scholarly journals Disaster Recovery in Cloud Computing: A Survey

2014 ◽  
Vol 7 (4) ◽  
pp. 39 ◽  
Author(s):  
Mohammad Ali Khoshkholghi ◽  
Azizol Abdullah ◽  
Rohaya Latip ◽  
Shamala Subramaniam ◽  
Mohamed Othman

Disaster recovery is a persistent problem in IT platforms. This problem is more crucial in cloud computing, because Cloud Service Providers (CSPs) have to provide the services to their customers even if the data center is down, due to a disaster. In the past few years, researchers have shown interest to disaster recovery using cloud computing, and a considerable amount of literature has been published in this area. However, to the best of our knowledge, there is a lack of precise survey for detailed analysis of cloud-based disaster recovery. To fill this gap, this paper provides an extensive survey of disaster recovery concepts and research in the cloud environments. We present different taxonomy of disaster recovery mechanisms, main challenges and proposed solutions. We also describe the cloud-based disaster recovery platforms and identify open issues related to disaster recovery.

2018 ◽  
Vol 7 (2.32) ◽  
pp. 100
Author(s):  
Dr K.Ravindranath ◽  
N Raghupriya ◽  
P Krishna Vamsi ◽  
D Sharath Kumar

In Today's world information been produced in huge sum, which requires data recovery assistance. The cloud service providers give security to the client  regardless  of  the  possibility  that systems are down, because of disaster. A lot of private information is produced which is put away in cloud. In this manner, the need for recovery of data services are developing in an order and needs an advancement of an well-organized powerful data rescue strategies, when  information is lost in a disaster. The motivation behind recovery strategy to support client from gathering data from any alternate server whenever that server lost information and incapable to provide information to the client. On the way to accomplish the reason, numerous diverse procedures have been proposed. In circumstances like Flood, Fire, seismic tremors or any equipment glitch or any accidental deletion of information may never again remain accessible. The target of this recovery is to condense the intense data recovery procedures that are utilized as a part of cloud computing area. It additionally describes the cloud-based disaster recovery stages and recognize open issues identified with disaster recovery. 


2019 ◽  
Vol 8 (3) ◽  
pp. 4978-4982

The evolution of cloud computing over the past few years is potentially one of the major advances in the history of computing. Cloud computing theoretically provides all computing needs as services. Accordingly, a large number of cloud service providers exist and the number is constantly increasing. This presents a significant problem for a user to find a relevant service provider, and calls for developing a specialized search engine to help users select suitable services matching their needs. Towards this goal, we developed a search engine that crawls the web sites of various service providers, extracts service attributes from their JavaScript Object Notation (JSON) files and normalizes the attributes in a service table. Those attributes are clustered using one of three different algorithms (K-means, K-medoids, and ISODATA). The requirements of a given user are then matched against the centroids of the various clusters to help obtain the closest match. In this paper, we compared the three algorithms with respect to time and accuracy. The ISODATA algorithm exhibited the best performance.


2018 ◽  
Vol 2 (2) ◽  
pp. 51-54
Author(s):  
E.O. Opoku

Ghana has attained cloud readiness indices facilitating services adoption by local enterprises through brokerage firms. Accordingto Gartner group by 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages,rather than directly with service providers. It means enterprises must identify local cloud brokerage firms to intermediate for cloudclients and service providers. We aimed at surveying cloud service awareness among enterprises in Ghana. We performed fieldstudy using statistical tool to analyze data collected among 45-participants spread across 20 local enterprises, using purposivesampling in the selection of strategic enterprise managers located in the second largest city, Kumasi, Ghana. We employedDelphi technique involving three Information Technology experts to validate responses in reducing margin of error in the analysis.We found that 67% respondents are unaware of local cloud service brokerage firms. Alternatively, 33% respondents mentioned atleast one local cloud brokerage firm; although experts believed some did a chess guessing to have it correct. Our Delphi expertsattributed this alarming percentile to lack of policy stakeholders involvement in ensuring cloud adoption readiness. We concludedon effective sensitization of cloud computing service adoption in optimizing data center proliferation by enterprises in Ghana.Adopting cloud computing over data center helps in reducing global warming contributed by heat emissions from computingservers.


2015 ◽  
pp. 1702-1720
Author(s):  
Yoshito Kanamori ◽  
Minnie Yi-Miin Yen

Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSPs) are able to unite their efforts and address a much broader business space. As a result, confusion has emerged and questions have risen from both Information Technology (IT) and business communities. How cloud environments differ from traditional models, and how these differences affect their adoption are of major importance. In this chapter, the authors first clarify misperceptions by introducing the new threats and challenges involved in cloud environments. Specifically, security issues and concerns will be depicted in three practical scenarios designed to illuminate the different security problems in each cloud deployment model. The chapter also further discusses how to assess and control the concerns and issues pertaining to the security and risk management implementations.


