scholarly journals Study on Disaster Recovery in Cloud Environment

2018 ◽  
Vol 7 (2.32) ◽  
pp. 100
Author(s):  
Dr K.Ravindranath ◽  
N Raghupriya ◽  
P Krishna Vamsi ◽  
D Sharath Kumar

In Today's world information been produced in huge sum, which requires data recovery assistance. The cloud service providers give security to the client  regardless  of  the  possibility  that systems are down, because of disaster. A lot of private information is produced which is put away in cloud. In this manner, the need for recovery of data services are developing in an order and needs an advancement of an well-organized powerful data rescue strategies, when  information is lost in a disaster. The motivation behind recovery strategy to support client from gathering data from any alternate server whenever that server lost information and incapable to provide information to the client. On the way to accomplish the reason, numerous diverse procedures have been proposed. In circumstances like Flood, Fire, seismic tremors or any equipment glitch or any accidental deletion of information may never again remain accessible. The target of this recovery is to condense the intense data recovery procedures that are utilized as a part of cloud computing area. It additionally describes the cloud-based disaster recovery stages and recognize open issues identified with disaster recovery. 

2014 ◽  
Vol 7 (4) ◽  
pp. 39 ◽  
Author(s):  
Mohammad Ali Khoshkholghi ◽  
Azizol Abdullah ◽  
Rohaya Latip ◽  
Shamala Subramaniam ◽  
Mohamed Othman

Disaster recovery is a persistent problem in IT platforms. This problem is more crucial in cloud computing, because Cloud Service Providers (CSPs) have to provide the services to their customers even if the data center is down, due to a disaster. In the past few years, researchers have shown interest to disaster recovery using cloud computing, and a considerable amount of literature has been published in this area. However, to the best of our knowledge, there is a lack of precise survey for detailed analysis of cloud-based disaster recovery. To fill this gap, this paper provides an extensive survey of disaster recovery concepts and research in the cloud environments. We present different taxonomy of disaster recovery mechanisms, main challenges and proposed solutions. We also describe the cloud-based disaster recovery platforms and identify open issues related to disaster recovery.


2020 ◽  
Vol 12 (1) ◽  
pp. 50-55
Author(s):  
Mohammed Anwar ◽  
Abed Salman

Cloud computing is a powerful computing paradigm that provides a variety of computing services to its users. An example is storage, which allows individuals and enterprises to outsource their files to remote storage. However, saving private information onto third-party storage increases the security issues of data and privacy protection concerns. For this reason, cloud service providers (CSPs) are required to save an encrypted version of user data. In this paper, a novel encryption technique based on the use of Fully Homomorphic Encryption is presented. The technique uses a superincreasing sequence to derive the key and works on encrypted data with no need for decryption; this yields the same results as performing it on plaintext data. In the proposed technique, the characters are converted to their corresponding ASCII code values, which differs from the binary values produced by other existing techniques.


2019 ◽  
Vol 1 ◽  
pp. 238-246
Author(s):  
U Karim ◽  
H C Inyiama ◽  
R Karim

In a world of interdependent economies and online transactions, a large volume of data hosted on the cyberspace a daily bases. Cyber threats and attacks are steadily increasing. Most time, these threats and attacks are targeted at service providers but service users are greatly affected by the attacks due to their vulnerability level. When disasters knockdown the infrastructures of a single service provider, it will have ripple effects on thousands of innocent service users. Therefore, service users need more than ever to prepare for major crises targeted at their service providers. To cope with this trends, every service user requires an independent business continuity plan (BCP) or disaster recovery plan (DRP) and data backup policy which falls within their cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO). The aim of this paper is to develop a model for a user-centric disaster recovery system to enable service users to independently develop their data backup policies that best suits their remote databases, and host same as a cloud service deployable on public cloud for users to subscribe to and be billed on pay-as-you-go billing model. The system developed is highly compatible with MYSQL, MSSQL and Oracle databases. A combination of Dynamic System Development Methodology (DSDM) and Object- Oriented Analysis and Design Methodology (OOADM) were used to design the system while Java Enterprise Edition (JEE) is used to develop the system. The encryption and compression mechanisms of the system were tested with various sizes of backup files ranging from 64 Kb to 20Mb and several performance metrics such as (1) Encryption time; (2) Compression size; (3) CPU clock cycles and battery power are compared and analysed with some well-known encryption and compression algorithms.


