Techniques used to formulate confidential data by means of fragmentation and hybrid encryption


  • Olly Beckham University Of Surrey, Guildford, UK
  • Gord Oldman University Of Surrey, Guildford, UK
  • Julie Karrie University of Huddersfield, Huddersfield, UK
  • Dorth Craig University of Huddersfield, Huddersfield, UK



authorization, cloud computing, novel technology, protection, traditional


Cloud computing is a concept shifting in the approach how computing resources are deployed and purchased. Even though the cloud has a capable, elastic, and consistent design, several security concerns restrain customers to completely accept this novel technology and move from traditional computing to cloud computing. In the article, we aspire to present a form of a novel architectural model for offering protection to numerous cloud service providers with the intention to devise and extend security means for cloud  computing. In this work, we presented a two-tier architecture for security in multi-clouds; one at the client side, and other at the server side. The article presented a security domination outline for multi-clouds and supports security needs like Confidentiality, Integrity, Availability, Authorization, and Non-repudiation for cloud storage. Through this document we have anticipated, HBDaSeC, a secure-computation protocol to ease the challenges of enforcing the protection of data for information security in the cloud.


Download data is not yet available.


Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.

Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A. (2014). VANET security surveys. Computer Communications, 44, 1-13.

Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics, 46(3), 541-562.

Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.

Keshavamurthy, B. N., Toshniwal, D., & Eshwar, B. K. (2012). Hiding co-occurring prioritized sensitive patterns over distributed progressive sequential data streams. Journal of Network and Computer Applications, 35(3), 1116-1129.

Miorandi, D., Sicari, S., De Pellegrini, F., & Chlamtac, I. (2012). Internet of things: Vision, applications and research challenges. Ad hoc networks, 10(7), 1497-1516.

Mokhtar, B., & Azab, M. (2015). Survey on security issues in vehicular ad hoc networks. Alexandria engineering journal, 54(4), 1115-1126.

Mollah, M. B., Azad, M. A. K., & Vasilakos, A. (2017). Security and privacy challenges in mobile cloud computing: Survey and way ahead. Journal of Network and Computer Applications, 84, 38-54.

Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17-31.

Raza, S., Wallgren, L., & Voigt, T. (2013). SVELTE: Real-time intrusion detection in the Internet of Things. Ad hoc networks, 11(8), 2661-2674.

Sobh, T. S. (2006). Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art. Computer Standards & Interfaces, 28(6), 670-694.

Srivastava, S., & Nandi, G. C. (2014). Fragmentation based encryption approach for self protected mobile agent. Journal of King Saud University-Computer and Information Sciences, 26(1), 131-142.

Zissis, D., & Lekkas, D. (2011). Securing e-Government and e-Voting with an open cloud computing architecture. Government Information Quarterly, 28(2), 239-251.



How to Cite

Beckham, O., Oldman, G., Karrie, J., & Craig, D. (2019). Techniques used to formulate confidential data by means of fragmentation and hybrid encryption. International Research Journal of Management, IT and Social Sciences, 6(6), 68-86.



Research Articles