Data backup and Disaster Recovery Business Continuity issues are appropriate essential in networks since the importance and shared value of digital data is continuously rising. Every organization requires business continuity plan or disaster recovery plan and data backup which reduce within the cost constraints while achieving the target recovery requirements in terms of recovery time objective and recovery point objective. The aim of this paper is to overview of various techniques in data backup and disaster recovery in the cloud environment. Monisha. S | Dr. S. Venkateshkumar "Cloud Computing in Data Backup and Data Recovery" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18652.pdf
Data backup and Disaster Recovery Business Continuity issues are appropriate essential in networks since the importance and shared value of digital data is continuously rising. Every organization requires business continuity plan or disaster recovery plan and data backup which reduce within the cost constraints while achieving the target recovery requirements in terms of recovery time objective and recovery point objective. The aim of this paper is to overview of various techniques in data backup and disaster recovery in the cloud environment. Monisha. S | Dr. S. Venkateshkumar "Cloud Computing in Data Backup and Data Recovery" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18652.pdf
Monisha. S1, Dr. S. Venkateshkumar2 1 IIIMCA, 2Head Department of Computer Applications, Dr. Sns Rajalakshmi shmi College of Arts & Science, Coimbatore, Tamilnadu, India
ABSTRACT DISASTER RECOVERY CHALLENGES:CHALLENGE
Data backup and Disaster Recovery/Business 1. Dependency : Continuity issues are appropriate essential in networks Data backup is on position of service providers as since the importance and shared value of digital data well. This problem makes dependency on CSPs is continuously rising. Every organization requires for customers (such as organizations) and also loss business continuity tinuity plan or disaster recovery plan and of data because of disaster. data backup which reduce within the cost constraints 2. Cost: while achieving the target recovery requirements in Initializing cost amortized once a year cost. terms of recovery time objective and recovery point Ongoing cost: storage cost, data transfer cost and objective. The aim of this paper is to overview of giving out cost .Cost of potential disaster: Cost of various us techniques in data backup and disaster improved disasters and also cost of unrecoverable recovery in the cloud environment. disaster 3. Failure Detection : Keyword: Cloud Computing, Disaster Recovery, Failure detection time powerfully affects on the Replication, Backup, Survey. organization downtime, so it is critical to detect and information a failure as soon as potential for a INTRODUCTION fast and correct DR. Cloud computing becomes more popular in large large- 4. Security: scale computing day by day suitable to its capability DR can be produced by nature or can be human-human to share worldwide distributed resources. Users can made. Cyber-terrorism terrorism attack is one of human- human access to cloud-based based services throughout Internet made disasters which can be expert for many around the world. Backup and recovery refers to the reasons. In this case,se, security and recovery of method ethod of backing up data in case of a loss and important data will be a main purpose in DR plans setting up systems that allocate to data recovery due beside of system restoration. to data loss. Backing up data requires replication and archiving computer data, so that it is easy to get to in DISASTER RECOVERY SOLUTION: case of data deletion or corruption. Data ffrom a Local Backup: previously time may only be recovered if it has been Local storage can be updated through a protected backed up. Data backup is a form of disaster recovery channel. By this technique, migration between cloud and should be part of any disaster recovery service vice providers and also relocation between public arrangement. to private, and private to public is possible. In the experience of a disaster, local backup can supply the DISASTER RECOVERY: services that were served by the service provider. A disaster is an unpredicted event in a system lifetime. It can be made by environment (like the Inter-Private Private Cloud Storage (IPCS): tsunami and earthquake), hardware/software failures. Users data ata should be stored in three different Cloud-based based DR solution is an increasing tendency environmental locations: Servers, Local backup server because of its ability to accept disasters and to achieve (LBS) and remote backup server (RBS). the consistency and availability.
