A Review for Data Fragmentation in Cloud Computing

The importance of network security is demonstrated by preserving data from being stolen or tampered with by attackers. The computerized cloud supports the protection of both large and small data as well as authorized remote access. Although its protection is secured in the cloud, it needs to use add...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International Journal of Research in Science and Technology 2022, Vol.12 (3)
Hauptverfasser: Abed, Qays Jabbar, Tawil, Dr. Rami
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The importance of network security is demonstrated by preserving data from being stolen or tampered with by attackers. The computerized cloud supports the protection of both large and small data as well as authorized remote access. Although its protection is secured in the cloud, it needs to use additional methods to enhance data protection from attackers. In this paper, we present the various methods that researchers used to protect data through the computerized cloud, as the diversity in the use of methods led to obtaining good results, albeit to varying degrees. This relieved data fragmentation using multiple technologies and storing it in the cloud, and some used data encryption methods. The aim of this research is to present different types of methods used in the field of data protection across the network via the cloud, which provides an opportunity for researchers to present research that addresses the gaps in order to obtain better results
ISSN:2454-180X
2249-0604
DOI:10.37648/ijrst.v12i03.004