ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883. www.ijsetr.com



Similar documents
Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup.

Availability Modeling and Analysis for Data Backup and Restore Operations

Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure

Performance and Availability Modeling of IT Systems with Data Backup and Restore

Programma della seconda parte del corso

CS556 Course Project Performance Analysis of M-NET using GSPN

Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server

Improving data integrity on cloud storage services

Load Balancing in Fault Tolerant Video Server

How To Improve Availability In Local Disaster Recovery

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

A Novel Switch Mechanism for Load Balancing in Public Cloud

A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters

How To Create A Backup And Backup Algorithm In Cloud (Cloud)

Implementation of Reliable Fault Tolerant Data Storage System over Cloud using Raid 60

Data Backup and Archiving with Enterprise Storage Systems

Optimal Service Pricing for a Cloud Cache

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD

IMPLEMENTATION OF SOURCE DEDUPLICATION FOR CLOUD BACKUP SERVICES BY EXPLOITING APPLICATION AWARENESS

Efficient Scheduling Of On-line Services in Cloud Computing Based on Task Migration

2 Prof, Dept of CSE, Institute of Aeronautical Engineering, Hyderabad, Andhrapradesh, India,

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April ISSN

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

Load Balancing in cloud computing

Near Sheltered and Loyal storage Space Navigating in Cloud

Student, Haryana Engineering College, Haryana, India 2 H.O.D (CSE), Haryana Engineering College, Haryana, India

REDUSING THE STORAGE SIZE USING COMPRESSION ALGORITHM AND CLOUD BACKUP USING EXOR

International Journal of Computer & Organization Trends Volume20 Number1 May 2015

MOC 20462C: Administering Microsoft SQL Server Databases

A SIGNIFICANT REDUCTION OF CLOUD STORAGE BY ELIMINATION OF REPETITIVE DATA

A FRAMEWORK FOR MANAGING RUNTIME ENVIRONMENT OF JAVA APPLICATIONS

Energy Efficient MapReduce

Fair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing

IMPLEMENTATION OF NOVEL MODEL FOR ASSURING OF CLOUD DATA STABILITY

Load Testing on Web Application using Automated Testing Tool: Load Complete

A Proposed Framework for Ranking and Reservation of Cloud Services Based on Quality of Service

Migration of Virtual Machines for Better Performance in Cloud Computing Environment

Load balancing model for Cloud Data Center ABSTRACT:

MANAGING OF IMMENSE CLOUD DATA BY LOAD BALANCING STRATEGY. Sara Anjum 1, B.Manasa 2

Load Balancing for Improved Quality of Service in the Cloud

A Fast Path Recovery Mechanism for MPLS Networks

Data Recovery in Cloud Environment Using Seed Block Algorithm

A Study on Service Oriented Network Virtualization convergence of Cloud Computing

MINIMIZING STORAGE COST IN CLOUD COMPUTING ENVIRONMENT

Protect Microsoft Exchange databases, achieve long-term data retention

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

How To Ensure Correctness Of Data In The Cloud

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Computer-Aided Disaster Recovery Planning Tools (CADRP)

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

IMPACT OF DISTRIBUTED SYSTEMS IN MANAGING CLOUD APPLICATION

FLAWLESS DISPENSATION PRICING FOR A CLOUD CACHE

An Oracle White Paper November Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 4, July-Aug 2014

Enterprise Application Performance Management: An End-to-End Perspective

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Figure 1. The cloud scales: Amazon EC2 growth [2].

