A Review on Data Back-up Techniques for Cloud Computing
|
|
|
- George Hardy
- 10 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014, pg REVIEW ARTICLE ISSN X A Review on Data Back-up Techniques for Cloud Computing Somesh P. Badhel 1, Prof. Vikrant Chole 2 1 Department of Computer Science and Engineering 1 G. H. Raisoni Academy of Engineering and Technology, Nagpur, India 2 Department of Computer Science and Engineering 2 G. H. Raisoni Academy of Engineering and Technology, Nagpur, India Abstract: Cloud computing provides various kinds of services to its users. Storage-as-a-service is one of the services provided by cloud infrastructure in which large amount of electronic data is stored in cloud. As valuable and important data of enterprises are stored at a remote location on cloud we must be assured that our data is safe and be available at any time. In situations like Flood, Fire, earthquakes or any hardware malfunction or any accidental deletion our data may no longer remain available. To maintain the data safety there must be some data backup technique for cloud platform to recover valuable and important data efficiently in such situations mentioned above. This paper provides a review on various backup techniques used for Cloud Computing platform regarding this concern. Keywords: Seed Block, Random number generator, Remote Server, Main Server, J-bit encoding I. INTRODUCTION Cloud Computing is a computing technology that is based on Internet. It involves sharing of resources in spite of having own local storage and devices to handle different services. Cloud Computing has become a gigantic technology that surpasses all the other older computing technologies (Grid Computing). Cloud Computing provides various advantages as compared to previous computing technologies. Cloud Computing provides Supercomputing and high performance computing power to its clients at a very low cost. Cloud computing involves networks of a large groups of servers that are typically running a low-cost consumer PC technology along with specialized connections that spread data-processing storage across them. This shared Cloud infrastructure contains large pools of systems which are linked together. These virtualized pools are used to maximize the power of cloud computing and data is stored in the form of virtualized pools. As Cloud Computing involves sharing of computing resources there are large number of users that share the same storage and other computing resources. Therefore there is a strong need for a mechanism to prevent other users to access your important and useful data either intentionally or accidentally also if it happens that some other user on the cloud access your data and makes some modification or any deletion then it must be recoverable to its 2014, IJCSMC All Rights Reserved 538
2 original state in an efficient way. Also the stored data is at danger due to any natural calamities such as any Flood, Fire etc. Natural disasters for example flood can make recovering data an impossible task. Flood water contains contaminated water which may contain dust, sand dregs and other materials that may affect the platters and sectors of the hard drive. The parts of the hard drive may seize up just as an engine that will start slugging in it. Also many businesses that relied on electronic data suffer total or temporary data loss due to hardware damage and failure. Data integrity is another issue while recovering lost data. II. RELATED WORK The following sections explain the survey of various papers regarding this concern. Different methods that have been proposed for having data backup for Cloud Computing are given bellow. In [1], Ms. Kruti Sharma has proposed a Seed Block Algorithm Architecture (SBA) and suggested a remote backup server. The remote Backup server is a replica of original cloud server which is physically situated at a remote location. This method is based on the concept of Exclusive-OR (XOR) operation of digital computing. The whole mechanism consists of three main parts 1.The Main Cloud Server 2.Clients of the Cloud and 3.The Remote Server. The SBA uses a random number and a unique client id associated with each client. Fig. 1 Remote Backup Server and its Architecture Whenever a new Client is get registered with the cloud its unique client id is get XOR with a random number. The result of this XOR operation is called as a Seed Block which will be used only for that particular client. Whenever a client stores any Data on to the Cloud it is saved in Cloud and at the same time it is XORed with its Seed Block and the resultant Data is stored in the remote server. If any accidental data loss occurs in the main Cloud then in such cases the original data is recovered by XORing the Data with the Seed Block of that particular client to obtain Data i.e. the original Data file. Fig. 2 Seed Block Algorithm and its Architecture. 2014, IJCSMC All Rights Reserved 539
