cloud computing in data backup and data recovery

3
International Journ Internat ISSN No: 245 @ IJTSRD | Available Online @ www Cloud Computing Moni Department of Computer Ap ABSTRACT Data backup and Disaster Reco Continuity issues are appropriate essenti since the importance and shared value is continuously rising. Every organiz business continuity plan or disaster reco data backup which reduce within the co while achieving the target recovery re terms of recovery time objective and r objective. The aim of this paper is to various techniques in data backup recovery in the cloud environment. Keyword: Cloud Computing, Disast Replication, Backup, Survey. INTRODUCTION Cloud computing becomes more pop scale computing day by day suitable to to share worldwide distributed resourc access to cloud-based services throug around the world. Backup and recovery method of backing up data in case o setting up systems that allocate to data to data loss. Backing up data requires r archiving computer data, so that it is ea case of data deletion or corruption. previously time may only be recovered backed up. Data backup is a form of dis and should be part of any disas arrangement. DISASTER RECOVERY: A disaster is an unpredicted event lifetime. It can be made by environm tsunami and earthquake), hardware/soft Cloud-based DR solution is an increa because of its ability to accept disasters the consistency and availability. nal of Trend in Scientific Research and De tional Open Access Journal | www.ijtsr 56 - 6470 | Volume - 2 | Issue – 6 | Sep w.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct g in Data Backup and Data Re isha. S 1 , Dr. S. Venkateshkumar 2 1 IIIMCA, 2 Head pplications, Dr. Sns Rajalakshmi College of Arts Coimbatore, Tamilnadu, India overy/Business ial in networks of digital data zation requires overy plan and cost constraints equirements in recovery point o overview of and disaster ter Recovery, pular in large- o its capability ces. Users can ghout Internet y refers to the of a loss and a recovery due replication and asy to get to in Data from a d if it has been saster recovery ster recovery in a system ment (like the tware failures. asing tendency and to achieve DISASTER RECOVERY CH 1. Dependency : Data backup is on position well. This problem make for customers (such as org of data because of disaster 2. Cost: Initializing cost amortiz Ongoing cost: storage cos giving out cost .Cost of po improved disasters and als disaster 3. Failure Detection : Failure detection time po organization downtime, so and information a failure a fast and correct DR. 4. Security: DR can be produced by n made. Cyber-terrorism at made disasters which ca reasons. In this case, se important data will be a m beside of system restoratio DISASTER RECOVERY SO Local Backup: Local storage can be update channel. By this technique, m service providers and also rel to private, and private to pu experience of a disaster, local services that were served by th Inter-Private Cloud Storage Users data should be stor environmental locations: Serv (LBS) and remote backup serv evelopment (IJTSRD) rd.com p – Oct 2018 2018 Page: 865 ecovery s & Science, HALLENGES: n of service providers as es dependency on CSPs ganizations) and also loss r. zed once a year cost. st, data transfer cost and otential disaster: Cost of so cost of unrecoverable owerfully affects on the o it is critical to detect as soon as potential for a nature or can be human- ttack is one of human- an be expert for many ecurity and recovery of main purpose in DR plans on. OLUTION: ed through a protected migration between cloud location between public ublic is possible. In the l backup can supply the he service provider. (IPCS): red in three different ers, Local backup server ver (RBS).

Upload: ijtsrd

Post on 17-Aug-2019

9 views

Category:

Education


1 download

DESCRIPTION

Data backup and Disaster Recovery Business Continuity issues are appropriate essential in networks since the importance and shared value of digital data is continuously rising. Every organization requires business continuity plan or disaster recovery plan and data backup which reduce within the cost constraints while achieving the target recovery requirements in terms of recovery time objective and recovery point objective. The aim of this paper is to overview of various techniques in data backup and disaster recovery in the cloud environment. Monisha. S | Dr. S. Venkateshkumar "Cloud Computing in Data Backup and Data Recovery" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: https://www.ijtsrd.com/papers/ijtsrd18652.pdf Paper URL: http://www.ijtsrd.com/computer-science/other/18652/cloud-computing-in-data-backup-and-data-recovery/monisha-s

TRANSCRIPT

Page 1: Cloud Computing in Data Backup and Data Recovery

International Journal of Trend in

International Open Access Journal

ISSN No: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Cloud Computing Monisha.

