Author:
Pandian Dr. A. Pasumpon,S. Dr. Smys
Abstract
Nowadays to increase the efficiency, consistency and the quality of the organizations and to further extend the business world wide the digitization is followed in processing, storing and conveying the information. This in turn has also caused huge set of data flow paving way for the data recovery services. The cloud computing with the massive storage capabilities have become a predominantly used paradigm for data storage and recovery due to its on demand network access, elasticity, flexibility and pay as you go. Moreover to secure the information that is stored the information’s are fragmented and stored. However this fragmentation process often occurs in the form of dispersed and scattered packages lacking proper order heightening the time and minimizing the efficiency of the recovery and information collection. To bring down the restoration time and enhance its efficiency the proposed method in the paper tries to reduce the fragmentation by minimizing the number of dispersed and scattered packages for this the paper utilizes the Hybridized Historical aware algorithm (HHAR) along with the cache aware filter to gather the historical information’s associated with the back-up system and the identify the out of order containers respectively. Further the every data package is protected applying the advanced encryption standard by producing a key to authenticate the access of the data. The proposed model is simulated using the network simulator-II and the results obtained shows that the recovery time is enhanced by 95% and the restore performance is improved by 94.3%.
Publisher
Inventive Research Organization
Reference20 articles.
1. [1] Sharma, Kruti, and Kavita R. Singh. "Online data back-up and disaster recovery techniques in cloud computing: A review." International Journal of Engineering and Innovative Technology (IJEIT) 2, no. 5 (2012): 249-254.
2. [2] Cully, Brendan, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, and Andrew Warfield. "Remus: High availability via asynchronous virtual machine replication." In Proceedings of the 5th USENIX symposium on networked systems design and implementation, pp. 161-174. 2008.
3. [3] Ueno, Yoichiro, Noriharu Miyaho, Shuichi Suzuki, and Kazuo Ichihara. "Performance evaluation of a disaster recovery system and practical network system applications." In 2010 Fifth International Conference on Systems and Networks Communications, pp. 195-200. IEEE, 2010.
4. [4] Javaraiah, Vijaykumar. "Backup for cloud and disaster recovery for consumers and SMBs." In 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS), pp. 1-3. IEEE, 2011.
5. [5] Palkopoulou, Eleni, Dominic A. Schupke, and Thomas Bauschert. "Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture." In 2011 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2011.
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Towards Improving Cloud Security and Performance by using Proposed Controlled Replication Model;2022 International Conference on Computer, Power and Communications (ICCPC);2022-12-14
2. Solving Data De-Duplication Issues on Cloud using Hashing and MD5 Techniques;2022 6th International Conference on Computing Methodologies and Communication (ICCMC);2022-03-29
3. Cloud Storage Performance Improvement Using Deduplication and Compression Techniques;2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT);2022-01-20
4. Analysing RSA and PAILLIER homomorphic Property for security in Cloud;Procedia Computer Science;2022
5. Ease and Handy Household Water Management System;Intelligent Data Communication Technologies and Internet of Things;2022