High Availability of VistA EHR in Cloud. ViSolve Inc. White Paper February

Virtual Infrastructure Security

SOFTWARE PERFORMANCE EVALUATION ALGORITHM EXPERIMENT FOR IN-HOUSE SOFTWARE USING INTER-FAILURE DATA

Fault Tolerance Techniques in Big Data Tools: A Survey

Fault-Tolerant Framework for Load Balancing System

Cost Effective Automated Scaling of Web Applications for Multi Cloud Services

USING REPLICATED DATA TO REDUCE BACKUP COST IN DISTRIBUTED DATABASES

ISSN Vol.04,Issue.19, June-2015, Pages:

CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM

Utilizing Round Robin Concept for Load Balancing Algorithm at Virtual Machine Level in Cloud Environment

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

A Quality Model for E-Learning as a Service in Cloud Computing Framework

Performance tuning policies for application level fault tolerance in distributed object systems

Smart Data Back-up Technique for Cloud Computing using Secure Erasure Coding

Automated Model Based Testing for an Web Applications

AN EFFECTIVE STUDY ON IMPROVED DATA AUTHENTICATION IN CLOUD SYSTEM

EXAMINING OF HEALTH SERVICES BY UTILIZATION OF MOBILE SYSTEMS. Dokuri Sravanthi 1, P.Rupa 2

PERFORMANCE OF BALANCED STORAGE SERVICES IN CLOUD SYSTEM

Quantification of Security and Survivability

School of Computer Science

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Lotus Domino 8 Monitoring and Maintenance

Secure Hybrid Cloud Architecture for cloud computing

Advanced Load Balancing Mechanism on Mixed Batch and Transactional Workloads

Proof of Retrivability: A Third Party Auditor Using Cloud Computing

EMC DOCUMENTUM xplore 1.1 DISASTER RECOVERY USING EMC NETWORKER

SEED BLOCK ALGORITHM: A REMOTE SMART DATA BACK-UP TECHNIQUE FOR CLOUD COMPUTING

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

ADVANCE SECURITY TO CLOUD DATA STORAGE

Energy Constrained Resource Scheduling for Cloud Environment

OPTIMIZED AND INTEGRATED TECHNIQUE FOR NETWORK LOAD BALANCING WITH NOSQL SYSTEMS

Response time behavior of distributed voting algorithms for managing replicated data

Performance Prediction for Software Architectures

Flexible cloud backup service on CloudByte

Index Terms: DDOS, Flash Crowds, Flow Correlation Coefficient, Packet Arrival Patterns, Information Distance, Probability Metrics.

Cloud Computing Services on Provisioning Cost Approach

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications

Process Modelling from Insurance Event Log

ADVANCEMENT TOWARDS PRIVACY PROCEEDINGS IN CLOUD PLATFORM

Cloud Storage and Online Bin Packing

Which Backup Option is Best?

Transcription:

ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883 www.ijsetr.com A Review of Disaster Recovery Techniques and Online Data Back-Up in Cloud Computing YOGESHWAR. CH 1, SATEESH NAGAVARAPU 2 1 PG Scholar, Dept of CSE, Malla Reddy Institute of Technology, TS, India, Email: yogeshwar.ch@gmail.com. 2 Asst Prof, Dept of CSE, Malla Reddy Institute of Technology, TS, India, Email: sateeshnagavarapu@gmail.com. Abstract: In recent IT system, data backup plays a vital role in data protection. The data backup is resource intensive and lead to performance degradation. It is significant to select the suitable backup and restore technique to prevent data loss. In this paper, a framework is developed to evaluate the impacts of backup and restore operations on performance and system availabilities. The work is carried out to assist the system engineers to design effective backup and restore operations. The different types of backup strategies are discussed. In this work, different modelling approaches are discussed for evaluating the availability and performance of a storage system with online periodic data backup. Keywords: Backup and Restore Strategies, Online Backup, Metrics, Modelling Methods, Hourly Backup. I. INTRODUCTION The system data are the most precious assets of an organization. In today s business environment, the data backup plays an essential role in the IT system data protection. There are many chances of loosing data due to technical reasons, hardware failure, software failure, manual errors etc. It is important to identify the proper backup and restore technique to make ensure the data is protected. In [1], authors presented an analytical modelling approach for the data backup. They investigated metrics considering system availability, data loss and rejection of user requests. In [2] author, Karel derived a mathematical model to evaluate the different types of backup strategies quantitatively. The full, differential and incremental backup strategies, formulae are derived for the calculation of the average total backup size and the average data recovery size. In this paper [3] the impacts of different backup policies on availability measures were studied. The backup and restore operations are designed using SysML to compute the availability measures. The combination of full backup and partial backup was effective in terms of user-perceived data availability and data loss rate. The authors in [4] advocated the replacement of servers by a cloud of residential gateways. They evaluated using statistical distributions based on real world traces, as well as a trace of residential gateways for availability and the results show that the time required to backup data in the network drops from days to a few hours. The design for efficient backup scheduling is discussed in [5]. In this work, each backup job is characterized via two metrics, called job duration and job throughput. The goal is to automate the design of a backup schedule that minimizes the overall completion time. In [6], authors considered two schemes of full and incremental backup for a database system. They have analytically discussed optimal backup policies to minimize the cost, using theory of cumulative processes. In [7] authors conducted a comprehensive performance analysis for ARbased optical networks. They proposed a novel analytical framework for modelling the restoration probability of a connection to the possible correlation among the multiple backup routes. II. BACKUP SCENARIOS A. Backup Types The data loss can occur in the primary storage system due to reasons such as hardware failure, software corruption, human error, virus infection, etc. The data restore operation is required to recover the data from the backup storage when the data is lost and it cannot be recovered via normal means. The backup approaches based on data to be backed up are classified into two main types, full backup and partial backup. The partial backup can be further divided as incremental and differential backup. The Incremental backup, copies the files added or modified since the last full or partial backup, whereas in differential backup copies files added or modified since the last full backup. The time to take a backup and the time to restore data are dependent on the backup type, it is important to determine the type of backup and its frequency in consideration with system availability and performance. In this paper different types of backup techniques are analyzed and suggested optimal technique for a particular application. B. Online Backup In this work, the performance of online backup is analysed. The system considered is an Apache web server connected to a backup server through the network server. In online backup, it permits the user to access the system while Copyright @ 2015 IJSETR. All rights reserved.

backup is in progress. This feature has several implications for both the Apache and the backup process. The Apache and the backup process share the resources CPU, Network I/O and disk on the file server which are shown in fig.1. The disk on the file server assumes, the file server has a single network I/O. It can handle both the backup data and user accesses. In reality both the processes are running simultaneously during an online backup. It has to be analysed the effects over each other. The two system configurations, shared and no priority and priority are considered in this study. III. REMOTE DATA BACK-UP SERVER Remote Data Backup server is a server which stores the main cloud s entire data as a whole and located at remote place (far away from cloud). And if the central repository lost its data, then it uses the information from the remote repository. The purpose is to help clients to collect information from remote repository either if network connectivity is not available or the main cloud is unable to provide the data to the clients. As shown in Fig 1, if clients found that data is not available on central repository, then clients are allowed to access the files from remote repository (i.e. indirectly). YOGESHWAR. CH, SATEESH NAGAVARAPU 2. Relocation of server For data recovery there must be relocation of server to the cloud. The Relocation of server means to transfer main server s data to another server; however the new of location is unknown to the client. The clients get the data in same way as before without any intimation of relocation of main server, such that it provides the location transparency of relocated server to the clients and other third party while data is been shifted to remote server. 3. Data security The client s data is stored at central repository with complete protection. Such a security should be followed in its remote repository as well. In remote repository, the data should be fully protected such that no access and harm can be made to the remote cloud s data either intentionally or unintentionally by third party or any other client. 4. Reliability The remote cloud must possess the reliability characteristics. Because in cloud computing the main cloud stores the complete data and each client is dependent on the main cloud for each and every little amount of data; therefore the cloud and remote backup cloud must play a trustworthy role. That means, both the server must be able to provide the data to the client immediately whenever they required either from main cloud or remote server. 5. Cost effectiveness The cost for implementation of remote server and its recovery & back-up technique also play an important role while creating the structure for main cloud and its correspondent remote cloud. The cost for establishing the remote setup and for implementing its technique must be minimum such that small business can afford such system and large business can spend minimum cost as possible. Fig. 1. Remote data Backup Server and its Architecture. The Remote backup services should cover the following issues: 1. Privacy and ownership. 2. Relocation of servers to the cloud. 3. Data security. 4. Reliability. 5. Cost effectiveness. 6. Appropriate Timing. 1. Privacy and ownership Different clients access the cloud with their different login or after any authentication process. They are freely allowed to upload their private and essential data on the cloud. Hence, the privacy and ownership of data should be maintained; Owner of the data should only be able to access his private data and perform read, write or any other operation. Remote Server must maintain this Privacy and ownership. 6. Appropriate Timing The process of data recovery takes some time for retrieval of data from remote repository as this remote repository is far away from the main cloud and its clients. Therefore, the time taken for such a retrieval must be minimum as possible such that the client can get the data as soon as possible without concerning the fact that remote repository is how far away from the client. There are many techniques that have focused on these issues. In forthcoming section, we will be discussing some of recent techniques of back-up and recovery in cloud computing domain. III. SYSTEM DESCRIPTION The evaluation of online backup and restore operations to a storage system, an Apache web server connected to a backup server through network server is considered. The backup is assumed to be performed over a dedicated network and the backup data is stored in backup storage system attached to another server in the same network. The architecture diagram of the system description is shown in fig1. The system is a web service system which provides access to the files stored on a local file server. It also contains a backup server to perform the backup operations. The two Volume.04, IssueNo.25, July-2015, Pages: 4879-4883

