scholarly journals PENYIMPANAN DATA BERBASIS CLOUD SEBAGAI MITIGASI BENCANA KERUSAKAN DATA

2015 ◽  
Vol 6 (2) ◽  
pp. 249
Author(s):  
Asril Basry

ABSTRAK Mitigasi dalam mengurangi risiko kerusakan data dimana bencana yang dimaksud seperti terjadi kebakaran , bencana alam , perang dll sehingga dapat menyebabkan kerusakan pada infrastruktur teknologi informasi dalam hal ini adalah media penyimpanan data. Salah satu strategi yang dilakukan suatu perusahaan adalah membuat perencanaan mitigasi kerusakan dengan memanfaatkan teknologi penyimpanan data yang berbasiskan cloud. Adapun cloud storage merupakan salah satu bagian dari cloud computing yang dilakukan oleh pihak penyedia layanan ini atau internet provider. Perusahaan harus memiliki strategi penyimpanan data berbasiskan cloud dengan menyalin atau back up data kedalam cloud storage dengan diupdate atau dimutakhirkan secara berkala sehingga jika suatu kondisi terjadi bencana yang menyebabkan tidak berfungsinya fasilitas dan infrastruktur teknologi informasi dalam hal ini media penyimpanan data ( data storage ) , maka perusahan dapat melanjutkan pengolahan data dengan menggunakan data yang disimpan dalam penyimpanan data yang berbasiskan cloud, adapun dalam penyimpanan data yang berbasiskan cloud tetap menjamin terhadap keamanan dan kerahasian data perusahaan. Kata kunci: mitigasi, strategi, pemulihan, bencana, penyimpanan awan, keamanan.

2021 ◽  
pp. 20-32
Author(s):  
admin admin ◽  

Recently, the security of heterogeneous multimedia data becomes a very critical issue, substantially with the proliferation of multimedia data and applications. Cloud computing is the hidden back-end for storing heterogeneous multimedia data. Notwithstanding that using cloud storage is indispensable, but the remote storage servers are untrusted. Therefore, one of the most critical challenges is securing multimedia data storage and retrieval from the untrusted cloud servers. This paper applies a Shamir Secrete-Sharing scheme and integrates with cloud computing to guarantee efficiency and security for sensitive multimedia data storage and retrieval. The proposed scheme can fully support the comprehensive and multilevel security control requirements for the cloud-hosted multimedia data and applications. In addition, our scheme is also based on a source transformation that provides powerful mutual interdependence in its encrypted representation—the Share Generator slices and encrypts the multimedia data before sending it to the cloud storage. The extensive experimental evaluation on various configurations confirmed the effectiveness and efficiency of our scheme, which showed excellent performance and compatibility with several implementation strategies.


2015 ◽  
pp. 1432-1449
Author(s):  
M. Sundaresan ◽  
D. Boopathy

Cloud storage systems can be considered to be a network of distributed datacenters that typically use cloud computing technology like virtualization and offer some kind of interface for storing data. To increase the availability of the data, it may be redundantly stored at different locations. Basic cloud storage is generally not designed to be accessed directly by users but rather incorporated into custom software using API. Cloud computing involves other processes besides storage. In this chapter, the authors discuss different viewpoints for cloud computing from the user, legal, security, and service provider perspectives. From the user viewpoint, the stored data creates a mirror of currently available local data. The backup feature allows users to recover any version of a previously stored data. Synchronization is the process of establishing consistency among the stored data. From the legal viewpoint, provisions regulating the user processing and storage of the data must have to be constant from when the data is stored in the cloud. The security viewpoint requires interaction with the Web application, data storage, and transmission. The service provider viewpoint requires the maximum level of cloud storage service at the minimum cost.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


2013 ◽  
Vol 756-759 ◽  
pp. 1275-1279
Author(s):  
Lin Na Huang ◽  
Feng Hua Liu

Cloud storage of high performance is the basic condition for cloud computing. This article introduces the concept and advantage of cloud storage, discusses the infrastructure of cloud storage system as well as the architecture of cloud data storage, researches the details about the design of Distributed File System within cloud data storage, at the same time, puts forward different developing strategies for the enterprises according to the different roles that the enterprises are acting as during the developing process of cloud computing.


2020 ◽  
Author(s):  
Anil Kumar G

Cloud computing offers different kind of servicesto the end user, so that end user can store the data and access iton demand where ever they need it. Now days IT industries areoutsourcing their data by storing it remotely in cloud forreducing the load on local storage there by reducing thehardware, software and maintenance cost. In spite of thesebenefits, the major problem with data storage is that there is noguarantee of data consistency and integrity, which has become amajor hurdle for using the services offered by cloud. So thispaper surveys existing schemes that proves data integrity andretrievability.


