Access the full text.
Sign up today, get DeepDyve free for 14 days.
Chuanyi Liu, Yu Gu, Linchun Sun, Bin Yan, Dongsheng Wang (2009)
R-ADMAD: high reliability provision for large-scale de-duplication archival storage systemsProceedings of the 23rd international conference on Supercomputing
(2017)
A (2017) Study on disaster recovery in cloud environment, computing and communication technologies (WCCCT), https ://doi.org/10.1109/WCCCT
A. Mary, K. Chitra (2017)
Study on Disaster Recovery in Cloud Environment2017 World Congress on Computing and Communication Technologies (WCCCT)
Jin Li, Xinyi Huang, Jingwei Li, Xiaofeng Chen, Yang Xiang (2014)
Securely Outsourcing Attribute-Based Encryption with CheckabilityIEEE Transactions on Parallel and Distributed Systems, 25
Shang He, Qing-Hua Wu, Jon Saunders (2006)
A Novel Group Search Optimizer Inspired by Animal Behavioural Ecology2006 IEEE International Conference on Evolutionary Computation
M. Kalantar, Florian Rosenberg, James Doran, T. Eilam, Michael Elder, Fábio Oliveira, E. Snible, Tova Roth (2014)
Weaver: Language and runtime for software defined environmentsIBM J. Res. Dev., 58
Katarina Grolinger, Miriam Capretz, Emna Mezghani, E. Exposito (2013)
Knowledge as a Service Framework for Disaster Data Management2013 Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-zhi Gao, S. Yiu, Kai Chen (2017)
Multi-key privacy-preserving deep learning in cloud computingFuture Gener. Comput. Syst., 74
Jin Li, Yan Li, Xiaofeng Chen, P. Lee, W. Lou
Ieee Transactions on Parallel and Distributed Systems a Hybrid Cloud Approach for Secure Authorized Deduplication
S. Suguna, A. Suhasini (2015)
Enriched multi objective optimization model based cloud disaster recoveryJournal of modern science, 1
Jin Li, Jingwei Li, Xiaofeng Chen, Chunfu Jia, W. Lou (2015)
Identity-Based Encryption with Outsourced Revocation in Cloud ComputingIEEE Transactions on Computers, 64
S Suguna, A Suhasini (2015)
Enriched multi-objective optimization model based cloud disaster recoveryKarbala Int J Modern Sci, 1
Ibtihal Mouhib, D. Ouadghiri, Naanani Hassan (2017)
Homomorphic Encryption as a Service for Outsourced Images in Mobile Cloud Computing EnvironmentInt. J. Cloud Appl. Comput., 7
Ahmed Shawish, M. Salama (2014)
Cloud Computing: Paradigms and Technologies
A. Greenberg, James Hamilton, D. Maltz, Parveen Patel (2008)
The cost of a cloud: research problems in data center networksComput. Commun. Rev., 39
Data back up and recovery using Seed Block algorithm
Ping Li, Jin Li, Zheng-an Huang, Chong-zhi Gao, Wenbin Chen, Kai Chen (2018)
Privacy-preserving outsourced classification in cloud computingCluster Computing
R. Sindoori, V. Pallavi, P. Abinaya (2013)
An Overview of Disaster Recovery in Virtualization TechnologyJournal of Artificial Intelligence, 6
S. Suguna, A. Suhasini (2014)
Overview of data backup and disaster recovery in cloudInternational Conference on Information Communication and Embedded Systems (ICICES2014)
Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang (2018)
Secure attribute-based data sharing for resource-limited users in cloud computingComput. Secur., 72
H. Tizhoosh (2005)
Opposition-Based Learning: A New Scheme for Machine IntelligenceInternational Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06), 1
Divya, B. Kumar, R. Devi (2015)
A Hybrid Cloud Approach for Secure Authorized De-Duplication
S Suguna, A Suhasini (2014)
Overview of data backup and disaster recovery in cloudInf Commun Embed Syst (ICICES)
B. Gupta, D. Agrawal, S. Yamaguchi (2016)
Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security
M. Pokharel, Seulki Lee, Jong Park (2010)
Disaster Recovery for System Architecture Using Cloud Computing2010 10th IEEE/IPSJ International Symposium on Applications and the Internet
Feng Gu, K. Shaban, N. Ghani, S. Khan, M. Rahnamay-Naeini, M. Hayat, C. Assi (2015)
Survivable Cloud Network Mapping for Disaster Recovery SupportIEEE Transactions on Computers, 64
Alexander Lenk (2015)
Cloud Standby Deployment: A Model-Driven Deployment Method for Disaster Recovery in the Cloud2015 IEEE 8th International Conference on Cloud Computing
A Greenberg, J Hamilton, DA Maltz, P Patel (2008)
The cost of a cloud: research problems in data center networksACM SIGCOMM Comput Commun Rev, 39
Yu Gu, Dongsheng Wang, Chuanyi Liu (2014)
DR-Cloud: Multi-cloud based disaster recovery serviceTsinghua Science & Technology, 19
M. Caraman, S. Moraru, S. Dan, C. Grama (2012)
Continuous Disaster Tolerance in the IaaS clouds2012 13th International Conference on Optimization of Electrical and Electronic Equipment (OPTIM)
C. Stergiou, K. Psannis, Byung-Gyu Kim, B. Gupta (2018)
Secure integration of IoT and Cloud ComputingFuture Gener. Comput. Syst., 78
In cloud computing, enormous information storage is one of the great challenging tasks in term of reliable storage of sensitive data and quality of storage service. Among different cloud security issues, the data disaster recovery is the most critical issue. The motive of recovery technique is to help the user to collect data from any backup server when server lost his data and unable to provide data to the user. To achieve this purpose, many types of research develop different techniques. Therefore, in this paper, we propose a data disaster recovery process using Oppositional Group search optimizer (OGSO) algorithm which is mainly avoid the disaster in the cloud. The proposed data recovery process consists of four modules such as (1) file uploading module, (2) replica generation module, (3) data backup module and (4) disaster recovery module. At first, we split the data into a number of files and upload the file to the corresponding virtual machine using OGSO algorithm. After that, we generate the replica based on each file bandwidth. The replica is mainly used for data backup strategy. Finally, the user query based files are backup and retrieve based on replicas. The experimental results show that the proposed OGSO based data disaster recovery process is better than other approaches.
Journal of Ambient Intelligence and Humanized Computing – Springer Journals
Published: May 30, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.