Open Access
Bulut Bilişimde Felaket Kurtarma Tekniklerinin İncelenmesi
Abdülkadir Özdemir1*, Baki Gökgöz2
1Atatürk University, Erzurum, Turkey
2Gümüşhane Üniversity, Gümüşhane, Turkey
* Corresponding author: aaaa@gmail.com

Presented at the 2nd International Symposium on Innovative Approaches in Scientific Studies (ISAS2018-Winter), Samsun, Turkey, Nov 30, 2018

SETSCI Conference Proceedings, 2018, 3, Page (s): 202-213 , https://doi.org/

Published Date: 31 December 2018    | 1359     11

Abstract

Nowadays, very large quantities of data are produced both individually and
institutionally. These data must be preserved very well in order to be able to access and process
them as needed. This situation necessitates data recovery services in possible disaster scenarios
that could cause data loss. Cloud computing technology has created a new computing platform
in today's world. A lot of private data is produced on the main cloud, which is the nature of
Cloud Computing. These data can be vital information for individuals and institutions. For this
reason, the necessity of data recovery services is increasing day by day. However, there is a
need to develop an efficient and effective data recovery technique. The goal of the recovery
technique is to ensure that the user has access to the relevant data from another backup server
when the data on the server is corrupted and the user can not reach the data on the server. To
this end, many different data recovery techniques have been proposed to date. The purpose of
this study is to examine the powerful and useful data recovery techniques used in the field of
cloud computing. The purpose of this study is to examine the powerful data backup and
recovery techniques used in cloud computing.  

Keywords - Cloud Computing, disaster recovery techniques, data security, backup

References

[1] Dan C. Marinescu, Cloud Computing Theory and Practice
[2] Mell P. & Grance T. (2011). thenistdefinition of cloudcomputing, NIST Special Publication 800-145
[3] I. Foster, Y. Zhao, I. Raicu, S. Lu, “Cloudcomputingandgridcomputing 360-degree compared”, Grid Computing Environments Workshop, Austin, 1-10, 2008
[4] Mr. Akshay A. Gharat, Mr. Devendra E. Mhamunkar Disaster Recovery in Cloud Computing International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume 4 Issue 5, May 2015
[5] Kashiwazaki, H. (2012). Practicaluses of cloudcomputingservices in a Japaneseuniversity of theartsagainstaftermath of the 2011 Tohokuearthquake.
Proceedings of the ACM SIGUCCS 40th annualconference on Special interestgroup on universityandcollegecomputingservices(pp. 49-52)
[6]Prakash, S.,Mody, S., Wahab, A., Swaminathan S., &Ramani (2012).
Disasterrecoveryservices in thecloudforSMEs. IEEE International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM) (pp. 139-144). http://dx.doi.org/10.1109/ICCCTAM.2012.6488087
[7] M.J. Shoer, The 5 Most Common Causes of Data Loss, Internet & Telephone Blog. https://www.itllc.net/it/the-5-most-common-causes-of-data-loss/
[8] Mr.A.Srinivas, Y.Seetha Ramayya, B.Venkatesh A Study on Cloud Computing Disaster Recovery International Journal of Innovative Research in Computer and
Communication Engineering(Vol. 1, Issue 6, August 2013).
[9] Kimberly Keeton, Dirk Beyer, Ernesto Brau, Arif Merchant, Cipriano Santos, and Alex Zhang. On the road to recovery: restoring data after disasters. European Conference on ComputerSystems, 40(4), 2006
[10] Javaraiah, V. (2011). Back up for cloud and disaster recovery for consumers and SMBs. IEEE 5th International Conference on Advanced Networks
andTelecommunicationSystems (ANTS) (pp. 1-3). http://dx.doi.org/10.1109/ANTS.2011.6163671
[11] Alhazmi, O. H., & Malaiya, Y. K. (2013). Evaluating disaster recovery plans using the cloud. Reliability and Maintain ability Symposium (RAMS), IEEE
ProceedingsAnnual(pp. 1-6). http://dx.doi.org/10.1109/RAMS.2013.6517700
[12] Pokharel, M., Lee, S., & Park, J. S. (2010). Disaster Recovery for System Architecture using Cloud Computing. 10th IEEE/IPSJ International Symposium on Applications andthe Internet (SAINT) (pp. 304-307).
[13] Khan, J. I.,&Tahboub, O. Y. (2011). Peer-to-Peer Enterprise Data Backupover a Ren Cloud. IEEE 8th International Conference on Information Technology: New
Generations (ITNG) (pp. 959-964). http://dx.doi.org/10.1109/ITNG.2011.164
[14] Patil, S. R.,Shiraguppi, R. M., Jain, B. P., & Eda, S. (2012). MethodologyforUsage of Emerging Disk toAmeliorateHybrid Storage Clouds. IEEE International Conference on Cloud Computing in EmergingMarkets (CCEM) (pp.1-5). http://dx.doi.org/10.1109/CCEM.2012.6354615
[15] Rudolph, C. G. (1990). Business Continuation Planning/Disaster Recovery: a Marketing Perspective. IEEE Communications Magazine, 28(6), 25-28.
[16] Wood, T.,Cecchet, E., &Ramakrishnan, K. K. (2010). Disasterrecovery as a cloud service: Economicbenefits&deploymentchallenges. 2nd USENIX Workshop on Hot
Topics in Cloud Computing (pp. 1-7).

SETSCI 2024
info@set-science.com
Copyright © 2024 SETECH
Tokat Technology Development Zone Gaziosmanpaşa University Taşlıçiftlik Campus, 60240 TOKAT-TÜRKİYE