2005 ◽  
Vol 4 (2) ◽  
pp. 737-741 ◽  
Author(s):  
Amandeep Sidhu ◽  
Supriya Kinger

Cloud Computing is an emerging computing paradigm. It aims to share data, calculations, and service transparently over a scalable network of nodes. Since Cloud computing stores the data and disseminated resources in the open environment. So, the amount of data storage increases quickly. In the cloud storage, load balancing is a key issue. It would consume a lot of cost to maintain load information, since the system is too huge to timely disperse load. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overwhelmed. It helps in optimal utilization of resources and hence in enhancing the performance of the system. A few existing scheduling algorithms can maintain load balancing and provide better strategies through efficient job scheduling and resource allocation techniques as well. In order to gain maximum profits with optimized load balancing algorithms, it is necessary to utilize resources efficiently. This paper discusses some of the existing load balancing algorithms in cloud computing and also their challenges.


2018 ◽  
Vol 19 (4) ◽  
pp. 351-360
Author(s):  
Prabu S ◽  
Gpinath Ganapathy ◽  
Ranjan Goyal

Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment


Repositor ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 165
Author(s):  
Miftakhudin Kusuma Wijaya ◽  
Zamah Sari ◽  
Mahar Faiqurahman

ABSTRAKCloud storage merupakan salah satu bentuk dari cloud computing yang terpusat pada media penyimpanan data. Dalam cloud storage ada kemungkinan yang di alami seperti kehilangan data dengan sekala kecil maupun besar, ataupun tidak dapat di akses sama sekali. Kesalahan yang terjadi akibat bencana alam, kesalahan manusia, ataupun alat yang cukup usang. Dari permasalahan tersebut di lakukan backup dan sinkronisasi data untuk menanggulangi permasalahan yang ada. Replikasi adalah proses yang di gunakan untuk menyalin atau mendistribusikan data dari penyedia layanan ke perangkat backup. Replikasi yang di gunakan ada dua yaitu replikasi database MySql dan replikasi data Rsync, dan untuk menjaga agar cloud storage tetap menyediakan sumber daya untuk pengguna dengan menambahkan metode failover. Failover adalah peralihan dari sebuah perangkat penyedia layanan ke perangkat backup ketika mengalami permasalahan yang tidak di inginkan. Pada penelitian ini akan menjelaskan bagaimana cara membangun dan mengimplementasi infrastruktur cloud storage dengan replikasi untuk backup juga sinkronisasi data dan failover untuk memberikan ketersediaan sumber daya layanan untuk pengguna secara realtime.ABSTRACTCloud storage is one form of cloud computing but is centered on data storage media. In cloud storage there is the possibility of data loss with small or large scale or can not be accessed at all. It can happen from natural disasters, human error, or device oldness. From these problems we can do data backup and data synchronization to overcome these problems. Replication is a process that used to copy or distribute data from service providers to backup devices. This replication using two ways, there is replication database using MySql and data replication using Rsync. To keep cloud storage provide resource for user by adding failover. This failover is a transition from a service provider device when having problems to backup device. In this study will explain how to build and implementation cloud storage infrastructure with replication for backup as well as data synchronization and failover to provide real-time availability of service resources for users.


2013 ◽  
Vol 443 ◽  
pp. 477-481
Author(s):  
Kai Song

Cloud storage, data storage means occurring in recent years is based on cloud computing technology. It is the inevitable trend of data storage in the future. The article describes the definition and characteristics of cloud computing and design a generic cloud computing architecture, given its storage technology for cloud computing, cloud storage system architecture model. At last, the paper prospects the tendency of cloud computing and its storage technology.


Author(s):  
M. Sundaresan ◽  
D. Boopathy

Cloud storage systems can be considered to be a network of distributed datacenters that typically use cloud computing technology like virtualization and offer some kind of interface for storing data. To increase the availability of the data, it may be redundantly stored at different locations. Basic cloud storage is generally not designed to be accessed directly by users but rather incorporated into custom software using API. Cloud computing involves other processes besides storage. In this chapter, the authors discuss different viewpoints for cloud computing from the user, legal, security, and service provider perspectives. From the user viewpoint, the stored data creates a mirror of currently available local data. The backup feature allows users to recover any version of a previously stored data. Synchronization is the process of establishing consistency among the stored data. From the legal viewpoint, provisions regulating the user processing and storage of the data must have to be constant from when the data is stored in the cloud. The security viewpoint requires interaction with the Web application, data storage, and transmission. The service provider viewpoint requires the maximum level of cloud storage service at the minimum cost.


Sign in / Sign up

Export Citation Format

Share Document