Show simple item record

dc.contributor.authorSantos, N
dc.contributor.authorLentini, S
dc.contributor.authorGrosso, E
dc.contributor.authorGhita, B
dc.contributor.authormasala, giovanni
dc.date.accessioned2020-02-10T12:33:04Z
dc.date.available2020-02-10T12:33:04Z
dc.date.issued2019-01-01
dc.identifier.issn1741-847X
dc.identifier.issn1741-8488
dc.identifier.other4
dc.identifier.urihttp://hdl.handle.net/10026.1/15370
dc.description.abstract

The advancements in virtualisation and distributed computing have allowed the cloud paradigm to become very popular among users and resources. It allows companies to save costs on infrastructure and maintenance and to focus on the development of products. However, this fast-growing paradigm has brought along some concerns from users, such as the integrity and security of the data, particularly in environments where users rely entirely on providers to secure their data. This paper explores different techniques to fragment data on the cloud and prevent direct unauthorised access to the data. It explores their performance on a cloud instance, where the total time to perform the operation, including the upload and download of the data, is considered. Results from this experiment indicate that fragmentation algorithms show better performance compared to encryption. Moreover, when combining encryption with fragmentation, there is an increase in the security, with the trade-off of the performance.

dc.format.extent392-401
dc.language.isoen
dc.titlePerformance analysis of data fragmentation techniques on a cloud server
dc.typejournal-article
dc.typeJournal Article
plymouth.issue4
plymouth.volume10
plymouth.publication-statusPublished
plymouth.journalInternational Journal of Grid and Utility Computing
dc.identifier.doi10.1504/IJGUC.2019.100902
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2019-01-01
dc.rights.embargodate2022-1-25
dc.identifier.eissn1741-8488
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1504/IJGUC.2019.100902
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2019-01-01
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV