Cloud Security Strategies, 2nd ed. New York, USA: Springer, 2020.

A. Kumar and B. Patel. 2021. ―Enhancing Cloud Security with Data Fragmentation and Multi-Cloud Storage,‖ International Journal of Scientific Research in Science, Engineering and Technology, (Dec 2021), ISSN NO: 2349- XXXX, DOI:10.2514/XXXX.

S. S. Al-Riyami and M. S. Khan, ―Improving Database Security in Cloud Computing by Fragmentation and Encryption,‖ in Proceedings of the 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, UAE, Nov. 2017,pp. 1–5. DOI: 10.1109/ICECTA.2017.8252043.

R. K. Sharma and P. K. Suri, ―Secure and Efficient Data Storage in Cloud ComputingUsing Data Fragmentation and Encryption,‖ in Cloud Computing Security Solutions, 1st ed. New York,USA: Wiley, 2019.

M. A. Shah, S. Shah, and R. S. S., ―Data Security and Privacy in Cloud Computing,‖ in Cloud Computing: Challenges and Security Issues, 1st ed. London, UK: Springer, 2018.

Downloads

Published

13-02-2025

Issue

Section

Research Articles

How to Cite

Improving Data Security in Cloud Computing Using Data Fragmentation. (2025). International Journal of Scientific Research in Science and Technology, 12(1), 591-596. https://doi.org/10.32628/IJSRST25121192

Most read articles by the same author(s)

Similar Articles

1-10 of 219

You may also start an advanced similarity search for this article.