Review Article
[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
Table 8
The summary of the data-splitting techniques.
| Splitting techniques | References | Operations supported | Usability | Privacy |
| Byte level splitting | [113] | Storage and retrieval | Useful for binary files. Provides week data privacy | Provides a low level of privacy | Privacy level splitting | [114] | Storage and retrieval | Used for sensitive data. Provides strong protection | Fragments stored on the trusted locations. Provides a high level of privacy | Byte level splitting with replication | [115] | Storage and retrieval | Provides fast retrieval | Data duplication provides low levels of privacy. | Byte level splitting with encryption | [116, 117] | Storage and retrieval | Provides very strong protection | Ciphertext provides a very high level of privacy | Vertical splitting | [118–122] | Storage, retrieval, search, computation | Useful for structural data | Provides a low level of privacy |
|
|