Abstract
Nowadays to increase the efficiency, consistency and the quality of the organizations and to further extend the business world wide the digitization is followed in processing, storing and conveying the information. This in turn has also caused huge set of data flow paving way for the data recovery services. The cloud computing with the massive storage capabilities have become a predominantly used paradigm for data storage and recovery due to its on demand network access, elasticity, flexibility and pay as you go. Moreover to secure the information that is stored the information's are fragmented and stored. However this fragmentation process often occurs in the form of dispersed and scattered packages lacking proper order heightening the time and minimizing the efficiency of the recovery and information collection. To bring down the restoration time and enhance its efficiency the proposed method in the paper tries to reduce the fragmentation by minimizing the number of dispersed and scattered packages for this the paper utilizes the Hybridized Historical aware algorithm (HHAR) along with the cache aware filter to gather the historical information's associated with the back-up system and the identify the out of order containers respectively. Further the every data package is protected applying the advanced encryption standard by producing a key to authenticate the access of the data. The proposed model is simulated using the network simulator-II and the results obtained shows that the recovery time is enhanced by 95% and the restore performance is improved by 94.3%.
References
- Sharma, Kruti, and Kavita R. Singh. "Online data back-up and disaster recovery techniques in cloud computing: A review." International Journal of Engineering and Innovative Technology (IJEIT) 2, no. 5 (2012): 249-254.
- Cully, Brendan, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, and Andrew Warfield. "Remus: High availability via asynchronous virtual machine replication." In Proceedings of the 5th USENIX symposium on networked systems design and implementation, pp. 161-174. 2008.
- Ueno, Yoichiro, Noriharu Miyaho, Shuichi Suzuki, and Kazuo Ichihara. "Performance evaluation of a disaster recovery system and practical network system applications." In 2010 Fifth International Conference on Systems and Networks Communications, pp. 195-200. IEEE, 2010.
- Javaraiah, Vijaykumar. "Backup for cloud and disaster recovery for consumers and SMBs." In 2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS), pp. 1-3. IEEE, 2011.
- Palkopoulou, Eleni, Dominic A. Schupke, and Thomas Bauschert. "Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture." In 2011 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE, 2011.
- Kumar, T. Senthil. "Efficient resource allocation and QOS enhancements of IoT with FOG network." J ISMAC 1 (2019): 101-110.
- Praveena, A., and S. Smys. "Efficient cryptographic approach for data security in wireless sensor networks using MES VU." In 2016 10th international conference on intelligent systems and control (ISCO), pp. 1-6. IEEE, 2016.
- Shi, Yong, and Kai Qian. "LBMM: a load balancing based task scheduling algorithm for cloud." In Future of Information and Communication Conference, pp. 706-712. Springer, Cham, 2019.
- Smys, S., and Jennifer S. Raj. "A STOCHASTIC MOBILE DATA TRAFFIC MODEL FOR VEHICULAR AD HOC NETWORKS." Journal of Ubiquitous Computing and Communication Technologies (UCCT) 1, no. 01 (2019): 55-63.
- Xia, Wen, Hong Jiang, Dan Feng, Fred Douglis, Philip Shilane, Yu Hua, Min Fu, Yucheng Zhang, and Yukun Zhou. "A comprehensive study of the past, present, and future of data deduplication." Proceedings of the IEEE 104, no. 9 (2016): 1681-1710.
- Karthiban, K., and S. Smys. "Privacy preserving approaches in cloud computing." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 462-467. IEEE, 2018.
- Han, Dong, Ye Yan, and Tao Shu. "Context-aware distributed storage in mobile cloud computing." In 2015 IEEE Globecom Workshops (GC Wkshps), pp. 1-6. IEEE, 2015.
- Sridhar, S., and S. Smys. "A hybrid multilevel authentication scheme for private cloud environment." In 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1-5. IEEE, 2016.
- Kaur, Ravneet, Inderveer Chana, and Jhilik Bhattacharya. "Data deduplication techniques for efficient cloud storage management: a systematic review." The Journal of Supercomputing 74, no. 5 (2018): 2035-2085.
- Pandian, M. Durai. "ENHANCED NETWORK PERFORMANCE AND MOBILITY MANAGEMENT OF IOT MULTI NETWORKS." Journal of trends in Computer Science and Smart technology (TCSST) 1, no. 02 (2019): 95-105.
- Sakthivel, M., Karnajoy Santal, and K. Bhaskar Rao. "Fragmentation Study for Deduplication in cache Backup Storage."
- Shakya, Subarna. "AN EFFICIENT SECURITY FRAMEWORK FOR DATA MIGRATION IN A CLOUD COMPUTING ENVIRONMENT." Journal of Artificial Intelligence 1, no. 01 (2019): 45-53.
- Chhabraa, Nipun, and Manju Balab. "Study of existing cloud data storage Techniques with respect to optimized Duplication: Deduplication." (2019).
- Abdullah, Ako Muhamad. "Advanced encryption standard (AES) algorithm to encrypt and decrypt data." Cryptography and Network Security 16 (2017).
- https://www.rfwireless-world.com/Tutorials/traditional-storage-vs-cloud-storage.html
