Cloud Data Backup & Recovery Solutions
Cloud Data Backup & Recovery Solutions
net/publication/368339722
CITATIONS READS
86 1,574
3 authors, including:
Jaganathan Logeshwaran
Sri Eshwar College of Engineering
164 PUBLICATIONS 4,949 CITATIONS
SEE PROFILE
All content following this page was uploaded by Jaganathan Logeshwaran on 08 February 2023.
Abstract. In general, the company sometimes uses unregistered functions in database, which significantly improves
performance, but does not leave the possibility of recovery except for backup. That is, actions must be performed
immediately after passing the session. A queue problem is likely to cause data loss and downtime of about a week.
In modern conditions, this can lead to the bankruptcy of the company. It can be seen that backup systems have been
installed and configured, but despite this, they have not succeeded in restoring within the time frame specified in
the SLA. In this study, a secured database monitoring method was proposed to improve data backup and recovery
operations in cloud computing. In this proposed method, the backup speed is directly proportional to the amount of
data, while having at least 30% annual data growth. In 3–4 years, the data at least doubled, but for some companies,
this number is even higher, while the backup speed does not change. Those terms and those SLAs that were relevant
3–4 years ago now need to be at least doubled. At the same time, business requirements for data recovery (recovery
point objective/recovery time objective) continue to grow.
Keywords: Database, performance, recovery, backup, operating system, queue, downtime.
INTRODUCTION are associated with the loss of some part of the data. At
the same time, traditional backup tools allow you to restore
All the business processes of the company are being trans- data directly from the backup, but often you need to restore
ferred to information technology, and the paper primary the entire system [11–13]. If your database is 15 TB, this will
(copies and originals of documents, reports, scans, etc.) is take several days [14]. In a world where the master sheet
disappearing [1, 2]. Everything revolves around IT sys- disappears and everything is stored in IT systems, every
tems, and data loss literally means losing everything [3]. second creates data that we want to protect immediately,
There is no more room for error. In the cases we presented, the moment it is created. But this cannot be done using
all the time, companies were unable to function due to the classic backup systems [15, 16]. Each data have a certain
unavailability of data due to various circumstances [4, 5]. length of time, and these data exist all over the world in
This led to direct and indirect losses, for example, rep- one copy [17].
utational losses, when the company could not carry out The customers want to continue to protect their data
its main business process, which is not easy to measure from the moment it appears [18]. When you decide to
in monetary terms but in the long run does not cause restore from a backup, you often need to restore a day
less damage to the company [6–8]. We have reflected on earlier and then have the data retrieved somewhere else
our observations regarding recovery time objective. As a day later [19, 20]. As a rule, this is a long task for
your data grow, the actual recovery time must also grow, administrators that takes several days [21]. With a very
and the SLA requirements become stricter [9]. The point negative development of events, it can lead to the loss of
where the actual graph time equals the required time has very important information [22]. Of course, the problem
already been sent to most clients [10]. In fact, most errors is not limited to backup; it is about the construction of
1
2 G. Ramesh et al.
the IT system as a whole, and the title in this case is so Table 1. The related issues and proposed suggestions.
important that it cannot be ignored [23, 24]. Unfortunately, Issues Proposed Suggestions
there are no cheap and quick options to check how well The IBS was misconfigured, Use Database Standby located
the backup was done [25]. Of course, this can be done and no test reconfigurations on a different queue. This will
with periodic test recoveries, but this is a very expensive were performed. allow some time to transition
operation in terms of human effort and IT resources [26]. It to the running data instance.
is the work of a separate team on a separate hardware [27]. There are no mechanisms for Database ZDLRA backup
Most of the customers do not do this. It often happens quick recovery in case of appliances will allow
disaster and redundant database restoration in a very
that everyone creates backups, but during restoration, it
systems. short period of time.
turns out that they could not have been done – despite
The number of attacks here Smart planning of backup
the outwardly correct operation of RMS, they cannot be was high because no clear DR and recovery processes can
restored [28, 29]. This happens for various reasons. This is plan was defined. avoid such huge losses and
best explained with an example [30]. A backup system is recover within a day.