Department of Computer Applications, Dr.

ABSTRACT Data backup and Disaster Recovery/Business Continuity issues are appropriate essential in networks since the importance and shared value of digital data is continuously rising. Every organization requires business continuity plan or disaster recovery plan and data backup which reduce within the cost constraints while achieving the target recovery requirements in terms of recovery time objective and recovery point objective. The aim of this paper is to overview of various techniques in data backup and disaster recovery in the cloud environment. Keyword: Cloud Computing, Disaster Recovery, Replication, Backup, Survey. INTRODUCTION Cloud computing becomes more popular in largescale computing day by day suitable to its capability to share worldwide distributed resources. Users can access to cloud-based services throughout Internet around the world. Backup and recovery refers to the method of backing up data in case of a loss and setting up systems that allocate to data recovery due to data loss. Backing up data requires replication and archiving computer data, so that it is easy to get to in case of data deletion or corruption. Data fpreviously time may only be recovered if it has been backed up. Data backup is a form of disaster recovery and should be part of any disaster recovery arrangement. DISASTER RECOVERY: A disaster is an unpredicted event in a system lifetime. It can be made by environment (like the tsunami and earthquake), hardware/software failures. Cloud-based DR solution is an increasing tendency because of its ability to accept disasters and to achieve the consistency and availability.

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal | www.ijtsrd.com

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Computing in Data Backup and Data Recovery

Monisha. S1, Dr. S. Venkateshkumar2 1IIIMCA,

2Head Department of Computer Applications, Dr. Sns Rajalakshmi College of Arts & Science,

Coimbatore, Tamilnadu, India

Data backup and Disaster Recovery/Business Continuity issues are appropriate essential in networks since the importance and shared value of digital data is continuously rising. Every organization requires

tinuity plan or disaster recovery plan and data backup which reduce within the cost constraints while achieving the target recovery requirements in terms of recovery time objective and recovery point objective. The aim of this paper is to overview of

us techniques in data backup and disaster

Cloud Computing, Disaster Recovery,

Cloud computing becomes more popular in large-scale computing day by day suitable to its capability to share worldwide distributed resources. Users can

based services throughout Internet around the world. Backup and recovery refers to the

ethod of backing up data in case of a loss and setting up systems that allocate to data recovery due to data loss. Backing up data requires replication and archiving computer data, so that it is easy to get to in case of data deletion or corruption. Data from a previously time may only be recovered if it has been backed up. Data backup is a form of disaster recovery and should be part of any disaster recovery

A disaster is an unpredicted event in a system be made by environment (like the

tsunami and earthquake), hardware/software failures. based DR solution is an increasing tendency

because of its ability to accept disasters and to achieve

DISASTER RECOVERY CHALLENGE1. Dependency :

Data backup is on position of service providers as well. This problem makes dependency on CSPs for customers (such as organizations) and also loss of data because of disaster.

2. Cost: Initializing cost amortized once a year cost. Ongoing cost: storage cost, data transfer cost and giving out cost .Cost of potential disaster: Cost of improved disasters and also cost of unrecoverable disaster

3. Failure Detection : Failure detection time powerfully affects on the organization downtime, so it is and information a failure as soon as potential for a fast and correct DR.

4. Security: DR can be produced by nature or can be humanmade. Cyber-terrorism attack is one of humanmade disasters which can be expert for many reasons. In this case, security and recovery of important data will be a main purpose in DR plans beside of system restoration.

DISASTER RECOVERY SOLUTION:Local Backup: Local storage can be updated through a protected channel. By this technique, migration between cloud service providers and also relocation between public to private, and private to public is possible. In the experience of a disaster, local backup can supply the services that were served by the service provider. Inter-Private Cloud Storage (IPCS):Users data should be stored in three different environmental locations: Servers, Local backup server (LBS) and remote backup server (RBS).