A Review of Disaster Recovery Techniques and Online Data Back-Up in Cloud Computing servers are connected using a dedicated backup network. The outside users access the file server through the Apache web server. The system periodically backs up data from the file server disk to the backup server using the rsync tool B. Backup flow Process The Rsync tool consists of three processes running on the backup servers are sender running on file server, generator and receiver on the backup server. The backup begins with sender who build list of files and send to the generator on the backup server. The generator compares the file list in local and decides the files needed from the file server. The generator walks the list of files to be transferred and send the file name to the sender. In full backup, the sender directly send the whole requested file to the receiver otherwise it will perform checksum computations and send only the file blocks whose checksum values are different from those provided by the generator. Fig.1 Online backup architecture. A. System Flow Process The assumptions considered for the analysis is a service process handles one request at a time. The Apache server can only handle a finite number of user requests simultaneously and user requests that arrive when all service processes are busy will be rejected. Fig.2 User flow. The request once comes it passes the file server network I/O and to the main Apache process. If there are fewer active service processes than the limited, the main Apache process generates a new service process to handle the request else it rejects the request. The request seeking file items are, in the file server memory. The service process directly forms a response and replies to the user through the file server network I/O. If the requested file is not found within the file server memory, an access to the file server disk is initiated by the service process and sends response, through the network I/O to the user. The user flow process diagram is shown in fig.2. Fig.3 Backup flow. IV. SYSTEM METRICS The metrics to be developed to obtain the operational details of the system under different backup techniques and workload conditions. The metrics considered for the analysis are file service availability, data loss rate, data loss ratio, and request rejection ratio. The metrics file service availability, and data loss rate are related to system performance. The metrics data loss ratio, and request rejection ratio represent system availability perceived by users. The availability model can be developed using Stochastic reward nets(srn) to capture the system failure/restore/backup behaviors and yield system availability and data loss metrics SRN and performance model with markov chain and PEAP to capture resource contention during different system operation periods and provide the corresponding task rejection probabilities. A. Data Loss Rate and Loss Ratio These metrics correspond to the number of user updates to local data that are lost due to storage failure, before the system back up. The request arrival model in a day is divided into two periods, office hours and after-office hours. The users requests are classified into write and read types, and distinguish between request rejection and data loss. It is assumed each backup covers all the data updates accumulated in a certain time period before the beginning of the backup. In online backup, it starts from the beginning of the last backup, since new requests may be processed while Volume.04, IssueNo.25, July-2015, Pages: 4879-4889

