Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
|
|
|
- Caroline Shields
- 10 years ago
- Views:
Transcription
1 2013 International Conference on Communication Systems and Network Technologies Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing Ms. Kruti Sharma Department of Computer Technology, YCCE, Nagpur (M.S), , India [email protected] Prof. Kavita R Singh Department of Computer Technology, Nagpur, YCCE, Nagpur (M.S), , India [email protected] Abstract In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The objective of proposed algorithm is twofold; first it help the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. The time related issues are also being solved by proposed SBA such that it will take minimum time for the recovery process. Proposed SBA also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques. Keywords-Central Repository; Remote Repository; Parity Cloud Service; Seed Block; I. INTRODUCTION National Institute of Standard and Technology defines as a model for enabling convenient, on-demand network access to a share pool of configurable computing service (for exnetworks, servers, storage, applications and services) that can be provisioned rapidly and released with minimal management effort or services provider [1]. Today, Cloud Computing is itself a gigantic technology which is surpassing all the previous technology of computing (like cluster, grid, distributed etc.) of this competitive and challenging IT world. The need of cloud computing is increasing day by day as its advantages overcome the disadvantage of various early computing techniques. Cloud storage provides online storage where data stored in form of virtualized pool that is usually hosted by third parties. The hosting company operates large data on large data center and according to the requirements of the customer these data center virtualized the resources and expose them as the storage pools that help user to store files or data objects. As number of user shares the storage and other resources, it is possible that other customers can access your data. Either the human error, faulty equipment s, network connectivity, a bug or any criminal intent may put our cloud storage on the risk and danger. And changes in the cloud are also made very frequently; we can term it as data dynamics. The data dynamics is supported by various operations such as insertion, deletion and block modification. Since services are not limited for archiving and taking backup of data; remote data integrity is also needed. Because the data integrity always focuses on the validity and fidelity of the complete state of the server that takes care of the heavily generated data which remains unchanged during storing at main cloud remote server and transmission. Integrity plays an important role in back-up and recovery services. In literature many techniques have been proposed HSDRT[1], PCS[2], ERGOT[4], Linux Box [5], Cold/Hot backup strategy [6] etc. that, discussed the data recovery process. However, still various successful techniques are lagging behind some critical issues like implementation complexity, low cost, security and time related issues. To cater this issues, in this paper we propose a smart remote data backup algorithm, Seed Block Algorithm (SBA). The contribution of the proposed SBA is twofold; first SBA helps the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. This paper is organized as follows: Section II focuses on the related literature of existing methods that are successful to some extent in the cloud computing domain. In Section III, we discuss about the remote data backup server. Section IV describes the detailed description of the proposed seed block algorithm (SBA) and Section V shows the results and experimentation analysis of the proposed SBA. Finally, in Section VI conclusions are given. II. RELATED LITERATURE In literature, we study most of the recent back-up and recovery techniques that have been developed in cloud computing domain such as HSDRT[1], PCS[2], ERGOT[4], Linux Box [5], Cold/Hot backup strategy [6] etc. Detail review shows that none of these techniques are able to provide best performances under all uncontrolled circumstances such as cost, security, low implementation complexity, redundancy and recovery in short span of time. Among all the techniques reviewed PCS is comparatively reliable, simple, easy to use and more convenient for data recovery totally based on parity recovery service. It can recover data with very high probability. For data recovery, it generates a virtual disk in user system for data backup, make parity groups across virtual disk, and store parity data of parity group in cloud. It uses the Exclusive OR ( ) for creating Parity information. However, it is unable to control the implementation complexities. On the contrary, HSDRT has come out an efficient technique for the movable clients such as laptop, smart phones etc. nevertheless it fails to manage the low cost for the implementation of the recovery and also unable to
