CFP last date
20 January 2025
Reseach Article

Enhancing File Transfer Security and Efficiency through Compression, Fragmentation and Reassembling Techniques

by Ngbede Barnabas Michael, Karim Usman
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 39
Year of Publication: 2024
Authors: Ngbede Barnabas Michael, Karim Usman
10.5120/ijca2024923973

Ngbede Barnabas Michael, Karim Usman . Enhancing File Transfer Security and Efficiency through Compression, Fragmentation and Reassembling Techniques. International Journal of Computer Applications. 186, 39 ( Sep 2024), 28-39. DOI=10.5120/ijca2024923973

@article{ 10.5120/ijca2024923973,
author = { Ngbede Barnabas Michael, Karim Usman },
title = { Enhancing File Transfer Security and Efficiency through Compression, Fragmentation and Reassembling Techniques },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2024 },
volume = { 186 },
number = { 39 },
month = { Sep },
year = { 2024 },
issn = { 0975-8887 },
pages = { 28-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number39/enhancing-file-transfer-security-and-efficiency-through-compression-fragmentation-and-reassembling-techniques/ },
doi = { 10.5120/ijca2024923973 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-09-27T00:46:13.145864+05:30
%A Ngbede Barnabas Michael
%A Karim Usman
%T Enhancing File Transfer Security and Efficiency through Compression, Fragmentation and Reassembling Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 39
%P 28-39
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The transfer of digital files faces significant challenges, including security vulnerabilities, interruptions during transmission, and variable transfer speeds. This research investigates a robust mechanism to enhance file security during transmission, minimize completion times, and ensure the swift transfer of data in unreliable service environments. The proposed approach involves the encryption and compression of file content, fragmentation of the compressed files, and reassembly, as well as decompression of the sub-files upon transmission. Additionally, this method leverages the secure transmission capabilities of the File Transfer Protocol (FTP) to protect sensitive information transmitted over the internet. A Java Enterprise Application was developed to implement this method, and seven different file formats, each with a size of 10MB, were tested to evaluate system performance. Key performance metrics recorded included the execution time for compression, fragmentation, reassembly, and decompression, the size of the compressed files, and the number of fragments post-compression. The results indicated that performance metrics varied depending on the file format, with optimal performance observed for text-based files. Consequently, the developed system is recommended for secure file sharing over the web, particularly for confidential or security-sensitive data files.

References
  1. Rb, M., Chhetri, S., Kc, A., & Jain, H. (2021). Secure File Storage & Sharing on Cloud Using Cryptography. International Journal of Computer Science and Mobile Computing, 10(5), 49–59. https://doi.org/10.47760/ijcsmc.2021.v10i05.005
  2. Carpentieri, B. (2018). Efficient Compression and Encryption for Digital Data Transmission. Security and Communication Networks, 2018, 1–9. https://doi.org/10.1155/2018/9591768
  3. [3] Toradmalle, D., Muthukuru, J., Sathyanarayana, B., & Sri Krishnadevaraya (2019). Compression Techniques: Key to Effective Data Transmission. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 3179–3181. https://doi.org/10.35940/ijrte.C4906.098319
  4. Chidambaram, N., Vineela, K., Jebin, M. J., Balaji, J., & Raj, P. (2018). Fortified File Transfer Framework—A TranSecure Model. 2018 International Conference on Computer Communication and Informatics (ICCCI), 1–6. https://doi.org/10.1109/ICCCI.2018.8441210
  5. Kausar, S., Habib, M., Shabir, M. Y., Ullah, A., Xu, H., Mehmood, R., Bie, R., & Iqbal, M. S. (2020). Secure and efficient data transfer using spreading and assimilation in MANET. Software: Practice and Experience, 50(11), 2095–2109. https://doi.org/10.1002/spe.2782
  6. Verma, S., Kapoor, V., & Maheshwari, R. (2019). An Enhanced Cryptographic System for Fast and Efficient Data Transmission. In R. Kamal, M. Henshaw, & P. S. Nair (Eds.), International Conference on Advanced Computing Networking and Informatics (Vol. 870, pp. 287–297). Springer Singapore. https://doi.org/10.1007/978-981-13-2673-8_31
  7. Aamo Iorliam & Harold Kpojime (2019). Computer Security. Department of Mathematics and Computer Science, Benue State University, Makurdi, Nigeria.
  8. Jaradat, Abdel-Rahman & Abbadi, Mansour & Nassar, Talha. (2006). A File Splitting Technique for Reducing the Entropy of Text Files. World Academy of Science, Engineering and Technology.
  9. Anandabrata Pal, Husrev T. Sencar, Nasir Memon (2008): Detecting file fragmentation point using sequential hypothesis testing. Digital Investigation 5 (2008) S2–S13
  10. File Transfer Protocol, Wikipedia, https://en.wikipedia.org/wiki/File_Transfer_Protocol [accessed 03/02/2021].
  11. H.C.G Leitao & J. Stolfi (2000): A Multi-Scale method for the reassembly of fragmented objects. Proc. British Machine Vision Conference – BMVC 2:705 – 714
  12. Ian Sommerville (2016): Software Engineering. 10th Edition, Pearson Education Limited, Edinburgh Gate, England, PP:169.
  13. Jayakrishnan Nair, Martin Andreasson (2014): On Channel Failures, File Fragmentation Policies, and Heavy-Tailed Completion Times. IEEE/ACM Transactions on Networking
  14. Karim Usman, Hyacinth C. Inyiama & Risikatu Karim (2019): Securing remote backup files from a man in the middle attacks by using encryption and compression mechanisms. International Journal of Advanced Studies in Computer Science and Engineering, Volume 8, Issue 3.
  15. Muhanad Hayder (2009): Design and implementation of a file splitter and merger software. Journal of Kerbala University, Vol. 7 No. 4 Scientific.
  16. Shanmugasundaram, Kulesh & Memon, Nasir. (2003). Automatic Reassembly of Document Fragments via Context Based Statistical Models. Department of Computer and Information Science, Polytechnic University, Brooklyn, New York 11201.
  17. Suchita Tayde & Seema Siledar (2015): File Encryption, Decryption Using AES Algorithm in Android Phone. International Journal of Advanced Research in Computer Science and Software Engineering. Volume 5, Issue 5.
Index Terms

Computer Science
Information Sciences
Cryptography
Cybersecurity
File Transfer Protocol
Compression
Fragmentation
Reassembling
Decompression

Keywords

File Transfer File Security Throughput File Fragment File Security