Author(s):  
K. S. Sakunthala Prabha, Et. al.

Disaster recovery is a diligent issue in IT business. This issue is progressively significant in cloud computing, since Cloud Service Providers (CSPs) are bound to provide all facilities to their clients regardless of whether the server farm is down, because of a disaster. During the disaster, the data may be lost. To overcome this problem, replication is generated for each input data. The main objective of this paper is to upload different data on optimal location of cloud. The proposed system consists of three modules, namely, replica generation; choose optimal location and recovery process. Initially, to avoid the data loss, the input data are replicated. After replication process, the data are stored on cloud with the help of oppositional gravitational search algorithm (OGSA) which then retrieves only the request based data. Hence, we could avoid the data loss due to disaster. The presentation of proposed methodology is analyzed by different metrics comparing with various methods.


2018 ◽  
Vol 33 (3) ◽  
pp. 93-115 ◽  
Author(s):  
Lei Gao ◽  
Alisa G. Brink

ABSTRACT Cloud computing is increasingly popular across all sectors and offers users unparalleled scalability, elasticity, and flexibility. However, the rapid transition toward cloud computing has raised privacy and confidentiality concerns. Cloud service providers can access users' data, and private information may be accidentally or deliberately disclosed or used for unauthorized purposes. Privacy policies are intended to provide users with information about privacy practices and their privacy options. This study performs content analysis of the privacy policies of 47 cloud service providers who offer services to business users. This analysis identifies what information is collected and why, to whom the information is disclosed, and what measures are in place for data security, data retention, and data complaints. Additionally, we investigate the readability, uncertainty language, and linguistic tone of cloud service privacy policies. Our results offer implications for cloud service users, providers, and policymakers, and provide directions for future research. Data Availability: Data are available upon request.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


2020 ◽  
Vol 63 (8) ◽  
pp. 1216-1230 ◽  
Author(s):  
Wei Guo ◽  
Sujuan Qin ◽  
Jun Lu ◽  
Fei Gao ◽  
Zhengping Jin ◽  
...  

Abstract For a high level of data availability and reliability, a common strategy for cloud service providers is to rely on replication, i.e. storing several replicas onto different servers. To provide cloud users with a strong guarantee that all replicas required by them are actually stored, many multi-replica integrity auditing schemes were proposed. However, most existing solutions are not resource economical since users need to create and upload replicas of their files by themselves. A multi-replica solution called Mirror is presented to overcome the problems, but we find that it is vulnerable to storage saving attack, by which a dishonest provider can considerably save storage costs compared to the costs of storing all the replicas honestly—while still can pass any challenge successfully. In addition, we also find that Mirror is easily subject to substitution attack and forgery attack, which pose new security risks for cloud users. To address the problems, we propose some simple yet effective countermeasures and an improved proofs of retrievability and replication scheme, which can resist the aforesaid attacks and maintain the advantages of Mirror, such as economical bandwidth and efficient verification. Experimental results show that our scheme exhibits comparable performance with Mirror while achieving high security.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 563
Author(s):  
Babu Rajendiran ◽  
Jayashree Kanniappan

Nowadays, many business organizations are operating on the cloud environment in order to diminish their operating costs and to select the best service from many cloud providers. The increasing number of Cloud Services available on the market encourages the cloud consumer to be conscious in selecting the most apt Cloud Service Provider that satisfies functionality, as well as QoS parameters. Many disciplines of computer-based applications use standardized ontology to represent information in their fields that indicate the necessity of an ontology-based representation. The proposed generic model can help service consumers to identify QoS parameters interrelations in the cloud services selection ontology during run-time, and for service providers to enhance their business by interpreting the various relations. The ontology has been developed using the intended attributes of QoS from various service providers. A generic model has been developed and it is tested with the developed ontology.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


Sign in / Sign up

Export Citation Format

Share Document