the previous backup is underway, and assumed the data updates from these new requests are not processed by the previous backup. The backup server does not fail and once a data undergoes backup it will not be affected by any failure in the future. B. Data Rejection Rate and Rejection Ratio These metrics represent how often the system turns down incoming user requests, either due to the system failure or due to collapse of resources means no available service processes. The user would consider the system unavailable if the request is rejected, these two metrics capture the system availability as perceived by the users. V. MATHEMATICAL MODELING TECHNIQUES This section explores the different mathematical modeling techniques which can be used for the analysis of performance and availability. Thus based on the parameters that have to be measured, type of backup, priority and accuracy of the model the suitable model can be chosen for the backup. The different mathematical models used for performance and availability are discussed. The first step in a model based performance evaluation consists of the formalization process, during which the modeler generates the formal description of the real-world system using conceptualization. Queuing network formalism and Markov chain can be used for this purpose. The former is oriented towards the structure of the real-world system and the later puts the emphasis on the description of the system behavior on the underlying statement space level. The second step is the deduction of performance measures by the application of appropriate solution method. Thus depending on the conceptualization chosen during the formalization process the following modeling methods are applied for the availability. A. Stochastic Petri Nets A Petri Net (PN) is a bipartite directed graph with two disjoint sets called places and transitions. The directed arcs in the graph connect places to transitions called input arcs and transitions to places called output arcs. The places may contain an integer number of entities called tokens. The state or condition of the system is associated with the presence or absence of tokens in various places in the net. The condition of the net may enable some transitions to fire. This firing of a transition is the removal of tokens from one or more places in the net and/or the arrival of tokens in one or more places in the net. The tokens are removed from places connected to the transition by an input arc; the tokens arrive in places connected to the transition by an output arc. A marked Petri net is obtained by associating tokens with places. The marking of a PN is the distribution of tokens in the places of the PN. A marking is represented by a vector M = (#(P1), #(P2),, #(Pn)), Where #(Pi) is the number of tokens in place i and n is the number of places in the net. B. Generalized Stochastic Petri Nets (GSPN) The extension to SPNs is the development of GSPNs which include the inhibitor arc. An inhibitor arc is an arc from a place to a transition that inhibits the firing of the transition when a token is present in the input place. C. Stochastic Reward Nets (SRN) YOGESHWAR. CH, SATEESH NAGAVARAPU Stochastic reward nets (SRNs) are a superset of GSPNs. The SRN s substantially increase the modeling power of the GSPN by adding guard functions, marking dependent arc multiplicities, general transition priorities, and reward rates at the net level. A guard function is a Boolean function associated with a transition. Whenever the transition satisfies all the input and inhibitor conditions in a marking M, the guard is evaluated. The transition is considered enabled only if the guard function evaluates to true. Marking dependent arc multiplicities allow either the number of tokens required for the transition to be enabled, or the number of tokens removed from the input place, or the number of tokens placed in an output place to be a function of the current marking of the PN. Such arcs are called variable cardinality arcs. D. Modeling methods for Performance analysis The first step in a model based performance evaluation consists of the formalization process, during which the modeler generates the formal description of the real-world system using conceptualization. For this purpose Queuing network formalism and Markov chain can be used. The former is oriented towards the structure of the real-world system and the later puts the emphasis on the description of the system behavior on the underlying statement space level. The second step is the deduction of performance measures by the application of appropriate solution method. Thus depending on the conceptualization chosen during the formalization process the following solution methods are available. In analytical type closed form solutions are available if the system can be described as a simple queuing system, in which the solutions can be expressed analytically in terms of bounded number of well-known operations.the measures can either be computed by ad-hoc programming or with the help of computer available packages such as MATHEMATICA. The advantage of this is moderate computational complexity and enables a fast calculation of performance measures even for larger system. The numerical solutions can be used where closed form solution cannot be used. The approximate solution can be obtained by the numerical methods. The formal system description can be either given as queuing network, stochastic petri nets or another high level modeling formalism, from which a state space representation is generated. In most of the models the analytical method is not feasible because either a theory for the derivation of proper system equation is not known, or the computational complexity is too high. In this situation solutions can be obtained by the application of Discrete Event Simulation (DES). The DES executes the model and collects information about the observed behavior for the subsequent derivation of performance measures. VI. CONCLUSION The importance of backup and different types of backup and restoring techniques are discussed. The different analytical and simulation modeling techniques that can be used for performance and availability analysis of online data backup are studied. The suitable modeling technique can be selected with necessary assumptions for the online backup from the studied models. As a future work, the developed model will be checked in real time online scenario to validate the performance of the model. Volume.04, IssueNo.25, July-2015, Pages: 4879-4883