3 This technique is fully capable of recovering the data files accurately in any data loss situation also at the same time it maintains data integrity. The diss-advantage of this technique is that it is inefficient because the data files on the remote server uses the same space as in the main Cloud so in this way there is wastage of storage space. The storage space in the remote Server can be reduced by applying the compression techniques to achieve high efficiency. In [2], Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, have proposed a novel data recovery service framework for cloud infrastructure, the Parity Cloud Service (PCS) provides a privacy-protected personal data recovery service. In this proposed framework user data is not required to be uploaded on to the server for data recovery. All the necessary server-side resources that provide the recovery services are within a reasonable bound. The advantages of Parity Cloud Service are that it provides a reliable data recovery at a low cost but the disadvantage is that its implementation complexity is higher. In [3], Vijaykumar Javaraiah introduced a mechanism for online data backup technique for cloud along with disaster recovery. In this approach the cost of having the backup for Cloud platform has been reduced and also it protects data from disaster at the same time the process of migration from one cloud service provider to another becomes easier and much simpler. In this approach the consumers are not dependent on the service provider and it also eliminates the associated data recovery cost. A simple hardware box is used that achieves all these at little cost. In [4], Yoichiro Ueno, Noriharu Miyaho, Shuichi Suzuki,Muzai Gakuendai, Inzai-shi, Chiba,Kazuo Ichihara, proposed the innovative file back-up concept HS-DRT, that makes use of an effective ultra-widely distributed data transfer mechanism and a high-speed encryption technology. This system consists of two sequences one is Backup sequence and other is Recovery sequence. The data to be backed-up is received In Backup sequence. The recovery sequence is used when there is a disaster or any data loss occurs the Supervisory Server (one of the components of the HSDRT) starts the recovery sequence. There are some limitations in this approach and due to which, this model cannot be declared as a perfect technique for Cloud back-up and recovery. Although this model can be used for movable clients such as laptops Smart phones etc. the data recovery cost is comparatively increased and also there is increased redundancy. In [5], Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble proposed Efficient Routing Grounded on Taxonomy (ERGOT) which is fully based on the semantic analysis and does not focuses on time and implementation complexity. This system is based on the Semantics that provide support for Service Discovery in cloud computing. This model is built upon 3 components one A DHT (Distributed Hash Table) protocol second A SON (Semantic Overlay Network), and third A measure of semantic similarity among service description We makes a focus on this technique because it is not a simple back-up technique rather it provides retrieval of data in an efficient way that is totally based on the semantic similarity between service descriptions and service requests. ERGOT proposes a semantic-driven query answering in DHT-based systems by building a SON over a DHT but it does not go well with semantic similarity search models. The drawback of this model is an icreased time complexity and implementation complexity. In [6], Eleni Palkopoulouy, Dominic A. Schupke, Thomas Bauscherty, proposed one technique that mainly focuses on the significant reduction of cost and router failure scenario i.e. (SBBR). It involves logical connectivity of IP that will be remain unchanged even after a router failure. The most important factor of this model is that it provides the network management system via multi-layer signaling. Additionally this model shows how service imposed maximum outage requirements that have a direct effect on the setting of the SBRR architecture (e.g. imposing a minimum number of network-wide shared router resources locations).the problem with model is that it is unable to include optimization concept with cost reduction. 2014, IJCSMC All Rights Reserved 540