2 control the data duplication. It an innovative file back-up concept, which makes use of an effective ultra-widely distributed data transfer mechanism and a high-speed encryption technology The HS-DRT [1] is an innovative file back-up concept, which makes use of an effective ultra-widely distributed data transfer mechanism and a high-speed encryption technology. This proposed system follows two sequences one is Backup sequence and second is Recovery sequence. In Backup sequence, it receives the data to be backed-up and in Recovery Sequence, when some disasters occurs or periodically, the Supervisory Server (one of the components of the HSDRT) starts the recovery sequence. However there are some limitation in this model and therefore, this model is somehow unable to declare as perfect solution for back-up and recovery. Rather, Efficient Routing Grounded on Taxonomy (ERGOT) [4] is totally based on the semantic analysis and unable to focus on time and implementation complexity. It is a Semantic-based System which helps for Service Discovery in cloud computing. Similarly, we found a unique way of data retrieval. We made a focus on this technique as it is not a back-up technique but it provide an efficient retrieval of data that is completely based on the semantic similarity between service descriptions and service requests. ERGOT is built upon 3 components 1) A DHT (Distributed Hash Table) protocol 2) A SON (Semantic Overlay Network), 3) A measure of semantic similarity among service description [4]. Hence, ERGOT combines both these network Concept. By building a SON over a DHT, ERGOT proposed semantic-driven query answering in DHT-based systems. However does not go well with semantic similarity search models. In addition, Linux Box model is having very simple concept of data back-up and recovery with very low cost. However, in this model protection level is very low. It also makes the process of migration from one cloud service provider to other very easy. It is affordable to all consumers and Small and Medium Business (SMB). This solution eliminates consumer s dependency on the ISP and its associated backup cost. It can do all these at little cost named as simple Linux box which will sync up the data at block/file level from the cloud service provider to the consumer. It incorporates an application on Linux box that will perform backup of the cloud onto local drives. The data transmission will be secure and encrypted. The limitation we found that a consumer can backup not only the Data but Sync the entire Virtual Machine[5] which somehow waste the bandwidth because every time when backup takes place it will do back-up of entire virtual machine. Similarly, we also found that one technique basically focuses on the significant cost reduction and router failure scenario i.e. (SBBR). It concerns IP logical connectivity that will be remain unchanged even after a router failure and the most important factor is that it provides the network management system via multi-layer signaling. Table-I Comparison between various techniques of Back-up and recovery [20] Additionally [10], it shows how service imposed maximum outage requirements that have a direct effect on the setting of the SBRR architecture (e.g. imposing a minimum number of network-wide shared router resources locations). However, it is unable to include optimization concept with cost reduction. With entirely new concept of virtualization REN cloud focuses on the low cost infrastructure with the complex implementation and low security level. Another technique we found in the field of the data backup is a REN (Research Education Network) cloud. The lowest cost point of view we found a model Rent Out the Rented Resources [17]. Its goal is to reduce the cloud service s monetary cost. It proposed a three phase model for cross cloud federation that are discovery, matchmaking and authentication. This model is based on concept of cloud vendor that rent the resources from venture(s) and after virtualization, rents it to the clients in form of cloud services. All these techniques tried to cover different issues maintaining the cost of implementation as low as possible. However there is also a technique in which cost increases gradually as data increases i.e. Cold and Hot back-up strategy [6] that performs backup and recovery on trigger basis of failure detection. In Cold Backup Service Replacement Strategy (CBSRS) recovery process, it is triggered upon the detection of the service failures and it will not be triggered when the service is available. In Hot 377