Research and Development (IJTSRD)

www.ijtsrd.com

6 | Sep – Oct 2018

Oct 2018 Page: 865

Data Recovery

shmi College of Arts & Science,

DISASTER RECOVERY CHALLENGES:

Data backup is on position of service providers as well. This problem makes dependency on CSPs for customers (such as organizations) and also loss of data because of disaster.

Initializing cost amortized once a year cost. cost: storage cost, data transfer cost and

giving out cost .Cost of potential disaster: Cost of improved disasters and also cost of unrecoverable

Failure detection time powerfully affects on the organization downtime, so it is critical to detect and information a failure as soon as potential for a

DR can be produced by nature or can be human-terrorism attack is one of human-

made disasters which can be expert for many se, security and recovery of

important data will be a main purpose in DR plans beside of system restoration.

DISASTER RECOVERY SOLUTION:

Local storage can be updated through a protected channel. By this technique, migration between cloud

vice providers and also relocation between public to private, and private to public is possible. In the experience of a disaster, local backup can supply the services that were served by the service provider.

Private Cloud Storage (IPCS): ata should be stored in three different

environmental locations: Servers, Local backup server (LBS) and remote backup server (RBS).

Page 2: Cloud Computing in Data Backup and Data Recovery

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

@ IJTSRD | Available Online @ www.ijtsrd.com

CLOUD SERVER CENTRAL REPOSITORY: In some respects cloud servers work in the same way as physical servers but the functions they give can be very different. There are two main options for hosting.� Shared hosting � Dedicated hosting � Shared hosting :

Shared hosting is the cheaper selection whereby servers are shared between the hosting provider’s clients. One client’s website will be hosted on the same server as websites belong to other clients.

� Dedicated hosting : Dedicated hosting is a much more difficult form of hosting, whereby clients obtain whole physical servers.

BACKUP REPOSITORY: The main cloud is termed as the central depository and remote backup cloud is termed as Backup repository. And if the central repository misplaced its data under any situation either of any natural disaster (for ex -earthquake, flood, firehuman attack or deletion that has been done incorrectly and then it uses the in sequence from the remote repository. The Remote backup services should cover the subsequent issues: � Privacy and ownership. � Relocation of servers to the cloud. � Data security. � Reliability. � Cost effectiveness. Privacy and ownership: Different clients access the cloud with their similar login or after any verification process. They are liberally allowed to upload their private and necessary data on the cloud. Relocation of server: For data recovery there must be transfer of server to the cloud. The Relocation of server means to remove main server’s data to another server however the new of location is unidentified to the client. Data security: The client’s data is stored at central repository with complete security.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

CLOUD SERVER CENTRAL REPOSITORY: In some respects cloud servers work in the same way

they give can be very different. There are two main options for hosting.

Shared hosting is the cheaper selection whereby servers are shared between the hosting provider’s

te will be hosted on the same server as websites belong to other

Dedicated hosting is a much more difficult form of hosting, whereby clients obtain whole physical

The main cloud is termed as the central depository and remote backup cloud is termed as Backup repository. And if the central repository misplaced its data under any situation either of any natural

earthquake, flood, fire etc.) or by human attack or deletion that has been done incorrectly and then it uses the in sequence from

The Remote backup services should cover the

Different clients access the cloud with their similar login or after any verification process. They are liberally allowed to upload their private and

transfer of server to the cloud. The Relocation of server means to remove main server’s data to another server however the new of location is unidentified to the client.

The client’s data is stored at central repository with

Reliability: The remote cloud must have the reliability characteristics. Because in cloud computing the main cloud stores the complete data and each client is independent on the main cloud for each and every small amount of data; theremote backup cloud must participate a reliable role. Cost effectiveness: The cost for execution of remote server and its recovery & back-up technique also play an important role while creating the strumain cloud and its reporter remote cloud. CLOUD SERVICE MODELS:Software as a Service (SaaS): SaaS is a group of application and software; it allows the clients to give to the software instead it. Software application is available as service to the customer based on their demand. Twitter, Face book, whatsapp provide Software as a ser Platform as a Service (PaaS):This model provide platform as a service. This provides clients to develop his own application using the tools and program languages. This service is hosted in cloud and right of entry by clients using internet. Google App engine, Amazon provides the platform as service. Infrastructure as a Service (IaaS):This model provides the common resource services. It provides the computing communications like storage, virtual machine, network connection, bandwidth, IP address. IaaS is complete package for computing. CLOUD DEPLOYMENT MODELS:� Public Cloud: A public cloud is available to any

client with an internet ability, is less secure than the private cloud because it can be access by general public.