4 In [7], Sheheryar Malik, Fabrice Huet, proposed the lowest cost point of view a model Rent out the Rented Resources. This technique focuses on reducing the cloud service s monetary cost. It proposed a model for cross cloud federation which consists of three phases that are 1) Discovery, 2) Matchmaking and 3) Authentication. This model is simply based on the concept of cloud vendors that rent the resources from different venture(s) and after virtualization, rents it to the clients as cloud services. In [8], Lili Sun, Jianwei An, Yang Yang, Ming Zeng, suggested a technique in which there is a gradual increase in cost with the increase in data i.e. The Cold and Hot back-up strategy that performs backup and recovery on trigger basis of failure detection. In CBSRS (i.e. Cold Backup Service Replacement Strategy) recovery process, it is triggered when a service failure is detected and it will not be triggered when there is no failure i.e. when the service is available. The HBSRS (i.e. Hot Backup Service Replacement Strategy), is a transcendental recovery strategy for service composition that is used for dynamic network. During the implementation of process, the backup services remains in the activated state and the first returned results of services will be used to ensure the successful implementation of service composition. III. EVALUATION AND DISCUSSION The advantages and disadvantages of all the above discussed techniques are described in the Table-I. And due to the high applicability and need of backup process in many companies and enterprises, the role of a remote data back up server with an efficient technique is very important and a hot research topic Approach Advantage Disadvantage Sr.no. 1 SBA[1] Simple to inefficient implement 2 Parity Cloud Reliable Privacy High complexity Service[2] 3 LINUX BOX[3] Low cost Simple Low cost 4 HSDRT[4] Used for movable clients 5 ERGOT[] Exact match retrieval, 6 Cold/Hot Backup Strategy[8] privacy Triggered only when failure detected High bandwidth, Complete server backup at a time Costly, Increased redundancy Increased complexity Cost increases as data increases Table-I. Comparison between various techniques of Back-up and recovery IV. CONCLUSION All the above techniques tried to cover different issues of data backup and recovery for Cloud Computing such as maintaining the cost of implementation and implementation complexities as low as possible. However each one of the backup solution for Cloud Computing is unable to achieve all the issues of remote data back-up server with less storage space. 2014, IJCSMC All Rights Reserved 541
5 REFERENCES [1] Ms. Kruti Sharma, Prof. Kavita R Singh, 2013 Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing International Conference on Communication Systems and Network Technologies IEEE. [2] Chi-won Song, Sungmin Park, Dong-wook Kim, Sooyong Kang, 2011, Parity Cloud Service: A Privacy-Protected Personal Data Recovery Service, International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11. [3] Vijaykumar Javaraiah, Brocade Advanced Networks and Telecommunication systems (ANTS), 2011, Backupforcloud and Disaster Recovery for Consumers and SMBs, IEEE 5th International Conference, [4] Yoichiro Ueno, Noriharu Miyaho, Shuichi Suzuki,Muzai Gakuendai, Inzai-shi, Chiba,Kazuo Ichihara, 2010, Performance Evaluation of a Disaster Recovery System and Practical Network System Applications, Fifth International Conference on Systems and Networks Communications, pp [5] Giuseppe Pirr o, Paolo Trunfio, Domenico Talia, Paolo Missier and Carole Goble, 2010, ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures, 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing. [6] Eleni Palkopoulouy, Dominic A. Schupke, Thomas Bauscherty, 2011, Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture, IEEE ICC. [7] Sheheryar Malik, Fabrice Huet, December 2011, Virtual Cloud: Rent Out the Rented Resources," 6th International Conference on Internet Technology and Secure Transactions,11-14,Abu Dhabi, United Arab Emirates. [8] Lili Sun, Jianwei An, Yang Yang, Ming Zeng, 2011, Recovery Strategies for Service Composition in Dynamic Network, International Conference on Cloud and Service Computing [9] Y.Ueno, N.Miyaho, and S.Suzuki,, 2009, Disaster Recovery Mechanism using Widely Distributed Networking and Secure Metadata Handling Technology, Proceedings of the 4th edition of the UPGRADE-CN workshop, pp [10] Xi Zhou, Junshuai Shi, Yingxiao Xu, Yinsheng Li and Weiwei Sun, 2008, "A backup restoration algorithm of service composition in MANETs," Communication Technology ICCT 11th IEEE International Conference, pp [11] M. Armbrust et al, Above the clouds: A berkeley view of cloud computing, [12] F.BKashani, C.Chen,C.Shahabi.WSPDS, 2004, Web Services Peer to Peer Discovery Service, ICOMP. [13] P.Demeester et al., 1999, Resilience in Multilayer Networks, IEEE Communications Magazine, Vol. 37, No. 8, p [14] S. Zhang, X. Chen, and X. Huo, 2010, Cloud Computing Research and Development Trend, IEEE Second International Conference on Future Networks, pp [15] T. M. Coughlin and S. L. Linfoot, 2010, A Novel Taxonomy for Consumer