a service subsystem of a data center and has the following
features:
• The backup process is not critical to solving IS prob- that this is only one part of your data protection strat-
lems. A failure of a backup system does not lead to egy [45]. A reserve parachute is not a silver bullet, as many
a reduction in the availability of critical information case studies prove that the approach to data protection
services [31]. must be comprehensive, so when developing it, we must
• The computational burden that the backup pro- consider where it will fit in the global strategy for data
cess creates is not beneficial to the provision of IS protection [46].
information services [32]. A system administrator maintains an inventory of
backup client computers, recording devices, and backup
Naturally, it was forgotten in the maintenance industry storage media and schedules backups. All this information
for many years. Thus, a part of the data is completely is contained in a special database stored on the backup
lost [33, 34]. It took several more days to completely recre- management server [47]. The management server instructs
ate the infrastructure services – no backups of operating the agent program installed on the client computer to start
systems, binaries, configurations, etc. [35]. All the missing backing up data according to the selected policy in accor-
information was collected from primary documents [36]. dance with the schedule or according to the operator’s
One of our customers used a SAP system with an Oracle command [48]. The agent program collects and transfers
database. The backup was carried out by inbuilt SAP tools the data to be backed up to the copy server specified by
with the help of huge vendors [37, 38]. Two different the management server [49]. The mechanism of action of
backup policies were configured: the first was file-based "snapshots" is different and can be implemented both in
and copied the data of operating and software systems, software on a production server and in hardware within
and the second was the database itself [39]. Since they were the array [50]. At the moment when the backup needs to
sent to the same system, an exclusion list was constructed be started, the agent program instructs the application to
and entered into the database [40]. The file policy takes this complete all transactions and save the cache memory [51].
list into account and does not allocate directories in the A fundamental challenge for any data center is implement-
database [41]. Due to the uniqueness of the architecture, ing a service level agreement between the IT department
the database backup policy ignored the list of exclusions and the business [52]. A key aspect of meeting business
and correctly copied the required data [42]. needs is the assurance of data security, so a data backup
and recovery system is an integrated infrastructure unit
RELATED WORKS of a properly organized data center’s data storage subsys-
tem [53]. This type of backup and recovery actually takes
An improper approach to the problem of backup is a a few seconds, which distinguishes this technology from
critical problem. Historically, the company or an integrator classical systems with foreign media [54]. The issues in the
built it. At the time of construction, it certainly met all existing systems and the proposed solutions are shown in
the requirements and performed its function perfectly [43]. Table 1.
Over the years, the enterprise IT landscape has changed. At
the same time, the backup system was simply adjusted as PROPOSED MODEL
the system evolved, and often no systematic approach was
followed, which would take into account the importance First, it is necessary to disconnect the backup and recovery
of system compliance with initial indicators in all sub- speed from the computer volume. Data storage systems,
sequent phases [44]. When developing a data protection application software, and RMS manufacturers recommend
system in your organization, you should take into account using some tools that can be used to solve this problem.
Secured Database Monitoring Method 3
For example, for less critical systems, the time interval for
backups can be reduced to a few hours. In this case, we
Figure 2. Components of centralized backup system.
use snapshots. They can act as a restore point that can
be done once per hour. Some modern arrays handle these
processes very well and can store large numbers of system
snapshots. This is a great way out of a situation where you The fourth is to reduce hidden errors. There is only one
need to step back for a while. For more critical systems, way to make sure that the backup is working correctly –
there may be no time interval, and data must be protected try to restore it. This is the most perfect and rarely used
continuously. There are many solutions of this class, for method by our clients. But we offer a way out of this situa-
example, Oracle Standby with Flash Back, which allows tion. First, have easily recoverable instances of computers.