3 Backup Service Replacement Strategy (HBSRS), a transcendental recovery strategy for service composition in dynamic network is applied [6]. During the implementation of service, the backup services always remain in the activated states, and then the first returned results of services will be adopted to ensure the successful implementation of service composition. Although each one of the backup solution in cloud computing is unable to achieve all the issues of remote data back-up server. The advantages and disadvantages of all these foresaid techniques are described in the Table-I. And due to the high applicability of backup process in the companies, the role of a remote data back up server is very crucial and hot research topic. III. REMOTE DATA BACKUP SERVER When we talk about Backup server of main cloud, we only think about the copy of main cloud. When this Backup server is at remote location (i.e. far away from the main server) and having the complete state of the main cloud, then this remote location server is termed as Remote Data Backup Server. The main cloud is termed as the central repository and remote backup cloud is termed as remote repository. Fig.1 Remote data Backup Server and its Architecture And if the central repository lost its data under any circumstances either of any natural calamity (for ex - earthquake, flood, fire etc.) or by human attack or deletion that has been done mistakenly and then it uses the information from the remote repository. The main objective of the remote backup facility is to help user to collect information from any remote location even if network connectivity is not available or if data not found on main cloud. As shown in Fig-1 clients are allowed to access the files from remote repository if the data is not found on central repository (i.e. indirectly). The Remote backup services should cover the following issues: 1) Data Integrity Data Integrity is concerned with complete state and the whole structure of the server. It verifies that data such that it remains unaltered during transmission and reception. It is the measure of the validity and fidelity of the data present in the server. 2) Data security Giving full protection to the client s data is also the utmost priority for the remote server. And either intentionally or unintentionally, it should be not able to access by third party or any other users/client s. 3) Data Confidentiality Sometimes client s data files should be kept confidential such that if no. of users simultaneously accessing the cloud, then data files that are personal to only particular client must be able to hide from other clients on the cloud during accessing of file. 4) Trustworthiness The remote cloud must possess the Trustworthiness characteristic. Because the user/client stores their private data; therefore the cloud and remote backup cloud must play a trustworthy role. 5) Cost efficiency The cost of process of data recovery should be efficient so that maximum no. of company/clients can take advantage of back-up and recovery service. There are many techniques that have focused on these issues. In forthcoming section, we will be discussing a technique of back-up and recovery in cloud computing domain that will cover the foresaid issues. IV. DESIGN OF THE PROPOSED SEED BLOCK ALGORITHM As discussed in literature, many techniques have been proposed for recovery and backup such as HSDRT[1], PCS[2], ERGOT[4], Linux Box[5], Cold/Hot backup strategy[6] etc. As discussed above low implementation complexity, low cost, security and time related issues are still challenging in the field of cloud computing. To tackle these issues we propose SBA algorithm and in forthcoming section, we will discuss the design of proposed SBA in detail. A. Seed Block Algorithm(SBA) Architechture This algorithm focuses on simplicity of the back-up and recovery process. It basically