J. Fabre, Y. Deswarte, B. Randall, and B. R. , Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach, 1992.
DOI : 10.1007/978-3-642-79789-7_11

J. C. Fabre and T. Perennou, Fragmentation of confidential objects for data processing security in distributed systems, Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, pp.395-403, 1995.

G. R. Ganger, P. K. Khosla, M. Bakkaloglu, M. W. Bigrigg, G. R. Goodson et al., Survivable storage systems
DOI : 10.1109/discex.2001.932171

, DARPA Information Survivability Conference amp; Exposition II, 2001. DISCEX '01. Proceedings, vol.2, pp.184-195, 2001.

P. Grubbs, T. Ristenpart, and V. Shmatikov, Why your encrypted database is not secure, Proceedings of the 16th Workshop on Hot Topics in Operating Systems, HotOS '17, pp.162-168, 2017.
DOI : 10.1145/3102980.3103007

Q. Han, An efficient data protection architecture based on fragmentation and encryption, 2018.

S. +-13]-aleksandar-hudic, P. Islam, S. Kieseberg, E. R. Rennert, and . Weippl, Data confidentiality using

G. Memmi, K. Kapusta, and H. Qiu, Data protection: Combining fragmentation, encryption, and dispersion, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), pp.1-9, 2015.
DOI : 10.1109/ssic.2015.7245680

URL : https://hal.archives-ouvertes.fr/hal-01212158

, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory, 2011.

J. Bohli, P. Papadimitratos, D. Verardi, and D. Westhoff, Resilient data aggregation for unattended wsns, 2011 IEEE 36th Conference on Local Computer Networks, pp.994-1002, 2011.
DOI : 10.1109/lcn.2011.6114411

C. Castelluccia, E. Mykletun, and G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp.109-117, 2005.

R. Di-pietro, L. V. Mancini, C. Soriene, A. Spognardi, and G. Tsudik, Catch me (if you can): Data survival in unattended sensor networks, Sixth Annual IEEE International Conference on Pervasive Computing and Communications, pp.185-194, 2008.

L. V. Dpms-+-09]-roberto-di-pietro, C. Mancini, A. Soriente, G. Spognardi, and . Tsudik, Data security in unattended wireless sensor networks, IEEE Trans. Comput, vol.58, issue.11, pp.1500-1511, 2009.

R. Di, P. , and N. Vincenzo-verde, Epidemic data survivability in unattended wireless sensor networks, Proceedings of the Fourth ACM Conference on Wireless Network Security, WiSec '11, pp.11-22, 2011.

D. De, O. Gonçalves, and D. G. Costa, A survey of image security in wireless sensor networks, Journal of Imaging, vol.1, issue.1, pp.4-30, 2015.

K. Kapusta, G. Memmi, and H. Noura, Secure and resilient scheme for data protection in unattended wireless sensor networks, 1st Cyber Security in Networking Conference, pp.1-8, 2017.

H. Krawczyk, Secret sharing made short, Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO '93, pp.136-146, 1994.

M. O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, vol.36, issue.2, pp.335-348, 1989.

P. Di, S. Roberto, and . Guarino, Data confidentiality and availability via secret sharing and node mobility in uwsn, 2013 Proceedings IEEE INFOCOM, pp.205-209, 2013.

Y. Ren, V. Oleshchuk, and F. Y. Li, A distributed data storage and retrieval scheme in unattended wsns using homomorphic encryption and secret sharing, 2nd IFIP Wireless Days (WD), pp.1-6, 2009.

Y. Ren, V. Oleshchuk, and F. Y. Li, Secure and efficient data storage in unattended wireless sensor networks, 3rd International Conference on New Technologies, Mobility and Security, pp.1-5, 2009.

W. Ren, Y. Ren, and H. Zhang, Hybrids: A scheme for secure distributed data storage in wsns, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, vol.2, pp.318-323, 2008.

A. Shamir, How to share a secret, Commun. ACM, vol.22, issue.11, pp.612-613, 1979.

Q. Wang, K. Ren, W. Lou, and Y. Zhang, Dependable and secure sensor data storage with dynamic integrity assurance, IEEE INFOCOM 2009, pp.954-962, 2009.

D. Bibliography, D. Archer, S. Bogdanov, S. Boldyreva, F. Kamara et al., Future directions in computing on encrypted data, 2015.

A. Bessani, M. Correia, B. Quaresma, F. André, and P. Sousa, Depsky: Dependable and secure storage in a cloud-of-clouds, + 13, vol.9, p.33, 2013.

. Bdcdvf-+-16]-enrico, S. Bacis, S. De-capitani-di-vimercati, S. Foresti, M. Paraboschi et al., Mix&slice: Efficient access revocation in the cloud, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS '16, pp.217-228, 2016.

D. Kevin, A. Bowers, A. Juels, and . Oprea, Hail: A highavailability and integrity layer for cloud storage, Proceedings of the 16th ACM conference on Computer and communications security, pp.187-198, 2009.