you to roll back the database for a while by recording This is again a story about snapshot and standby systems
all changes. You can use Oracle ZDLRA PAK, which will that can be quickly deployed and tested. It takes incom-
receive almost synchronously all changes in database, or parably less time and effort than "unpacking" an entire
general purpose software and hardware systems. They backup. Of course, this does not always help; but in case of
record all changes and allow you to restore to any point an emergency, at least it gives a little more confidence that
in time. Regular backups can be an indispensable tool in the data can be recovered by these means. Second, some
the event of major disasters or the need to recover data SRCs allow automated testing. At a specific point in time
from long ago. However, in the present situation, it is only on a schedule, you can run virtual machines in an isolated
a reserve parachute, used at the last moment. The proposed environment and use predefined algorithms to verify that
model has the following important blocks (Figure 1): data have actually been retrieved, that the application is
available, that it is consistent, and that it is responding
• Backup to the necessary requests. In this way, administrators can
• Recovery be relieved of long, routine tasks. A centralized backup
• Content analysis system has a multi-layered architecture, which includes the
• Contextual search following, as shown in Figure 2:
• Mobile data access
• Seamless integration with the cloud • A backup management server that can also
• Information security tasks incorporate the functions of a data copy server.
4 G. Ramesh et al.
Figure 5. Comparison of storage device management. Figure 7. Comparison of data copy management.
CONCLUSION
To automate backup processes, special software is used
that controls the process of creating backups and the
recovery process and allows you to work with various
Figure 6. Comparison of server-less copy management. data carriers, including tape devices. What data should be
stored, where, and on which bandwidth? Additional fea-
tures of centralized backup software allow you to restore
another location over a network channel. The comparison individual characters and database tables without restor-
of storage device management is shown in Figure 5. ing the entire volume of data. Writing backups to tape
Server-less copy management: This method uses a VPN allows you to organize remote storage of backups and the
tunnel over the Internet. The advantage is that there is protection of critical data in the event of a disaster. Using
no need to transport the information somewhere; the tape media to store archival copies allows data to be read
disadvantage is the need to use a sufficiently wide channel 50 years after it was written. It will only be effective if done
(as a rule, it is costly) and protect the transmitted data regularly. If data change frequently, replication should also
(e.g., using the same VPN). Compression algorithms or be frequent. Therefore, rather than copying data manually,
deductive technology can significantly reduce the diffi- many prefer to use specialized software to automate this
culty in converting large amounts of data. The comparison process. Any computer has many risks that can lead to
of server-less copy management is shown in Figure 6. hardware failure and loss of important data. In the business
sector, this is even worse because the loss of business data
Data copy management: Separately, security measures results in huge losses and lost customers. When choosing a
should be taken when organizing data storage. First, it is backup program, it wants to make sure that you can easily
necessary to ensure that the data carriers are in a protected restore the data it wants.
6 G. Ramesh et al.
REFERENCES [17] Ramesh, G., Aravindarajan, V., Logeshwaran, J., Kiruthiga, T., &
Vignesh, S. (2022). Estimation analysis of paralysis effects for human
[1] Adhikari, N., Logeshwaran, J., & Kiruthiga, T. The Artificially nervous system by using Neuro fuzzy logic controller. Neuro
Intelligent Switching Framework for Terminal Access Provides Quantology, 20(8), 3195–3206.
Smart Routing in Modern Computer Networks. BOHR International [18] Ampera, D., & Fibriasari, H. (2021). Implementation of Cloud Com-
Journal of Smart Computing and Information Technology, 3(1), 45–50 puting System in Learning System Development in Engineering
[2] Zhang, Y., Xu, C., & Muntean, G. M. (2021, December). A Novel Dis- Education Study Program. International Journal of Education in
tributed Data Backup and Recovery Method for Software Defined- Mathematics, Science, and Technology (IJEMST), 9(4), 728–740.
WAN Controllers. In 2021 IEEE Global Communications Conference [19] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharanpravin,
(GLOBECOM) (pp. 01–06). IEEE. R. (2022). The role of integrated structured cabling system (ISCS)
[3] Gopi, B., Logeshwaran, J., Gowri, J., & Kiruthiga, T. (2022). The for reliable bandwidth optimization in high-speed communication
moment probability and impacts monitoring for electron cloud network. ICTACT Journal on Communication Technology, 13(01),
behavior of electronic computers by using quantum deep learning 2635–2639.
model. NeuroQuantology, 20(8), 6088–6100. [20] Jeslin, J. G., & Kumar, P. M. (2022). Implementing an Efficient Data
[4] Wang, Q. (2021, December). Cloud Data Backup and Recovery Deduplication Framework for Cloud Storage. Indian J. Comput. Sci.
