Snapshot Based Disaster Recovery On Cloud
Snapshot Based Disaster Recovery On Cloud
Among them most common methods are seed block technology. This method is having two sequences. They are
algorithm, Parity cloud service, High distribution and rake Backup sequence and Recovery sequence. In Backup
technology, Shared backup router resources, efficient sequence users are storing data that are to be backed-up.
Routing grounded on taxonomy. Recovery sequence is used when a disaster occurs in the main
The seed block algorithm is defined as the time efficient server. Like any other methods this method has also got
algorithm that is used to recover the file. These algorithms certain limitations. Due to this limitation this method cannot
consist of several advantages like it maintains data integrity, be considered as a perfect data recovery mechanism.
solves problems in implementation, cost and complexity. The Although this method can be implemented in devices like
algorithm collects information from the user and then mobile phone, laptops etc., The cost of data recovery is very
recovers the file if the file has been deleted accidentally or high and there is also chance for increased redundancy.
intentionally. This Algorithm focuses on simplicity of the Cold and Hot Back-Up Strategy method was proposed by
back-up and recovery. Seed block algorithm mainly consists Lili Sun, Yang Yang [7]. It is a trigger-based back-up and
of a remote backup server, main cloud, and its clients. It uses recovery mechanism which becomes active when failure is
the concept of Exclusive– OR (XOR) operation of the detected. In CBSRS (Cold Backup Service Replacement
computing world. If the user loses his data from the main Strategy) recovery mechanism the trigger becomes active
cloud due to some reasons, the user can get back the original when a failure is detected (Service Failure) and when there is
file by EXORing the file with the seed block of that particular no failure trigger becomes inactive. But in HBSRS (Hot
file. In seed block algorithm, there will be always a random Backup Service Replacement Strategy) the process is
number and a unique id for the client and whenever client different. HBSRS method is also known as Transcendental
register in the main cloud then the random number and the Recovery Strategy, which is used in dynamic network. When
client id get EXORed each other in order to produce the seed the implementation of the process gets started, the backup
block algorithm for that particular client. services will remain in the activated state itself. Then the first
Whenever a client creates a file in the main cloud it is obtained results from the service will be used to make sure
stored in the main cloud. Then these main files are EXORed the successful implementation of service composition. The
with the seed block algorithm of that particular client. This main disadvantage of this mechanism is that as data increases
EXORed file is then stored in the form of a file on the remote the cost for implementation also increases.
server. If due to any reason, if the file gets destroyed then the Backup for Cloud and Disaster Recovery for Consumers
user can recover the original file by EXORing the file with and SMBs method was proposed by Vijaykumar Javaraiah
seed block algorithm of the corresponding to the client. The for data backup in the cloud and also for disaster recovery [8].
seed block algorithm gives more importance to the security In this method, the cost of backing up the data in cloud will be
issues, so that it protects the data without using any of the reduced and also protects the data from disaster. The process
existing encrypted techniques. Though it has got several of migrating the data from one cloud to another cloud is easy
advantages it also got demerits. The files that are stored in the in this process. Since consumers do not depend upon service
remote server uses the same space in the cloud which leads to providers in this method, it reduces the cost of recovering the
wastage of memory space. Thus, this method becomes data. The only thing that is used to recover the data in this
inefficient. The efficiency of this method can be increased by method is a hardware box.
applying compression techniques to the files. Rent out the Rented Resources method was proposed by
Sheheryar Malik [9]. Reducing the monetary cost of service
is the main aim of this model. This model has three phases as
follows:
1. Discovery
2. Matchmaking
Fig 1. Sample Output Image of SBA Algorithm 3. Authentication
Efficient Routing Grounded on Taxonomy method was This method uses the concept of cloud vendors that will
proposed by Paolo Messier [5]. The method is based on rent the resources from various ventures and immediately
semantic analysis. This method does not depend on time after the virtualization it will rent these resources to clients.
complexity. This model is made of 3 components: The parity cloud service model proposed by Chi-Won
1. (DHT) Distributed Hash Table Song [10]. This method provides high service for the
2. (SON) Semantic Overlay Network personal data. This method is different from other methods,
3. Measure of semantic similarity because in this method user need not to upload the data on the
This method provides an efficient way of retrieving data server. The recovery services that are provided by the client
that are based on semantic similarity. The semantic similarity side are stored within a reasonable bound. The main
is between service description’s and service requests. This disadvantage of this method is that its implementation
method proposes a semantic-driven query which will be complexity is high.
answered in a DHT based system by implementing a SON Shared Backup Router Resources method was proposed by
over DHT. The main disadvantage of this method is Eleni Palkopoulou [11].
increased time and implementation complexity.