Metadata, IEEE ICCE Conference. [16] K. Keahey, M. Tsugawa, A. Matsunaga, J. Fortes, 2009, Sky Computing, IEEE Journal of Internet Computing, vol. 13, pp [17] M. D. Assuncao, A.Costanzo and R. Buyya, 2009, Evaluating the Cost- Benefit of Using Cloud Computing to Extend the Capacity of Clusters, Proceedings of the 18th International Symposium on High Performance Distributed Computing (HPDC 2009), Germany. [18] Wayne A. Jansen, 2011, Cloud Hooks: Security and Privacy Issues in Cloud Computing, 44th Hawaii International Conference on System Sciences.Hawaii. [19] Jinpeng et al, 2009, Managing Security of Virtual Machine Images in a Cloud Environment, CCSW, Chicago, USA. [20] Ms..Kruti Sharma,Prof K.R.Singh, 2012, Online data Backup And Disaster Recovery techniques in cloud computing: A review, IJEIT, Vol.2, Issue , IJCSMC All Rights Reserved 542
Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing
2013 International Conference on Communication Systems and Network Technologies Seed Block Algorithm: A Remote Smart Data Back-up Technique for Cloud Computing Ms. Kruti Sharma Department of Computer Technology,
REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR
REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR 1 S. N. Uke, 2 Mohini Shinde, 3 Shweta Joshi, 4 Priya Sharma, 5 Rushikesh Rathod 1 Assistant Professor,Smt. Kashibai Navale
SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING
SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING Vijayalaxmi V Kadlimatti 1, Ramesh Kumar H K 2 1 M.Tech Student, 2 Assistant Professor, Dept. of Computer Science and Engineering,
How To Create A Backup And Backup Algorithm In Cloud (Cloud)
A SMART DATA BACKUP TECHNIQUE IN CLOUD COMPUTING USING SIGNCRYPTION Sridevi.N. 1, Ashwini.A 2 1 Asst.Professor,, Dept of CSE,SVCE,Bengaluru, [email protected] 2 PG Student Dept of CSE,SVCE,Bengaluru,
A smart data backup technique for cloud computing using seed block algorithm strategy
A smart data backup technique for cloud computing using seed block algorithm strategy Mr. G. S. Narke 1 Mr. A. K. Harijan 2 Mr. A. R. Shinde 3 Prof.H.D.Sonawane 4 ---------------------------------------------------------------------***---------------------------------------------------------------------
241 P a g e. Keywords: - Seed Block Algorithm, AES, Cloud back-up, Remote cloud, Main Cloud
INTELLIGENT CLOUD SECURITY BACK-UP SYSTEM Tanay Kulkarni 1, Sumit Memane 2, Onkar Nene 3, Krupali Dhaygude 4 Students of Department of Computer Engineering, RMD Sinhgad School of Engineering, Pune, Maharashtra,
Intelligent Cloud Back-Up System
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 82-89 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Intelligent Cloud Back-Up System Tanay Kulkarni
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 5, November 2012
Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review Kruti Sharma, Kavita R Singh Computer Science Engineering, YCCE, Nagpur (M.S), 441 110, India Abstract Today, in electronic
How To Backup A Cloud Server With Seed Block Algorithm
R. V. Gandhi et al Int. Journal of Engineering Research and Applications RESEARCH ARTICLE OPEN ACCESS Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block Algorithm R. V. Gandhi 1, M
Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption
Secure Data Back-up Technique for Cloud Computing using Seed Block Algorithm with RSA Encryption Mrs. Priyanka Patil SIT Lonavala, SPPU Maharashtra, INDIA Prof. Vikas Kadam SIT Lonavala, SPPU Maharashtra,
Keywords-Main cloud; Backup; Parity Cloud Service; Seed Block; Complexity; HSDRT;
Volume 5, Issue 2, February 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Disaster Recovery
Data Recovery in Cloud Environment Using Seed Block Algorithm
Data Recovery in Cloud Environment Using Seed Block Algorithm 1 Vedashree N, 2 Praveen Kumar KC, 3 Anilkumar G 1 PG Student Dept. Of CS&E, 2 PG Student Dept. Of CS&E, 3 Associate professor Dept. Of CS&E
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding
Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding Kolipaka Kiran 1, Janapati Venkata Krishna 2 1 pursuing M.Tech (CSE), 2 Associate Professor & HOD (CSE Department) 1,2 Holy
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Literature Survey On Cloud Data Recovery Techniques. Mrs. D.A Phalke, Onkar Kulkarni, AbhijitFulsagar,HarishRane, AjinkyaChothave Department of Computer Engineering, D.Y.Patil College of Engineering, Akurdi,
Efficient Backingup Data for Migrating Cloud to Cloud
Efficient Backingup Data for Migrating Cloud to Cloud 1 PS.Vijayabaskaran, Assistant Professor, Department of Information Technology, Sri Manakula Vinayagar Engineering College, Pondicherry, India. 2 U.Prabu,
Virtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
Web-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