Method Based on the DELTA Compression Algorithm. In 2021 Eng, 13, 136–144.
IEEE International Conference on Industrial Application of Artificial [21] Logeshwaran, J., Rex, M. J., Kiruthiga, T., & Rajan, V. A. (2017,
Intelligence (IAAI) (pp. 183–188). IEEE. December). FPSMM: Fuzzy probabilistic based semi morkov model
[5] J. Logeshwaran (2022, October). The Topology configuration of among the sensor nodes for realtime applications. In 2017 Inter-
Protocol-Based Local Networks in High speed communication net- national Conference on Intelligent Sustainable Systems (ICISS)
works. In Multidisciplinary Approach in Research, Vol. 15, pp. 78–83. (pp. 442–446). IEEE.
[6] Yao, L. (2022). Feasibility Study Report on Cloud Technology of [22] Zhao, J., Zhang, L., & Zhao, Y. (2022). Informatization of Accounting
High-Performance Self-Service Database. In Innovative Computing Systems in Small-and Medium-Sized Enterprises Based on Artificial
(pp. 1315–1323). Springer, Singapore. Intelligence-Enabled Cloud Computing. Computational Intelligence
[7] Ramesh, G., Logeshwaran, J., & Aravindarajan, V (2022). The Perfor- and Neuroscience, 2022.
mance Evolution of Antivirus Security Systems in Ultra dense Cloud [23] Raja, S., Logeshwaran, J., Venkatasubramanian, S., Jayalakshmi, M.,
Server Using Intelligent Deep Learning. BOHR International Journal Rajeswari, N., Olaiya, N. G., & Mammo, W. D. (2022). OCHSA:
of Computational Intelligence and Communication Network, 1(1), Designing Energy-Efficient Lifetime-Aware Leisure Degree Adaptive
15–19. Routing Protocol with Optimal Cluster Head Selection for 5G Com-
[8] Jin, D., & Wang, Q. (2021, January). CDP backup and recovery munication Network Disaster Management. Scientific Programming,
method for ensuring database consistency. In 2021 IEEE International 2022.
Conference on Power Electronics, Computer Applications (ICPECA) [24] Shaik, V., & Natarajan, K. (2021). Asynchronous Method of Oracle:
(pp. 722–728). IEEE. A Cost-Effective and Reliable Model for Cloud Migration Using
[9] Ramesh, G., Logeshwaran, J., Gowri, J., & Ajay Mathew (2022). Incremental Backups. In Data Science and Security (pp. 417–427).
The management and reduction of digital noise in video image Springer, Singapore.
processing by using transmission based noise elimination scheme. [25] Ramesh, G., Logeshwaran, J., & Rajkumar, K. (2022). The smart con-
ICTACT Journal on image and video processing, 13(1), 2797–2801. struction for image preprocessing of mobile robotic systems using
[10] Adee, R., & Mouratidis, H. (2022). A Dynamic Four-Step Data Secu- neuro fuzzy logical system approach. NeuroQuantology, 20(10),
rity Model for Data in Cloud Computing Based on Cryptography 6354–6367
and Steganography. Sensors, 22(3), 1109. [26] Belgacem, A. (2022). Dynamic resource allocation in cloud comput-
[11] Jasmine, J., Yuvaraj, N., & Logeshwaran, J. (2022, April). DSQLR- ing: analysis and taxonomies. Computing, 104(3), 681–710.
A distributed scheduling and QoS localized routing scheme for [27] Gopi, B., Ramesh, G., & Logeshwaran, J. (2022). An innovation
wireless sensor network. In Recent trends in information technology for energy release of nuclear fusion at short distance dielectrics in
and communication for industry 4.0, Vol. 1, pp. 47–60. semiconductor model. ICTACT Journal On Microelectronics, 8(3),
[12] Jing, F., Huang, D., Wang, Y., Lv, X., & Du, Q. (2021, September). 1430–1435.