� Private Cloud: Private cloud is available to a specific organization so that the user who belong to that organization can have access the data. It is more secure than the public

� Hybrid Cloud: The hybrid cloud is basically combination of no less than two clouds such as combination of private, community or public cloud.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 866

The remote cloud must have the reliability characteristics. Because in cloud computing the main cloud stores the complete data and each client is independent on the main cloud for each and every small amount of data; therefore the cloud and remote backup cloud must participate a reliable

The cost for execution of remote server and its up technique also play an

important role while creating the structure for main cloud and its reporter remote cloud.

MODELS: SaaS):

SaaS is a group of application and software; it allows the clients to give to the software instead of purchase

. Software application is available as service to the customer based on their demand. Twitter, Face book, whatsapp provide Software as a service.

PaaS): This model provide platform as a service. This provides clients to develop his own application using the tools and program languages. This service is hosted in cloud and right of entry by clients using

le App engine, Amazon provides the

Infrastructure as a Service (IaaS): This model provides the common resource services. It provides the computing communications like storage, virtual machine, network connection,

ss. IaaS is complete package for

MODELS: A public cloud is available to any

client with an internet ability, is less secure than the private cloud because it can be access

Private cloud is available to a specific organization so that the user who belong to that organization can have access the data. It is more secure than the public

The hybrid cloud is basically ss than two clouds such

as combination of private, community or public

Page 3: Cloud Computing in Data Backup and Data Recovery

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

@ IJTSRD | Available Online @ www.ijtsrd.com

� Community Cloud: Community cloud allows the property and system to be accessible by quantity of associated organization.

CLOUD STORAGE: Cloud Storage is a PaaS, and requirements careful planning and a thorough implementation. This requires using an included adoption of multiple vendors’ solutions. Cloud Storage is an area to experience fast growth in user requirements and disk space use. Therefore, it must be easy toto manage with an increasing demand. There are three data services are � Backup Automation � Data recovery � Data migration � BACKUP AUTOMATION :

Cloud Storage uses a number of enterprise solutions such as Iomega/EMC, Lacie, Western Digital and HP to distribute a fast and consistent automation services. The experiment performs backup automation between 1,000 and 10,000 files, which are available in the accessible system for user support.

� DATA RECOVERY : Data recovery is an significant service to recover lost data due to accidents or emergency services. In the previous experience, it took two weeks to recover 5 TB of data for disaster recovery as irequires different skill and systems to retrieve data and restore good quality data back to Cloud services. Data archived as Virtual Machines or Virtual Storage speed up recovery process.

� DATA MIGRATION : Data migration is common amongst Clouds and also applicable to data exhaustive research. When there are more organizations going for private cloud deployment, data migration between Clouds is common and may authority the way service delivery. But there is no analysis the impact of moving single large documents between private clouds.

CONCLUSION: In Cloud Computing has been the need for condition of security features of data, especially now that data is getting stored and shared on the cloud. Therefore backup and recovery services have become a complete requirement when it comes to management of data. It is most capable way to approach data

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN:

www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018

Community cloud allows the and system to be accessible by quantity

requirements careful planning and a thorough implementation. This requires using an included adoption of multiple vendors’ solutions. Cloud Storage is an area to experience fast growth in user requirements and disk space use. Therefore, it must be easy to use, and able

Cloud Storage uses a number of enterprise solutions such as Iomega/EMC, Lacie, Western Digital and HP to distribute a fast and consistent automation services. The experiment performs backup automation between 1,000 and 10,000

the accessible system

Data recovery is an significant service to recover lost data due to accidents or emergency services. In the previous experience, it took two weeks to recover 5 TB of data for disaster recovery as it requires different skill and systems to retrieve data and restore good quality data back to Cloud services. Data archived as Virtual Machines or Virtual Storage speed up recovery process.

