You are on page 1of 3

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal |

ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep – Oct 2018

Cloud Computing in Data Backup and Data Recovery

Monisha. S1, Dr. S. Venkateshkumar2
Department of Computer Applications, Dr. Sns Rajalakshmi
shmi College of Arts & Science,
Coimbatore, Tamilnadu, India


Data backup and Disaster Recovery/Business 1. Dependency :
Continuity issues are appropriate essential in networks Data backup is on position of service providers as
since the importance and shared value of digital data well. This problem makes dependency on CSPs
is continuously rising. Every organization requires for customers (such as organizations) and also loss
business continuity
tinuity plan or disaster recovery plan and of data because of disaster.
data backup which reduce within the cost constraints 2. Cost:
while achieving the target recovery requirements in Initializing cost amortized once a year cost.
terms of recovery time objective and recovery point Ongoing cost: storage cost, data transfer cost and
objective. The aim of this paper is to overview of giving out cost .Cost of potential disaster: Cost of
us techniques in data backup and disaster improved disasters and also cost of unrecoverable
recovery in the cloud environment. disaster
3. Failure Detection :
Keyword: Cloud Computing, Disaster Recovery, Failure detection time powerfully affects on the
Replication, Backup, Survey. organization downtime, so it is critical to detect
and information a failure as soon as potential for a
INTRODUCTION fast and correct DR.
Cloud computing becomes more popular in large large- 4. Security:
scale computing day by day suitable to its capability DR can be produced by nature or can be human-human
to share worldwide distributed resources. Users can made. Cyber-terrorism
terrorism attack is one of human-
access to cloud-based
based services throughout Internet made disasters which can be expert for many
around the world. Backup and recovery refers to the reasons. In this case,se, security and recovery of
ethod of backing up data in case of a loss and important data will be a main purpose in DR plans
setting up systems that allocate to data recovery due beside of system restoration.
to data loss. Backing up data requires replication and
archiving computer data, so that it is easy to get to in DISASTER RECOVERY SOLUTION:
case of data deletion or corruption. Data ffrom a Local Backup:
previously time may only be recovered if it has been Local storage can be updated through a protected
backed up. Data backup is a form of disaster recovery channel. By this technique, migration between cloud
and should be part of any disaster recovery service
vice providers and also relocation between public
arrangement. to private, and private to public is possible. In the
experience of a disaster, local backup can supply the
DISASTER RECOVERY: services that were served by the service provider.
A disaster is an unpredicted event in a system
lifetime. It can be made by environment (like the Inter-Private
Private Cloud Storage (IPCS):
tsunami and earthquake), hardware/software failures. Users data
ata should be stored in three different
based DR solution is an increasing tendency environmental locations: Servers, Local backup server
because of its ability to accept disasters and to achieve (LBS) and remote backup server (RBS).
the consistency and availability.

@ IJTSRD | Available Online @ | Volume – 2 | Issue – 6 | Sep-Oct

Oct 2018 Page: 865
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
In some respects cloud servers work in the same way The remote cloud must have the reliability
as physical servers but the functions they give can be characteristics. Because in cloud computing the main
very different. There are two main options for hosting. cloud stores the complete data and each client is
 Shared hosting independent on the main cloud for each and every
 Dedicated hosting small amount of data; therefore
the the cloud and
remote backup cloud must participate a reliable
 Shared hosting : role.
Shared hosting is the cheaper selection whereby
servers are shared between the hosting provider’s Cost effectiveness:
clients. One client’s website
te will be hosted on The cost for execution of remote server and its
the same server as websites belong to other recovery & back-up up technique also play an
clients. important role while creating the structure
stru for
 Dedicated hosting : main cloud and its reporter remote cloud.
Dedicated hosting is a much more difficult form
of hosting, whereby clients obtain whole physical CLOUD SERVICE MODELS:
servers. Software as a Service (SaaS):
SaaS is a group of application and software; it allows
BACKUP REPOSITORY: the clients to give to the software instead of purchase
The main cloud is termed as the central depository it.. Software application is available as service to the
and remote backup cloud is termed as Backup customer based on their demand. Twitter, Face book,
repository. And if the central repository misplaced whatsapp provide Software as a service.
its data under any situation either of any natural
disaster (for ex -earthquake,
earthquake, flood, fire etc.) or by Platform as a Service (PaaS):
human attack or deletion that has been done This model provide platform as a service. This
incorrectly and then it uses the in sequence from provides clients to develop his own application using
the remote repository. the tools and program languages. This service is
hosted in cloud and right of entry by clients using
The Remote backup services should cover the internet. Google
le App engine, Amazon provides the
subsequent issues: platform as service.
 Privacy and ownership.
 Relocation of servers to the cloud. Infrastructure as a Service (IaaS):
 Data security. This model provides the common resource services.
 Reliability. It provides the computing communications like
 Cost effectiveness. storage, virtual machine, network connection,
bandwidth, IP address.
ss. IaaS is complete package for
Privacy and ownership: computing.
Different clients access the cloud with their similar
login or after any verification process. They are CLOUD DEPLOYMENT MODELS:
liberally allowed to upload their private and  Public Cloud: A public cloud is available to any
necessary data on the cloud. client with an internet ability, is less secure
than the private cloud because it can be access
Relocation of server: by general public.
For data recovery there must be transfer of server to  Private Cloud: Private cloud is available to a
the cloud. The Relocation of server means to remove specific organization so that the user who belong
main server’s data to another server however the new to that organization can have access the data. It
of location is unidentified to the client. is more secure than the public
 Hybrid Cloud: The hybrid cloud is basically
Data security: combination of no less ss than two clouds such
The client’s data is stored at central repository with as combination of private, community or public
complete security. cloud.