Oct 2018 Page: 865 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 CLOUD SERVER CENTRAL REPOSITORY: Reliability: In some respects cloud servers work in the same way The remote cloud must have the reliability as physical servers but the functions they give can be characteristics. Because in cloud computing the main very different. There are two main options for hosting. cloud stores the complete data and each client is Shared hosting independent on the main cloud for each and every Dedicated hosting small amount of data; therefore the the cloud and remote backup cloud must participate a reliable Shared hosting : role. Shared hosting is the cheaper selection whereby servers are shared between the hosting provider’s Cost effectiveness: clients. One client’s website te will be hosted on The cost for execution of remote server and its the same server as websites belong to other recovery & back-up up technique also play an clients. important role while creating the structure stru for Dedicated hosting : main cloud and its reporter remote cloud. Dedicated hosting is a much more difficult form of hosting, whereby clients obtain whole physical CLOUD SERVICE MODELS: servers. Software as a Service (SaaS): SaaS): SaaS is a group of application and software; it allows BACKUP REPOSITORY: the clients to give to the software instead of purchase The main cloud is termed as the central depository it.. Software application is available as service to the and remote backup cloud is termed as Backup customer based on their demand. Twitter, Face book, repository. And if the central repository misplaced whatsapp provide Software as a service. ser its data under any situation either of any natural disaster (for ex -earthquake, earthquake, flood, fire etc.) or by Platform as a Service (PaaS): PaaS): human attack or deletion that has been done This model provide platform as a service. This incorrectly and then it uses the in sequence from provides clients to develop his own application using the remote repository. the tools and program languages. This service is hosted in cloud and right of entry by clients using The Remote backup services should cover the internet. Google le App engine, Amazon provides the subsequent issues: platform as service. Privacy and ownership. Relocation of servers to the cloud. Infrastructure as a Service (IaaS): Data security. This model provides the common resource services. Reliability. It provides the computing communications like Cost effectiveness. storage, virtual machine, network connection, bandwidth, IP address. ss. IaaS is complete package for Privacy and ownership: computing. Different clients access the cloud with their similar login or after any verification process. They are CLOUD DEPLOYMENT MODELS: liberally allowed to upload their private and Public Cloud: A public cloud is available to any necessary data on the cloud. client with an internet ability, is less secure than the private cloud because it can be access Relocation of server: by general public. For data recovery there must be transfer of server to Private Cloud: Private cloud is available to a the cloud. The Relocation of server means to remove specific organization so that the user who belong main server’s data to another server however the new to that organization can have access the data. It of location is unidentified to the client. is more secure than the public Hybrid Cloud: The hybrid cloud is basically Data security: combination of no less ss than two clouds such The client’s data is stored at central repository with as combination of private, community or public complete security. cloud.
Oct 2018 Page: 866 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Community Cloud: Community cloud allows the organization, certainly preferable to spending valuable property and system to be accessible by quantity time and resources to try and recover data manually. of associated organization. Positive backup and recovery services are provide ata a small yearly cost. CLOUD STORAGE: Cloud Storage is a PaaS, and requirements careful REFERENCES: planning and a thorough implementation. This 1. Vic (J. R) Winkler. Securing the cloud - cloud requires using an included adoption of multiple Computer Security Techniques and Tactics. vendors’ solutions. Cloud Storage is an area to Elsevier Inc, 2011. experience fast growth in user requirements and disk 2. Abdul Nasir Khan, M. L. Mat Kiah, Sammie U. space use. Therefore, it must be easy to use, and able Khan, Sajjad A. Madani. Towards secure mobile to manage with an increasing demand. cloud computing: A survey. urvey. Future