Remote Sensing Data Backup and Recovery System for Power [28] Zhou, J., & Zou, W. (2021, June). Construction and application
Industry. In 2021 IEEE Intl Conf on Parallel & Distributed Process- of Wenhua education cloud based on Huawei FusionSphere. In
ing with Applications, Big Data & Cloud Computing, Sustainable 2021 IEEE International Conference on Artificial Intelligence and
Computing & Communications, Social Computing & Networking Computer Applications (ICAICA) (pp. 477–481). IEEE.
(ISPA/BDCloud/SocialCom/SustainCom) (pp. 1717–1723). IEEE. [29] Logeshwaran, J. (2021, December). AICSA - an artificial intelligence
[13] Logeshwaran, J., Adhikari, N., Joshi, S. S., Saxena, P., & Sharma, A. cyber security algorithm for cooperative P2P file sharing in social
(2022). The deep DNA machine learning model to classify the tumor networks. ICTACT Journal on Data Science and Machine Learning,
genome of patients with tumor sequencing. International Journal of 3(1), 251–253.
Health Sciences, 6(S5), 9364–9375 [30] Chang, D., Li, L., Chang, Y., & Qiao, Z. (2021). Cloud computing
[14] Ravimaran, S., & Sathish, A. (2021). Robust Security With Strong storage backup and recovery strategy based on secure IoT and spark.
Authentication in Mobile Cloud Computing Based on Trefoil Mobile Information Systems, 2021.
Congruity Framework. Journal of Organizational and End User [31] Logeshwaran, J., Malik, J. A., Adhikari, N., Joshi, S. S., & Bishnoi, P.
Computing (JOEUC), 33(6), 1–28. (2022). IoT-TPMS: An innovation development of triangular patient
[15] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharan Pravin, R. monitoring system using medical internet of things. International
(2022, February). SVPA - the segmentation based visual processing Journal of Health Sciences, 6(S5), 9070–9084
algorithm (SVPA) for illustration enhancements in digital video [32] Wang, F., Wang, H., & Xue, L. (2021, March). Research on data
processing (DVP). ICTACT Journal on Image and Video Processing, security in big data cloud computing environment. In 2021 IEEE
12(3), 2669–2673. 5th Advanced Information Technology, Electronic and Automation
[16] Smara, M., Aliouat, M., Harous, S., & Pathan, A. S. K. (2022). Robust- Control Conference (IAEAC) (Vol. 5, pp. 1446–1450). IEEE.
ness improvement of component-based cloud computing systems. [33] Gopi, B., Ramesh, G., & Logeshwaran, J. (2022). The fuzzy logical
The Journal of Supercomputing, 78(4), 4977–5009. controller based energy storage and conservation model to achieve
Secured Database Monitoring Method 7
maximum energy efficiency in modern 5g communication. ICTACT Communication: A Review. In 2019 Third International conference
Journal on Communication Technology, 13(3), 2774–2779. on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC)
[34] Tiwari, P. K., Pandey, S. K., Thamba Meshach, W., Parashar, J., Kumar, (pp. 51–55). IEEE.
A., Altuwairiqi, M., & Krah, D. (2022). Improved Data Security in [44] Raja, S., & Rajan, A. J. (2022). A Decision-Making Model for Selection
Cloud Environment for Test Automation Framework and Access of the Suitable FDM Machine Using Fuzzy TOPSIS. 2022.
Control for Industry 4.0. Wireless Communications and Mobile [45] Ramesh, G., Logeshwaran, J., Aravindarajan, V., & Feny Thachil.
Computing, 2022. (2022). Eliminate the interference in 5g ultra-wide band communi-
[35] Sekar, G., Sivakumar, C., & Logeshwaran, J. (2022). NMLA: The cation antennas in cloud computing networks. ICTACT Journal On
Smart Detection of Motor Neuron Disease and Analyze the Health Microelectronics, 8(2), 1338–1344.