uses the concept of Exclusive OR (XOR) operation of the computing world. For ex: - Suppose there are two data files: A and B. When we XOR A and B it produced X i.e. X =. If suppose A data file get destroyed and we want our A data file back then we are able to get A data file back, then it is very easy to get back it with the help of B and X data file.i.e. A =. Similarly, the Seed Block Algorithm works to provide the simple Back-up and recovery process. Its architecture is shown in Fig-2 consists of the Main Cloud and its clients and the Remote Server. Here, first we set a random number in the cloud and unique client id for every client. Second, whenever the client id is being register in the main cloud; then client id and random number is getting EXORed ( ) with each other to generate seed block for the particular client. The generated seed block corresponds to each client is stored at remote server. Whenever client creates the file in cloud first time, it is stored at the main cloud. When it is stored in main server, the main file of client is being EXORed with the Seed Block of the particular client. And that EXORed file is stored at 378
4 the remote server in the form of file (pronounced as File dash). If either unfortunately file in main cloud crashed / damaged or file is been deleted mistakenly, then the user will get the original file by EXORing file with the seed block of the corresponding client to produce the original file and return the resulted file i.e. original file back to the requested client. The architecture representation of the Seed Block Algorithm is shown in the Fig.2. B. SBA Algorithm The proposed SBA algorithm is as follows: Algorithm 1: Initialization: Main Cloud: ; Remote Server: ; Clients of Main Cloud: ; Files: ; Seed block: ; Random Number: ; Client s ID: Input: created by ; is generated at ; Output: Recovered file after deletion at Given: Authenticated clients could allow uploading, downloading and do modification on its own the files only. Step 1: Generate a random number. int Step 2: Create a seed Block for each and Store at. (Repeat step 2 for all clients) Step 3: If creates/modifies a and stores at, then create as which can be extended as per the necessity. From Table-II, it is observed that memory requirement is more in remote server as compare to the main cloud s server because additional information is placed onto remote server (for example- different Seed Block of the corresponding client shown in Fig-2). Table-II System Environment During experimentation, we found that size of original data file stored at main cloud is exactly similar to the size of Back-up file stored at Remote Server as depicted in Table- III. In order to make this fact plausible, we perform this experiment for different types of files. Results tabulated in Table-III for this experiment shows that proposed SBA is very much robust in maintaining the size of recovery file same as that the original data file. From this we conclude that proposed SBA recover the data file without any data loss. Table-III: Performance analysis for different types of files Step 4: Store at. Step 5: If server crashes deleted from, then, we do EXOR to retrieve the original Step 6: Return to. Step 7: END. Fig.2 Seed Block Algorithm Architecture as: Processing Time means time taken by the process when client uploads a file at main cloud and that includes the assembling of data such as the random number from main cloud, seed block of the corresponding client from the remote server for EXORing operation; after assembling, performing the EXORed operation of the contents of the uploaded file with the seed block and finally stored the EXORed file onto the remote server. Performance of this experiment is tabulated in Table-IV. We also observed that as data size increases, the processing time increases. On other hand, we also found that performance which is megabyte per sec (MB/sec) being constant at some level even if the data size increases as shown in Table-IV. Table-IV Effect of data size on processing time V. EXPERIMENTATION AND RESULT ANALYSIS In this section, we discuss the experimentation and result analysis of the SBA algorithm. For experimentation we focused on different minimal system requirement for main cloud s server and remote server as depicted in Table-II. From Table-II, memory requirement is kept 8GB and 12GB for the main cloud s server and remote server respectively, 379