Distributing, Ensuring and Recovery of Data Stored in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Load Balancing in Fault Tolerant Video Server
Load Balancing in Fault Tolerant Video Server # D. N. Sujatha*, Girish K*, Rashmi B*, Venugopal K. R*, L. M. Patnaik** *Department of Computer Science and Engineering University Visvesvaraya College of
Agent Based Framework for Scalability in Cloud Computing
Agent Based Framework for Scalability in Computing Aarti Singh 1, Manisha Malhotra 2 1 Associate Prof., MMICT & BM, MMU, Mullana 2 Lecturer, MMICT & BM, MMU, Mullana 1 Introduction: Abstract: computing
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com New Challenges
Cloud Computing - Architecture, Applications and Advantages
Cloud Computing - Architecture, Applications and Advantages 1 Arun Mani Tripathi 2 Rizwan Beg NIELIT Ministry of C&I.T., Govt. of India 2 Prof. and Head, Department 1 of Computer science and Engineering,Integral
Security Analysis of Cloud Computing: A Survey
Security Analysis of Cloud Computing: A Survey Kamaljeet Pakhre 1, Navdeep Singh 2, Sanket Mani Tiwari 3 1,2,3 Research Scholar, M. Tech. (CSE), Galgotias University, Greater Noida, India. Abstract Now
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Disaster Recovery in Cloud Computing
Disaster Recovery in Cloud Computing Mr.Akshay A. Gharat, Mr. Devendra E. Mhamunkar ASM INSTITUTE OF MANAGEMENT & COMPUTER STUDIES (IMCOST), THANE, MUMBAI University Of Mumbai Abstract: Nowadays, data
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud
Improved Storage Security Scheme using RSA & Twofish Algorithm at Window Azure Cloud Amandeep Kaur 1, Sarpreet Singh 2 1 Research Fellow, 2 Asst. Professor 1,2 Sri Guru Granth Sahib World University,Fatehgarh
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT
MODIFIED BITTORRENT PROTOCOL AND ITS APPLICATION IN CLOUD COMPUTING ENVIRONMENT Soumya V L 1 and Anirban Basu 2 1 Dept of CSE, East Point College of Engineering & Technology, Bangalore, Karnataka, India
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
Multilevel Communication Aware Approach for Load Balancing
Multilevel Communication Aware Approach for Load Balancing 1 Dipti Patel, 2 Ashil Patel Department of Information Technology, L.D. College of Engineering, Gujarat Technological University, Ahmedabad 1
Disaster Recovery Plan Checklist
Disaster Recovery Plan Checklist Your guide for setting up or updating a Disaster Recovery Plan for your business. ArcSource Disaster Recovery Plan Checklist 1. Compile Your Internal Contacts Information
A block based storage model for remote online backups in a trust no one environment
A block based storage model for remote online backups in a trust no one environment http://www.duplicati.com/ Kenneth Skovhede (author, [email protected]) René Stach (editor, [email protected]) Abstract
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.19, June-2015, Pages:3633-3638 www.ijsetr.com Refining Efficiency of Cloud Storage Services using De-Duplication SARA BEGUM 1, SHAISTA NOUSHEEN 2, KHADERBI SHAIK 3 1 PG Scholar,
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
VANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
A STUDY ON CLOUD STORAGE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.966
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Disaster Recovery. 1.1 Introduction. 1.2 Reasons for Disaster Recovery. EKAM Solutions Ltd Disaster Recovery
Disaster Recovery 1.1 Introduction Every day, there is the chance that some sort of business interruption, crisis, disaster, or emergency will occur. Anything that prevents access to key processes and
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014
86 Int. J. Engineering Systems Modelling and Simulation, Vol. 6, Nos. 1/2, 2014 Dual server-based secure data-storage system for cloud storage Woong Go ISAA Lab, Department of Information Security Engineering,
Disaster Recovery (DR) Planning with the Cloud Desktop
with the Cloud Desktop [email protected] (866) 796-0310 www.os33.com In preparing for the unexpected, most companies put specific disaster recovery plans in place. Without planning, recovering from a disaster
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam
Cloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
A Deduplication-based Data Archiving System
2012 International Conference on Image, Vision and Computing (ICIVC 2012) IPCSIT vol. 50 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V50.20 A Deduplication-based Data Archiving System
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
How To Use Windows Small Business Server 2011 Essentials
Everything Your Business Needs in a Server, Nothing it doesn t. Ideal as a first server for small businesses with up to 25 users, Windows Small Business Server 2011 Essentials provides a cost-effective