Impacts with Neuro Machine Learning Model. NeuroQuantology, [46] Raja, S., Rajan, A. J., Kumar, V. P., Rajeswari, N., Girija, M., Modak,
20(8), 892–899. S., Kumar, R. V., & Mammo, W. D. (2022). Selection of Additive
[36] Peng, X., Song, Y., Yuan, K., Guo, X., Lu, Z., & Liu, J. (2022, Manufacturing Machine Using Analytical Hierarchy Process. 2022.
October). UCloudStack-A Private Cloud Platform for Lightweight [47] Gopi, B., Logeshwaran, J., Gowri, J., & Aravindarajan, V. (2022).
Delivery. In 2022 IEEE 7th International Conference on Smart Cloud The Identification of quantum effects in electronic devices based
(SmartCloud) (pp. 184–189). IEEE. on charge transfer magnetic field model. NeuroQuantology, 20(8),
[37] Ramkumar, M., Logeshwaran, J., & Husna, T. (2022). CEA: Certifi- 5999–6010.
cation based encryption algorithm for enhanced data protection in [48] Venkatasubramanian, S., Raja, S., Sumanth, V., Dwivedi, J. N., Sathi-
social networks. In Fundamentals of Applied Mathematics and Soft aparkavi, J., Modak, S., & Kejela, M. L. (2022). Fault Diagnosis Using
Computing, Vol. 1, pp. 161–170. Data Fusion with Ensemble Deep Learning Technique in IIoT. 2022.
[38] Perri, D., Simonetti, M., Tasso, S., Ragni, F., & Gervasi, O. (2021, [49] Vaniprabha, A., Logeshwaran, J., Kiruthiga, T., & Krishna Bikram
September). Implementing a scalable and elastic computing envi- Shah (2022). Examination of the Effects of Long-term COVID-19
ronment based on cloud containers. In International Conference on Impacts on Patients with Neurological Disabilities Using a Neuro
Computational Science and Its Applications (pp. 676-689). Springer, machine Learning Model. BOHR International Journal of Neurology
Cham. and Neuroscience, 1(1), 21–28.
[39] Logeshwaran, J., & Karthick, S. (2022, April). A smart design of a [50] Nasurudeen, T. F. K., Shukla, V. K., & Gupta, S. (2021, June). Automa-
multi-dimensional antenna to enhance the maximum signal clutch tion of Disaster Recovery and Security in Cloud Computing. In
to the allowable standards in 5G communication networks. ICTACT 2021 International Conference on Communication information and
Journal on Microelectronics, 8(1), 1269–1274. Computing Technology (ICCICT) (pp. 1–6). IEEE.
[40] Shareef, T. H., Sharif, K. H., & Rashid, B. N. (2022). A Survey [51] Gopi, B., Logeshwaran, J., & Kiruthiga, T (2022). An Innovation in the
of Comparison Different Cloud Database Performance: SQL and Development of a Mobile Radio Model for a Dual-Band Transceiver
NoSQL. Passer Journal of Basic and Applied Sciences, 4(1), 45–57. in Wireless Cellular Communication. BOHR International Journal
[41] Logeshwaran, J. (2022, March). The control and communication of Computational Intelligence and Communication Network, 1(1),
management for ultra dense cloud system using fast Fourier algo- 20–25.
rithm. ICTACT Journal on Data Science and Machine Learning, 3(2), [52] Saravanakumar, K., & Logeshwaran, J. (2016, February). Auto-
281–284. Theft prevention system for underwater sensor using lab view.
[42] Subramani, R., Kaliappan, S., Arul, P. V, Sekar, S., Poures, M. V. De, International Journal of Innovative Research in Computer and
Patil, P. P., & Esakki, E. S. (2022). A Recent Trend on Additive Man- Communication Engineering, 4(2), 1750–1755.
ufacturing Sustainability with Supply Chain Management Concept, [53] Sutharasan, M., & Logeshwaran, J. (2016, May). Design intelligence
Multicriteria Decision Making Techniques. 2022. data gathering and incident response model for data security using
[43] Logeshwaran, J., & Shanmugasundaram, R. N. (2019, December). honey pot system. International Journal for Research & Development
Enhancements of Resource Management for Device to Device (D2D) in Technology, 5(5), 310–314.