5 The Fig-3 shows the CPU utilization at Main Cloud and Remote Server. As shown in Fig-3 the Main Cloud s CPU utilization starts with 0% and as per the client uploads the file onto it then utilization increases; such that it has to check whether the client is authenticated or not, at the same the time it send request to Remote Server for the corresponding Seed Block. When request reached to Remote Server it started collecting the details as well as the seed Block and gives response in form of the seed Block and during this period, load at Main Cloud decreases which in return cause for gradual decreases in CPU utilization at main cloud. After receiving the requested data, CPU utilization at main cloud increases as it has to perform the EXORed operation. Again the Final EXORed file sends to Remote Server. As compared to Table-IV the processing time given can be compare with the time showing in Fig-3. Fig.3 Graph Showing Processor Utilization The Fig-4 shows the experimentation result of proposed SBA. As fig-4 (a) shows the original file which is uploaded by the client on main cloud. Fig-4 (b) shows the EXORed file which is stored on the remote server. This file contains the secured EXORed content of original file and seed block content of the corresponding client. Fig-4 (c) shows the recovered file; which indirectly sent to client in the absence of network connectivity and in case of the file deletion or if the cloud gets destroyed due to any reason. Fig.4 Sample output image of SBA Algorithm VI. CONCLUSION In this paper, we presented detail design of proposed SBA algorithm. Proposed SBA is robust in helping the users to collect information from any remote location in the absence of network connectivity and also to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. Experimentation and result analysis shows that proposed SBA also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques. The time related issues are also being solved by proposed SBA such that it will take minimum time for the recovery process. REFERENCES [1] Yoichiro Ueno, Noriharu Miyaho, Shuichi Suzuki,Muzai Gakuendai, Inzai-shi, Chiba,Kazuo Ichihara, 2010, Performance Evaluation of a Disaster Recovery System and Practical Network System Applications, Fifth International Conference on Systems and Networks Communications,pp [2] Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11. [3] Y.Ueno, N.Miyaho, and S.Suzuki,, 2009, Disaster Recovery Mechanism using Widely Distributed Networking and Secure Metadata Handling Technology, Proceedings of the 4th edition of the UPGRADE-CN workshop, pp [4] Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. [5] Vijaykumar Javaraiah Brocade Advanced Networks and Telecommunication Systems (ANTS), 2011, Backup for Cloud and Disaster Recovery for Consumers and SMBs, IEEE 5th International Conference, [6] Lili Sun, Jianwei An, Yang Yang, Ming Zeng, 2011, Recovery Strategies for Service Composition in Dynamic Network, International Conference on Cloud and Service Computing. [7] Xi Zhou, Junshuai Shi, Yingxiao Xu, Yinsheng Li and Weiwei Sun, 2008, "A backup restoration algorithm of service composition in MANETs," Communication Technology ICCT 11th IEEE International Conference, pp [8] M. Armbrust et al, Above the clouds: A berkeley view of cloud computing, S pdf. [9] F.BKashani, C.Chen,C.Shahabi.WSPDS, 2004, Web Services Peerto-Peer Discovery Service, ICOMP. [10] Eleni Palkopoulouy, Dominic A. Schupke, Thomas Bauscherty, 2011, Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture, IEEE ICC. [11] Lili Sun, Jianwei An, Yang Yang, Ming Zeng,2011, Recovery Strategies for Service Composition in Dynamic Network, International Conference on Cloud and Service Computing, pp [12] P.Demeester et al., 1999, Resilience in Multilayer Networks, IEEE Communications Magazine, Vol. 37, No. 8, p [13] S. Zhang, X. Chen, and X. Huo, 2010, Cloud Computing Research and Development Trend, IEEE Second International Conference on Future Networks, pp [14] T. M. Coughlin and S. L. Linfoot, 2010, A Novel Taxonomy for Consumer Metadata, IEEE ICCE Conference. [15] K. Keahey, M. Tsugawa, A. Matsunaga, J. Fortes, 2009, Sky Computing, IEEE Journal of Internet Computing, vol. 13, pp [16] M. D. Assuncao, A.Costanzo and R. Buyya, 2009, Evaluating the Cost- Benefit of Using Cloud Computing to Extend the Capacity of Clusters, Proceedings of the 18th International Symposium on High Performance Distributed Computing (HPDC 2009), Germany. [17] Sheheryar Malik, Fabrice Huet, December 2011, Virtual Cloud: Rent Out the Rented Resources," 6th International Conference on Internet Technology and Secure Transactions,11-14,Abu Dhabi, United Arab Emirates. [18] Wayne A. Jansen, 2011, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 44th Hawaii International Conference on System Sciences.Hawaii. [19] Jinpeng et al, 2009, Managing Security of Virtual Machine Images in a Cloud Environment, CCSW, Chicago, USA. [20] Ms..Kruti Sharma,Prof K.R.Singh, 2012, Online data Backup And Disaster Recovery techniques in cloud computing:a review, IJEIT, Vol.2, Issue
SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING
SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING Vijayalaxmi V Kadlimatti 1, Ramesh Kumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering,
A Review on Data Back-up Techniques for Cloud Computing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
Data Recovery in Cloud Environment Using Seed Block Algorithm
Data Recovery in Cloud Environment Using Seed Block Algorithm 1 Vedashree N, 2 Praveen Kumar KC, 3 Anilkumar G 1 PG Student Dept. Of CS&E, 2 PG Student Dept. Of CS&E, 3 Associate professor Dept. Of CS&E
A smart data backup technique for cloud computing using seed block algorithm strategy
A smart data backup technique for cloud computing using seed block algorithm strategy Mr. G. S. Narke 1 Mr. A. K. Harijan 2 Mr. A. R. Shinde 3 Prof.H.D.Sonawane 4 ---------------------------------------------------------------------***---------------------------------------------------------------------
REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR
REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR 1 S. N. Uke, 2 Mohini Shinde, 3 Shweta Joshi, 4 Priya Sharma, 5 Rushikesh Rathod 1 Assistant Professor,Smt. Kashibai Navale
Keywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT;
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Disaster Recovery
How To Create A Backup And Backup Algorithm In Cloud (Cloud)
A SMART DATA BACKUP TECHNIQUE IN CLOUD COMPUTING USING SIGNCRYPTION Sridevi.N. 1, Ashwini.A 2 1 Asst.Professor,, Dept of CSE,SVCE,Bengaluru, [email protected] 2 PG Student Dept of CSE,SVCE,Bengaluru,
241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud
INTELLIGENT CLOUD SECURITY BACK-UP SYSTEM Tanay Kulkarni 1, Sumit Memane 2, Onkar Nene 3, Krupali Dhaygude 4 Students of Department of Computer Engineering, RMD Sinhgad School of Engineering, Pune, Maharashtra,
Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption
Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption Mrs. Priyanka Patil SIT Lonavala, SPPU Maharashtra, INDIA Prof. Vikas Kadam SIT Lonavala, SPPU Maharashtra,
Intelligent Cloud Back-Up System
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 82-89 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Intelligent Cloud Back-Up System Tanay Kulkarni
How To Backup A Cloud Server With Seed Block Algorithm
R. V. Gandhi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm R. V. Gandhi 1, M
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding Kolipaka Kiran 1, Janapati Venkata Krishna 2 1 pursuing M.Tech (CSE), 2 Associate Professor & HOD (CSE Department) 1,2 Holy
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012
Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review Kruti Sharma, Kavita R Singh Computer Science Engineering, YCCE, Nagpur (M.S), 441 110, India Abstract Today, in electronic
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Literature Survey On Cloud Data Recovery Techniques. Mrs. D.A Phalke, Onkar Kulkarni, AbhijitFulsagar,HarishRane, AjinkyaChothave Department of Computer Engineering, D.Y.Patil College of Engineering, Akurdi,
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P [email protected] Mobile: 9866034900 2 R.Tamilkodi A.P [email protected] Mobile:
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Efficient Backingup Data for Migrating Cloud to Cloud
Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,
February. ISSN: 2321-8134
IJFEAT INTERNATIONAL JOURNAL FOR ENGINEERING APPLICATIONS AND TECHNOLOGY TITLE: DATA PLACE & MANAGE SECURITY IN CLOUD COMPUTING FOR EFFECTIVE AND FLEXIBLE DISTRIBUTED SYSTEM 1 Mr. Pritam S. Bhoyar, 2 Mr.
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T
Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific
Secure Way of Storing Data in Cloud Using Third Party Auditor
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 4 (Jul. - Aug. 2013), PP 69-74 Secure Way of Storing Data in Cloud Using Third Party Auditor 1 Miss.