H. Choi, Y. Ko, and K. Lim, Energy-aware distribution of data fragments in unattended wireless sensor networks, Proceedings of the Third International Conference on Security of Smart Cities, Industrial Control System and Communications, SSIC '18, 2018.

C. Gentry, ;. Lim, K. Kapusta, G. Memmi, and W. Jung, Multi-hop data fragmentation in unattended wireless sensor networks, Submitted to the International Conference on Information Processing in Sensor Networks (IPSN 2019), 2009.

C. Cachin, Entropy measures and unconditional security in cryptography, 1997.

W. G. Cochran, The ? 2 test of goodness of fit, Ann. Math. Statist, vol.23, issue.3, p.1952

L. Joseph, A. W. Rodgers, and . Nicewander, Thirteen Ways to Look at the Correlation Coefficient, The American Statistician, vol.42, issue.1, pp.59-66, 1988.

K. Lim, K. Kapusta, G. Memmi, and W. Jung, Multi-hop Data Fragmentation in Unattended Wireless Sensor Networks, the International Conference on Information Processing in Sensor Networks (IPSN), 2019.

K. Kapusta and G. Memmi, POSTER: CAON:A Very Fast Scheme to Protect Encrypted Data against Key Exposure, ACM Conference on Computer and Communications Security (CCS), 2018.

K. Kapusta and G. Memmi, Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key Exposure. 10th International Symposium on Cyberspace Safety and Security (CSS), 2018.
DOI : 10.1007/978-3-030-01689-0_15

K. Kapusta and G. Memmi, A Fast and Scalable Fragmentation Algorithm for Data Protection Using Multi-storage over Independent Locations, Security and Trust Management (STM, Esorics' workshop), 2018.

K. Kapusta and G. Memmi, Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted Data, 2018.

K. Kapusta, G. Memmi, and H. Noura, Secure and resilient scheme for data protection in unattended wireless sensor networks, 1st Cyber Security in Networking Conference (CSNet), 2017.

K. Kapusta, G. Memmi, and H. Noura, POSTER: A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation, ACM Conference on Computer and Communications Security (CCS), 2016.

K. Kapusta and G. Memmi, Data protection by means of fragmentation in distributed storage systems, International Conference on Protocol Engineering and International Conference on New Technologies of Distributed Systems (ICPE/NTDS), 2015.

G. Memmi, K. Kapusta, P. Lambein, and H. Qiu, Talks: 1. Accelerating all-or-nothing transforms, Data Protection: Combining Fragmentation, Encryption, and Dispersion, ITEA2-CAP WP3 Final Report, 2016.

, Secure Data Fragmentation and Dispersal, 2018.

, A Keyless Efficient Algorithm for Data Protection by Means of Fragmentation, SnT, 2017.

, Poster presentation) Fragmentation for data protection, The International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2016.

, Recherche sur la Protection des Données par Fragmentation, Nathalie ENFRIN, professional thesis, 6 months, 2018.

G. Alexandre, B. Matteo, and P. , Protection des données dans les réseaux de capteurs de type UWSN, 2018.

C. Yohan, C. Gauthier, and A. Urban, Protection des données dans les environnements distribués (Cloud), 2017.

B. Selim, . Amar, B. Abdessalam, F. Faycal, O. Cedric et al., 13 (Selective All-or-nothing) Pseudo-code of the linear all-or-nothing transform applied to the share SHARE 11, Protection des données dans les environnements distribués (Cloud), vol.3, p.138

, 14 (Selective All-or-nothing) Dispersing private and public fragments

, 15 (Selective All-or-nothing) Performance results, p.142

. .. Pe-aon)-pseudo-code, PE-AON) Illustration of the partial encryption and fragmentation of a plaintext, vol.153

. .. , PE-AON) Fragments after applying the all-or-nothing transform, vol.155

, PE-AON) Performance benchmark, vol.4

, 168 5.2 FSFA -Pseudo-code of the function transforming data into fragments

, FSFA) Pseudo-code of the function EncodeAndPermuteBlock, vol.5

, 5 (FSFA) Performance benchmark

. .. , Simplified scheme of the network architecture, p.193

, Storage cost per sensor

, Transmission costs per sensor

. .. , Comparison of two aggregation variants, p.205

. .. Ahef--performance-benchmark, , p.206

A. ;. , 1 Empirical analysis, byte value distribution, p.222

, Probability density function and entropy comparison for different data samples

. .. , 57 2.2 A comparison between relevant bitwise fragmentation techniques in terms of volume of stored data, resilience, and data confidentiality

, 130 4.1 (PE-AON) Complexity comparison with relevant techniques. . 157 5.1 FSFA: Runtime and storage requirements of relevant fragmentation algorithms, Circular All-or-nothing) Comparison with relevant works

, Quantitative analysis of relevant schemes providing data protection inside UWSN, vol.201, p.235