Review Article

[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)

Table 8

The summary of the data-splitting techniques.

Splitting techniquesReferencesOperations supportedUsabilityPrivacy

Byte level splitting[113]Storage and retrievalUseful for binary files. Provides week data privacyProvides a low level of privacy
Privacy level splitting[114]Storage and retrievalUsed for sensitive data. Provides strong protectionFragments stored on the trusted locations. Provides a high level of privacy
Byte level splitting with replication[115]Storage and retrievalProvides fast retrievalData duplication provides low levels of privacy.
Byte level splitting with encryption[116, 117]Storage and retrievalProvides very strong protectionCiphertext provides a very high level of privacy
Vertical splitting[118122]Storage, retrieval, search, computationUseful for structural dataProvides a low level of privacy