Generation Computer Systems (2012), There are three data services are doi:10.1016/j.future.2012.08.003. Backup Automation Data recovery 3. J. Sinduja, S. Prathiba. Modified Security Frame Data migration Work for PIR cloud Computing Environment. International Journal of Computer Science and BACKUP AUTOMATION : Mobile Computing-2013. Cloud Storage uses a number of enterprise 4. Clara Leonard. PRISM: la NSA argumente, le solutions such as Iomega/EMC, Lacie, Western Guardian fait de nouvelles revelations. Digital and HP to distribute a fast and consistent Fromhttp://www.zdnet.fr/actualites/prism- Fromhttp://www.zdnet.fr/actualites/prism automation services. The experiment performs lansaargumente-le-guardian guardian-fait-de- backup automation between 1,000 and 10,000 nouvellesrevelations-39791924.htm. 39791924.htm. ZDNet, Jun files, which are available in the accessible system 28, .2013. 2013. consulted Nov 20, 2013. for user support. DATA RECOVERY : 5. Glenn Greenwald, Ewen MacAskill, MacA Laura Data recovery is an significant service to recover Poitras. Edward Snowden: the whistleblower lost data due to accidents or emergency services. behind the NSA surveillance revelations. In the previous experience, it took two weeks to http://www.theguardian.com/world/2013/jun/09/e recover 5 TB of data for disaster recovery as iit dwardsnowdennsa-whistleblowersurveillance. whistleblowersurveillance. The requires different skill and systems to retrieve data Guardian, jun 10, 2013. and restore good quality data back to Cloud services. Data archived as Virtual Machines or 6. Almokhtar Ait El Mrabti, Anas Abou El Kalam, Kal Virtual Storage speed up recovery process. Abdellah Ait Ouahman. Data Security In The DATA MIGRATION : Multi-Cloud. Cloud. The International Conference On Data migration is common amongst Clouds and is Networked Systems May 2-4, 2 2013, Marrakech, also applicable to data exhaustive research. When Morocco. The First International Workshop on there are more organizations going for private Security Policies in cloud Environment cloud deployment, data migration between Clouds (PoliCE2013) is common and may authority the way service 7. Keiko Hashizume, David G Rosado, Eduardo delivery. But there is no analysis the impact of Fernndez-Medina, Medina, Eduardo B Fernandez. An moving single large arge documents between private analysis of security issues for cloud computing. clouds. Hashizume et al. Journal of Internet Services and Applications. SpringerOpen Journal. 2013, 4:5 CONCLUSION: 8. A. B. Chougule, G. A. Patil. Implementation and In Cloud Computing has been the need for condition Analysis alysis of EFRS Technique for Intrusion of security features of data, especially now that data is Tolerance in Distributed Systems. IJCSI getting stored and shared on the cloud. Therefore International Journal of Computer Science Issues, backup and recovery services have become a Vol. 8, Issue 4, No 1, July 2011. complete mplete requirement when it comes to management of data. It is most capable way to approach data
A Descriptive Study to Assess the Knowledge Regarding Meditation among B.Sc. Nursing 4th Year Student at Baba Educational Society, Institute of Paramedical College of Nursing Chinhat, Lucknow
A Study to Assess the Effectiveness of Knowledge and Practice of Nurses Regarding the Intervention of Baby Friendly Hospital Initiative in Selected Hospitals in Gwalior, Madhya Pradesh
"Advancements in Machine Learning for Early Detection of Plant Diseases by Gayatri Rahangdale | Supesh Falke | Gauri Bharti | Shweta Dewalkar | Prof. Anupam Chaube | Prof. Rina Shirpurkar Link To Download Paper: https://www.ijtsrd.com/other-scientific-research-area/other/69417/advancements-in-machine-learning-for-early-detection-of-plant-diseases/gayatri-rahangdale #callforpaperinternationaljournal #ugclistofjournals #bestinternationaljournal Plant detection is a critical task in agricultural automation and environmental monitoring. It involves identifying and classifying plant species, diseases, or other relevant plant characteristics using various techniques, such as image processing, machine learning, and remote sensing. Advances in computer vision and artificial intelligence have enabled the development of robust plant detection systems capable of analyzing vast amounts of data in real time. These systems can be employed for applications such as precision agriculture, where acc
A Study to Assess the Effectiveness of Planned Teaching Programme on the Knowledge Regarding Family Planning Promotion Packages among Primary Postnatal Mothers at Selected Hospitals U.P.