@ IJTSRD | Available Online @ | Volume – 2 | Issue – 6 | Sep-Oct

Oct 2018 Page: 866
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
 Community Cloud: Community cloud allows the organization, certainly preferable to spending valuable
property and system to be accessible by quantity time and resources to try and recover data manually.
of associated organization. Positive backup and recovery services are provide ata a
small yearly cost.
Cloud Storage is a PaaS, and requirements careful REFERENCES:
planning and a thorough implementation. This 1. Vic (J. R) Winkler. Securing the cloud - cloud
requires using an included adoption of multiple Computer Security Techniques and Tactics.
vendors’ solutions. Cloud Storage is an area to Elsevier Inc, 2011.
experience fast growth in user requirements and disk
2. Abdul Nasir Khan, M. L. Mat Kiah, Sammie U.
space use. Therefore, it must be easy to use, and able Khan, Sajjad A. Madani. Towards secure mobile
to manage with an increasing demand.
cloud computing: A survey.
urvey. Future Generation
Computer Systems (2012),
There are three data services are
 Backup Automation
 Data recovery 3. J. Sinduja, S. Prathiba. Modified Security Frame
 Data migration Work for PIR cloud Computing Environment.
International Journal of Computer Science and
 BACKUP AUTOMATION : Mobile Computing-2013.
Cloud Storage uses a number of enterprise 4. Clara Leonard. PRISM: la NSA argumente, le
solutions such as Iomega/EMC, Lacie, Western Guardian fait de nouvelles revelations.
Digital and HP to distribute a fast and consistent From
automation services. The experiment performs lansaargumente-le-guardian
backup automation between 1,000 and 10,000 nouvellesrevelations-39791924.htm.
39791924.htm. ZDNet, Jun
files, which are available in the accessible system 28, .2013.
2013. consulted Nov 20, 2013.
for user support.
 DATA RECOVERY : 5. Glenn Greenwald, Ewen MacAskill,
MacA Laura
Data recovery is an significant service to recover Poitras. Edward Snowden: the whistleblower
lost data due to accidents or emergency services. behind the NSA surveillance revelations.
In the previous experience, it took two weeks to
recover 5 TB of data for disaster recovery as iit dwardsnowdennsa-whistleblowersurveillance.
whistleblowersurveillance. The
requires different skill and systems to retrieve data Guardian, jun 10, 2013.
and restore good quality data back to Cloud
services. Data archived as Virtual Machines or 6. Almokhtar Ait El Mrabti, Anas Abou El Kalam,
Virtual Storage speed up recovery process. Abdellah Ait Ouahman. Data Security In The
 DATA MIGRATION : Multi-Cloud.
Cloud. The International Conference On
Data migration is common amongst Clouds and is Networked Systems May 2-4,
2 2013, Marrakech,
also applicable to data exhaustive research. When Morocco. The First International Workshop on
there are more organizations going for private Security Policies in cloud Environment
cloud deployment, data migration between Clouds (PoliCE2013)
is common and may authority the way service 7. Keiko Hashizume, David G Rosado, Eduardo
delivery. But there is no analysis the impact of Fernndez-Medina,
Medina, Eduardo B Fernandez. An
moving single large
arge documents between private analysis of security issues for cloud computing.
clouds. Hashizume et al. Journal of Internet Services and
Applications. SpringerOpen Journal. 2013, 4:5
8. A. B. Chougule, G. A. Patil. Implementation and
In Cloud Computing has been the need for condition
alysis of EFRS Technique for Intrusion
of security features of data, especially now that data is
Tolerance in Distributed Systems. IJCSI
getting stored and shared on the cloud. Therefore
International Journal of Computer Science Issues,
backup and recovery services have become a
Vol. 8, Issue 4, No 1, July 2011.
mplete requirement when it comes to management
of data. It is most capable way to approach data

@ IJTSRD | Available Online @ | Volume – 2 | Issue – 6 | Sep-Oct

Oct 2018 Page: 867