Implementing Parameterized Dynamic Load Balancing Algorithm Using CPU and Memory
Implementing Parameterized Dynamic Balancing Algorithm Using CPU and Memory Pradip Wawge 1, Pritish Tijare 2 Master of Engineering, Information Technology, Sipna college of Engineering, Amravati, Maharashtra,
Data Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage
Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Cloud Based E-Learning Platform Using Dynamic Chunk Size
Cloud Based E-Learning Platform Using Dynamic Chunk Size Dinoop M.S #1, Durga.S*2 PG Scholar, Karunya University Assistant Professor, Karunya University Abstract: E-learning is a tool which has the potential
A Synchronization Algorithm of Mobile Database for Cloud Computing
A Synchronization Algorithm of Mobile Database for Cloud Computing Ranjeet Singh 1, Chiranjit Dutta 2 Faculty of information Technology, SRM University, NCR campus, India ABSTRACT The existing synchronization
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
A survey on cost effective multi-cloud storage in cloud computing
A survey on cost effective multi-cloud storage in cloud computing Nitesh Shrivastava, Ganesh Kumar Abstract As novel storage model, cloud storage has gain attentions from both the academics and industrial
REMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
Multi-level Metadata Management Scheme for Cloud Storage System
, pp.231-240 http://dx.doi.org/10.14257/ijmue.2014.9.1.22 Multi-level Metadata Management Scheme for Cloud Storage System Jin San Kong 1, Min Ja Kim 2, Wan Yeon Lee 3, Chuck Yoo 2 and Young Woong Ko 1
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
13th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management
13th IFIP/IEEE International Workshop on Distributed Systems: Operations & Management October 21-23, 2002, Montreal, Canada A Hot-Failover State Machine for Gateway Services and its Application to a Linux
Keywords: Cloud computing, Characteristics of Cloud computing, Models of Cloud computing, Distance learning, Higher education.
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Cloud
International Journal of Advance Foundation and Research in Computer (IJAFRC) Volume 2, Special Issue (NCRTIT 2015), January 2015.
Survey On Cloud Computing For Mobile Users Using Machine Servers Ms. Deepali Gothawal 1, Deepali Patil 2, Sneha Chavan 3, Tejaswini Chandekar 4, Rohit Koti 5 Department of Computer Engineering, DYPCOE,
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
The EVault Portfolio
The EVault Portfolio Built from the start as a pure disk-to-disk solution, EVault is the only data protection platform that can be consumed as a cloud service, deployed as on-premise software, an on-premise
A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval
, pp.175-186 http://dx.doi.org/10.14257/ijsh.2014.8.1.19 A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval Kil-sung Park and Sun-Hyung Kim Department of Information & Communication
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
Data Backup Options for SME s
Data Backup Options for SME s As an IT Solutions company, Alchemy are often asked what is the best backup solution? The answer has changed over the years and depends a lot on your situation. We recognize
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
INSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
Exposing the Cloud: It It s More than a Buzzword Tim Connors, Director, AT&T AT&T
Exposing the Cloud: It s More than a Buzzword Tim Connors, Director, AT&T Exposing the Cloud: It s More than a Buzzword Discussion Agenda Cloud Storage Target Uses When is it right? When is it wrong? Specific
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose
A Survey on Aware of Local-Global Cloud Backup Storage for Personal Purpose Abhirupa Chatterjee 1, Divya. R. Krishnan 2, P. Kalamani 3 1,2 UG Scholar, Sri Sairam College Of Engineering, Bangalore. India
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Talk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
A Survey on Cloud Computing
A Survey on Cloud Computing Poulami dalapati* Department of Computer Science Birla Institute of Technology, Mesra Ranchi, India [email protected] G. Sahoo Department of Information Technology Birla
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala
A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service
II,III A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service I Samir.m.zaid, II Hazem.m.elbakry, III Islam.m.abdelhady I Dept. of Geology, Faculty of Sciences,
Keywords Ad hoc-network protocol, ad hoc cloud computing, performance analysis, simulation models, OPNET 14.5
Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparative Study
Cryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