Noriharu Miyaho has proposed High distribution and Rake
technology a Backup model called HS-DRT that uses the
concept of ultra-widely distributed data transfer mechanism
[6]. This mechanism has also got high speed encryption
Step 9: Convert the base64 string into .sql file. security of data. Resolving this issue will be an extension of
Step 10: Snapshot of the database created. this research. Fig. 7 presents time taken for creation of
Figure 6 presents the snapshots of the database with time snapshots in remote servers in a sample experiment.
intervals. Each time stamped snapshot can be a recovery
backup for the application.
REFERENCES
1. Barrie Sosinky, Cloud Computing Bible, Wiley India Pvt. Ltd, 2010.
2. S. Hamadah and D. Aqel, "A Proposed Virtual Private Cloud-Based
Disaster Recovery Strategy," 2019 IEEE Jordan International Joint
Conference on Electrical Engineering and Information Technology
(JEEIT), Amman, Jordan, 2019, pp. 469-473.
3. M. M. Alshammari, A. A. Alwan, A. Nordin and I. F. Al-Shaikhli,
"Disaster recovery in single-cloud and multi-cloud environments:
Issues and challenges," 2017 4th IEEE International Conference on
Engineering Technologies and Applied Sciences (ICETAS),
Salmabad, 2017, pp. 1-7.
4. K. Sharma and K. R. Singh, "Seed Block Algorithm: A Remote Smart
Data Back-up Technique for Cloud Computing," 2013 International
Conference on Communication Systems and Network Technologies,
Gwalior, 2013, pp. 376-380.
5. G. Pirró, P. Trunfio, D. Talia, P. Missier and C. Goble, "ERGOT: A
Semantic-Based System for Service Discovery in Distributed
Infrastructures," 2010 10th IEEE/ACM International Conference on
Cluster, Cloud and Grid Computing, Melbourne, VIC, 2010, pp.
263-272.
6. Y. Ueno, N. Miyaho, S. Suzuki and K. Ichihara, "Performance
Evaluation of a Disaster Recovery System and Practical Network
System Applications," 2010 Fifth International Conference on Systems
and Networks Communications, Nice, 2010, pp. 195-200.
7. L. Sun, J. An, Y. Yang and M. Zeng, "Recovery strategies for service
composition in dynamic network," 2011 International Conference on
Cloud and Service Computing, Hong Kong, 2011, pp. 60-64.
8. V. Javaraiah, "Backup for cloud and disaster recovery for consumers
and SMBs," 2011 Fifth IEEE International Conference on Advanced
Telecommunication Systems and Networks (ANTS), Bangalore, 2011,
pp. 1-3.
9. C. Song, S. Park, D. Kim and S. Kang, "Parity Cloud Service: A
Privacy-Protected Personal Data Recovery Service," 2011IEEE 10th
International Conference on Trust, Security and Privacy in Computing
and Communications, Changsha, 2011, pp. 812-817.
10. S. Malik and F. Huet, "Virtual Cloud: Rent Out the Rented Resources,"
2011 International Conference for Internet Technology and Secured
Transactions, Abu Dhabi, 2011, pp. 536-541.
11. E. Palkopoulou, D. A. Schupke and T. Bauschert, "Recovery Time
Analysis for the Shared Backup Router Resources (SBRR)
Architecture," 2011 IEEE International Conference on
Communications (ICC), Kyoto, 2011, pp. 1-6.
12. O. H. Alhazmi and Y. K. Malaiya, "Evaluating disaster recovery plans
using the cloud," 2013 Proceedings Annual Reliability and
Maintainability Symposium (RAMS), Orlando, FL, 2013, pp. 1-6.
AUTHORS PROFILE
Vishnu A, pursuing MSc Computer Science from the
Department of Computer Science, CHRIST (Deemed to
be University), Bengaluru, India. His area of research
interest is Cloud computing.