2020 ◽  
pp. 519-546
Author(s):  
Mohammad Shalan

Cloud Computing (CC) services have made substantive advances in the past few years. It is rapidly changing the landscape of technology, and energizing the long-held promise of utility computing. Successful jump into CC is a considerable task, since the surroundings are not yet mature and the accompanied risk and governance frameworks are still evolving. This effort aims to portray an identity for CC services by employing risk and governance directions among other elements and techniques. Cloud Service Footprint (CSF) is considering practical aspects surrounding the CC paradigm and prescribing the associated directions. CSF will help Cloud Service Providers (CSPs) to characterize their service and benchmark themselves. The Client Enterprises (CEs) can utilize CSF dimensions to find a better way to navigate through CC service arena and to understand its parameters. Along with cost and functional capabilities, the Cloud Service Footprint (CSF) can provide enough information for business executives to evaluate CC services and make informed decisions.


Author(s):  
Yoshito Kanamori ◽  
Minnie Yi-Miin Yen

Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSPs) are able to unite their efforts and address a much broader business space. As a result, confusion has emerged and questions have risen from both Information Technology (IT) and business communities. How cloud environments differ from traditional models, and how these differences affect their adoption are of major importance. In this chapter, the authors first clarify misperceptions by introducing the new threats and challenges involved in cloud environments. Specifically, security issues and concerns will be depicted in three practical scenarios designed to illuminate the different security problems in each cloud deployment model. The chapter also further discusses how to assess and control the concerns and issues pertaining to the security and risk management implementations.


2016 ◽  
Vol 6 (4) ◽  
pp. 83-96 ◽  
Author(s):  
Akashdeep Bhardwaj ◽  
Sam Goundar

Cloud Computing has emerged as the prime IT computing model for an on-demand access using a pool of shared resources with least IT support. Cloud computing is starting to replace the legacy office IT infrastructure and helpdesk support system. Corporate and home users alike are turning into cloud service consumers in a huge way and moving their data and work to the cloud. Therefore, the CSA between the cloud service consumers and cloud service providers has critical significance that can guarantee the highest-level service quality and delivery. The current CSA fall short on the service delivery commitments with no common terminology or standard followed industry wide by the cloud service providers. Comparing agreements from multiple cloud service providers continues to be an issue. This paper provides a pragmatic approach for Cloud Service Agreements, comparing the current process with the proposed parameters and the new framework for CSA to determine the role of various elements and terms in the decision-making process for cloud service agreements for SaaS, PaaS, IaaS and STaaS.


Author(s):  
Mohammad Shalan

Cloud Computing (CC) services have made substantive advances in the past few years. It is rapidly changing the landscape of technology, and energizing the long-held promise of utility computing. Successful jump into CC is a considerable task, since the surroundings are not yet mature and the accompanied risk and governance frameworks are still evolving. This effort aims to portray an identity for CC services by employing risk and governance directions among other elements and techniques. Cloud Service Footprint (CSF) is considering practical aspects surrounding the CC paradigm and prescribing the associated directions. CSF will help Cloud Service Providers (CSPs) to characterize their service and benchmark themselves. The Client Enterprises (CEs) can utilize CSF dimensions to find a better way to navigate through CC service arena and to understand its parameters. Along with cost and functional capabilities, the Cloud Service Footprint (CSF) can provide enough information for business executives to evaluate CC services and make informed decisions.


2013 ◽  
Vol 4 (2) ◽  
pp. 38-53
Author(s):  
Ruay-Shiung Chang ◽  
Chih-Shan Liao ◽  
Chuan-Yu Liu

The development of cloud computing has advanced rapidly over the past few years. Benefiting from the dynamic characteristics of cloud computing, enterprises can purchase cloud services based on different aspects in order to save operating expenses. Many companies have seen the opportunities and changes in either cloud service providers or cloud service consumers. For the latter, with so many cloud providers to choose from, there is a need for an evaluation of standards to help find the most suitable service provider. In this paper, the essential factors of enterprise clouds are discussed. An evaluation model is defined, and a web-based enterprise cloud selection application is implemented.


Author(s):  
Jordan G. Powers ◽  
Kelly K. Werner ◽  
David O. Gill ◽  
Yuh-Lang Lin ◽  
Russ S. Schumacher

AbstractThe Weather Research and Forecasting (WRF) Model is a numerical weather prediction model supported by the National Center for Atmospheric Research (NCAR) to a worldwide community of users. In recognition of the growing use of cloud computing, NCAR is now supporting the model in cloud environments. Specifically, NCAR has established WRF setups with select cloud service providers and produced documentation and tutorials on running WRF in the cloud. Described here are considerations in WRF cloud use and the supported resources, which include cloud setups for the WRF system and a cloud-based tool for model code testing.


Sign in / Sign up

Export Citation Format

Share Document