WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

File Fragmentation and Encryption System For Cloud Based Data Storage and Retrieval

Waseem S S

Download Paper

Paper Contents

Abstract

Abstract - As confidentiality and security of data have become the foremost issues with growing popularity of cloud computing, the present study brings a new paradigm of cloud storage that enhances security of the information by splitting each file into different fragments, encrypting them through different crypto algorithms such as AES, RSA, and Blowfish, and dispersing them into multiple alternative cloud providers. By decentralizing storage, the said method precludes a point of failure or illicit access by a single provider. Authenticated access, decryption, and reassembly of file chunks ensure secure recovery. The architecture, methodology, and implementation are defined, followed by performance measures being assessed. Outcomes indicate that this approach offers greater confidentiality, scalability, and strength, thus being appropriate for secure cloud-based data handling in sensitive applications. Introduction-Cloud computing has transformed data storage, availability, and management through unprecedented scalability, flexibility, and affordability; however, as organizations increasingly outsource the management of sensitive data to third-party vendors, there have been concerns with data privacy, unapproved access, and loss of control. Traditional cloud storage infrastructure tends to rely on centralized architecture where entire files are saved as single units and encrypted using provider-managed keys, which brings with them vital weaknesses such as single points of failure and minimal user control over security mechanisms. Sophisticated cyberattacks and system breaches further illustrate the vulnerability of these architectures, particularly their lack of fragmentation and restricted encryption variety, making them desirable targets for attackers. In addition, regulatory requirements for data sovereignty and compliance with privacy exposure increasingly reveal the shortcomings of legacy models, necessitating more user-oriented security architectures. To mitigate such threats, this paper proposes a cloud storage system that is decentralized and features file fragmentation, hybrid encryption using AES, RSA, and Blowfish, and multi-cloud deployment. By breaking files into partial pieces, encrypting them with various algorithms, and scattering them across different independent cloud providers, the proposed system renders any single provider unable to break through the entire data set. Further, dispersing encrypted fragments over geographically remote clouds introduces redundancy, reduces threats of localized failure, and strengthens data resilience. This multilayered security approach enhances confidentiality, integrity, and availability, making unauthorized reconstruction of data practically impossible and offering a solid backup best applied to industries like banking, healthcare, and government where data protection is paramount. Other than this, the decentralized approach also facilitates data sovereignty compliance at an on-premises level by facilitating organizations to maintain ownership of where their data is being processed and stored, meeting some regulatory mandates. By facilitating fine-grained access and including continuous monitoring, the system also makes its security more resilient against ever newer cyber threats, allowing users to gain a higher sense of trust and security.

Copyright

Copyright © 2025 Waseem S. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS50400119687
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us