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
REMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Ensuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
Optimal Service Pricing for a Cloud Cache
Optimal Service Pricing for a Cloud Cache K.SRAVANTHI Department of Computer Science & Engineering (M.Tech.) Sindura College of Engineering and Technology Ramagundam,Telangana G.LAKSHMI Asst. Professor,
What You Should Know About Cloud- Based Data Backup
What You Should Know About Cloud- Based Data Backup An Executive s Guide to Data Backup and Disaster Recovery Matt Zeman 3Fold IT, LLC PO Box #1350 Grafton, WI 53024 Telephone: (844) 3Fold IT Email: [email protected]
Disaster Recovery in Cloud Computing
Disaster Recovery in Cloud Computing Mr.Akshay A. Gharat, Mr. Devendra E. Mhamunkar ASM INSTITUTE OF MANAGEMENT & COMPUTER STUDIES (IMCOST), THANE, MUMBAI University Of Mumbai Abstract: Nowadays, data
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG [email protected] Bhupesh Kumar Dewangan Assistant Professor,CSE,
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
How To Make A Secure Storage On A Mobile Device Secure
Outsourcing with secure accessibility in mobile cloud computing Monika Waghmare 1, Prof T.A.Chavan 2 Department of Information technology, Smt.Kashibai Navale College of Engineering, Pune, India. Abstract
Local Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
DISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
Load Balancing in Fault Tolerant Video Server
Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of
MFR IT Technical Guides
MFR IT Technical Guides Windows 7 Backup and Recovery Page 1 of 33 Table of Contents 1 Glossary... 3 2 Backup Strategy... 4 3 Windows Backup Options... 5 3.1 Windows Backup... 5 3.2 Windows System Image
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD. R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 ABSTRACT
N TH THIRD PARTY AUDITING FOR DATA INTEGRITY IN CLOUD R.K.Ramesh 1, P.Vinoth Kumar 2 and R.Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M. University Chennai 2 Asst.Professor,
How To Ensure Correctness Of Data In The Cloud
Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services
Availability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory
Implementing Parameterized Dynamic Balancing Algorithm Using CPU and Memory Pradip Wawge 1, Pritish Tijare 2 Master of Engineering, Information Technology, Sipna college of Engineering, Amravati, Maharashtra,
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Data Integrity Check using Hash Functions in Cloud environment
Data Integrity Check using Hash Functions in Cloud environment Selman Haxhijaha 1, Gazmend Bajrami 1, Fisnik Prekazi 1 1 Faculty of Computer Science and Engineering, University for Business and Tecnology
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
Cloud Panel Service Evaluation Scenarios
Cloud Panel Service Evaluation Scenarios August 2014 Service Evaluation Scenarios The scenarios below are provided as a sample of how Finance may approach the evaluation of a particular service offered
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS Amar More 1 and Sarang Joshi 2 1 Department of Computer Engineering, Pune Institute of Computer Technology, Maharashtra,
Investigation of Cloud Computing: Applications and Challenges
Investigation of Cloud Computing: Applications and Challenges Amid Khatibi Bardsiri Anis Vosoogh Fatemeh Ahoojoosh Research Branch, Islamic Azad University, Sirjan, Iran Research Branch, Islamic Azad University,
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
Preamble: Remote Storage in Android Using SCTP
Preamble: Remote Storage in Android Using SCTP Mr. Nikhil Vijay Patil 1, Prof.Sandeep Khanna 2 1 M.E.Second Year Student, Padm.Dr.V.B.Kolte College of Engineering, Malkapur Dist.Buldhana (M.S.) India.
VANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
Fault Tolerance in the Internet: Servers and Routers
Fault Tolerance in the Internet: Servers and Routers Sana Naveed Khawaja, Tariq Mahmood Research Associates Department of Computer Science Lahore University of Management Sciences Motivation Client Link
Evaluation of Enterprise Data Protection using SEP Software
Test Validation Test Validation - SEP sesam Enterprise Backup Software Evaluation of Enterprise Data Protection using SEP Software Author:... Enabling you to make the best technology decisions Backup &
Reallocation and Allocation of Virtual Machines in Cloud Computing Manan D. Shah a, *, Harshad B. Prajapati b
Proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications (ERCICA-14) Reallocation and Allocation of Virtual Machines in Cloud Computing Manan
Distributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE,
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
How To Handle A Power Outage On A Server Farm (For A Small Business)
Topic: Load balancing 4/03/2014 (c) A. Mariën 1 High Availability Key property: availability high is relative Important to determine correctly Cost of unavailability Business continuity: how long can one