A Review of Disaster Recovery Techniques and Online Data Back-Up in Cloud Computing VII. REFERENCES [1] Xiaoyan Yin, Javier Alonso, Fumio Machida, Ermeson. C. Andrade, Kishor S. Trivedi, Availability Modeling and Analysis for Data Backup and Restore Operations IEEE Transactions on Dependable and Secure Computing, Vol. 11, no. 4, July/August 2014. [2] Karel Burda, Mathematical Model of Data Backup and Recovery, International Journal of Computer Science and `Network Security, VOL.14 No.7, July 2014. [3] Xiaoyan Yin, Javier Alonso, Fumio Machida, Ermeson. C. Andrade, Kishor S. Trivedi, Availability Modeling and Analysis for Data Backup and Restore Operations Proceedings of the 2012 IEEE 31st IEEE International Symposium on Reliability Distributed Systems, Pages 141-150, IEEE Computer Society Washington, DC, USA 2012. [4] Anne-Marie Kermarrec, Erwan Le Merrer,, Nicolas Le Scouarnec, Romaric Ludinard, Patrick Maillé c, Gilles Straub, Alexandre Van Kempen Performance evaluation of a peer-to-peer backup system using buffering at the edge Computer Communications 52 (2014) 71 81, 2014. [5] Ludmila Cherkasova, Alex Zhang, Xiaozhou Li DP+IP = Design of Efficient Backup Scheduling, International Conference on Network and Service Management (CNSM), 2010. [6] Cunhua Qian and Yingyan Huang, Optimal Backup Interval for a Database System with Full and Periodic Incremental Backup Journal of Computers, Vol. 5, no. 4, April 2010. [7] Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, and Minyi Guo Restoration Probability Modeling for Active Restoration-Based Optical Networks with Correlation among Backup Routes, IEEE transactions on Parallel and Distributed Systems, Vol. 18, no. 11, November 2007. [8] Kishor s. Trivedi, Analyses Using Stochastic Reward Nets, IBM Corporation, Research Triangle P ark, North Carolina, 1995. [9] Kruti Sharma, Kavita R Singh, Online Data Back-up and Disaster Recovery Techniques in Cloud Computing: A Review, [10] Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, and Minyi Guo, Restoration Probability Modeling for Active Restoration-Based Optical Networks with Correlation among Backup Routes IEEE transactions on parallel and distributed systems, vol. 18, no. 11, november 2007. [11] Lorrie A. Tomek, Analyses Using Stochastic Reward Nets, Software Fault T olerance, Edited by Lyu, 1995. [12] K. Keeton and A. Merchant, A Framework for Evaluating Storage System Dependability, Proc. Int l Conf. Dependable Systems and Networks (DSN 04), pp. 877-886, 2004. [13] L. Cherkasova, A. Zhang, and X. Li, DPþIP¼Design of Efficient Backup Scheduling, Proc. Int l Conf. Network and Service Management (CNSM), pp. 118-125, 2010. [14] EMC Backup Advisor, http://www.emc.com/produc ts/detail/software/backupadvisor.htm, 2013. [15] Symantec Backup Exec, http://www.syman tec.com/ backup-exec, 2012. Volume.04, IssueNo.25, July-2015, Pages: 4879-4889