Data migration is common amongst Clouds and is also applicable to data exhaustive research. When there are more organizations going for private cloud deployment, data migration between Clouds is common and may authority the way service delivery. But there is no analysis the impact of

arge documents between private

In Cloud Computing has been the need for condition of security features of data, especially now that data is getting stored and shared on the cloud. Therefore backup and recovery services have become a

mplete requirement when it comes to management of data. It is most capable way to approach data

organization, certainly preferable to spending valuable time and resources to try and recover data manually. Positive backup and recovery services are provide asmall yearly cost. REFERENCES: 1. Vic (J. R) Winkler. Securing the cloud

Computer Security Techniques and Tactics. Elsevier Inc, 2011.

2. Abdul Nasir Khan, M. L. Mat Kiah, Sammie U. Khan, Sajjad A. Madani. Towards secure mobile cloud computing: A survey. Future Generation Computer Systems (2012), doi:10.1016/j.future.2012.08.003.

3. J. Sinduja, S. Prathiba. Modified Security FrameWork for PIR cloud Computing Environment. International Journal of Computer Science andMobile Computing-2013.

4. Clara Leonard. PRISM: Guardian fait de nouvelles Fromhttp://www.zdnet.fr/actualites/prismlansaargumente-le-guardiannouvellesrevelations-39791924.htm. ZDNet, Jun 28, .2013. consulted Nov 20, 2013.

5. Glenn Greenwald, Ewen MacAPoitras. Edward Snowden: the whistleblower behind the NSA surveillance revelations.

http://www.theguardian.com/world/2013/jun/09/edwardsnowdennsa-whistleblowersurveillance. The Guardian, jun 10, 2013.

6. Almokhtar Ait El Mrabti, Anas Abou El KalAbdellah Ait Ouahman. Data Security In The Multi-Cloud. The International Conference On Networked Systems May 2Morocco. The First International Workshop on Security Policies in cloud Environment (PoliCE2013)

7. Keiko Hashizume, DavidFernndez-Medina, Eduardo B Fernandez. An analysis of security issues for cloud computing. Hashizume et al. Journal of Internet Services and Applications. SpringerOpen Journal. 2013, 4:5

8. A. B. Chougule, G. A. Patil. Implementation and Analysis of EFRS Technique for Intrusion Tolerance in Distributed Systems. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Oct 2018 Page: 867

organization, certainly preferable to spending valuable time and resources to try and recover data manually. Positive backup and recovery services are provide at a

R) Winkler. Securing the cloud - cloud Computer Security Techniques and Tactics.

L. Mat Kiah, Sammie U. Khan, Sajjad A. Madani. Towards secure mobile

urvey. Future Generation Computer Systems (2012), doi:10.1016/j.future.2012.08.003.

J. Sinduja, S. Prathiba. Modified Security Frame Work for PIR cloud Computing Environment. International Journal of Computer Science and

la NSA argumente, le Guardian fait de nouvelles revelations. Fromhttp://www.zdnet.fr/actualites/prism-

guardian-fait-de-39791924.htm. ZDNet, Jun

2013. consulted Nov 20, 2013.

Glenn Greenwald, Ewen MacAskill, Laura Poitras. Edward Snowden: the whistleblower behind the NSA surveillance revelations.

http://www.theguardian.com/world/2013/jun/09/ewhistleblowersurveillance. The

Almokhtar Ait El Mrabti, Anas Abou El Kalam, Abdellah Ait Ouahman. Data Security In The

Cloud. The International Conference On Networked Systems May 2-4, 2013, Marrakech, Morocco. The First International Workshop on Security Policies in cloud Environment

Keiko Hashizume, David G Rosado, Eduardo Medina, Eduardo B Fernandez. An

analysis of security issues for cloud computing. Hashizume et al. Journal of Internet Services and Applications. SpringerOpen Journal. 2013, 4:5

A. Patil. Implementation and alysis of EFRS Technique for Intrusion

Tolerance in Distributed Systems. IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 4, No 1, July 2011.