Skip to main content

Survey on Data Recovery for Cloud Storage

  • Conference paper
  • First Online:
Trustworthy Computing and Services (ISCTCS 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 426))

Included in the following conference series:

  • 1272 Accesses

Abstract

Cloud computing provides people with lots of convenient services. Computing and storage of data are transferred from the local mobile terminal to the cloud server. Putting everything in the Cloud brings people convenient, but it also cause more various insecurity that cloud storage solutions must face at the same time. Much work has been done to solve the challenges. In this paper, we focus on the data recovery for cloud storage, present a comprehensive survey of existing problems and their current solutions on data recovery issues, discuss data security technologies of the data storage and recovery in cloud and describe some key factors and their role in data recovery.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Modi, C., Patel, D., Borisaniya, B., et al.: A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63(2), 561–592 (2013)

    Article  Google Scholar 

  2. Rong, C.M., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)

    Article  Google Scholar 

  3. Che, J.H., Duan, Y.M., Zhang, T., et al.: Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)

    Article  Google Scholar 

  4. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  5. Wang, Y.J., Zhao, S.J., Le, J.: Providing privacy preserving in cloud computing. In: International Conference on Test and Measurement, vol. 2, pp. 213-216 (2009)

    Google Scholar 

  6. Mowbray, M., Pearson, S.: A client-based privacy manager for cloud computing. In: Proceedings of the Fourth International ICST Conference on Communication System Software and Middleware, COMSWARE’09, Dublin, Ireland, 16–19 June 2009

    Google Scholar 

  7. Lin, D., Squicciarini, A.: Data protection models for service provisioning in the cloud. In: Proceeding of the ACM Symposium on Access Control Models and Technologies, SACMAT’10, Pittsburgh, Pennsylvania, USA, pp. 183–192 (2010)

    Google Scholar 

  8. Abbasy, M.R., Shanmugam, B.: Enabling data hiding for resource sharing in cloud computing environments based on DNA sequences. In: Proceedings of the 2011 IEEE World Congress on Services, SERVICES’11, pp. 385–390 (2011)

    Google Scholar 

  9. Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: IEEE Symposium on Security and Privacy Workshops, San Francisco, CA, pp. 125–128 (2012)

    Google Scholar 

  10. Sourya: Should you be concerned? A list of recent cloud computing failures—intuit goes down (2011). http://www.cloudtweaks.com/2011/06/should-you-be-concerned-a-list-of-recent-cloud-computingfailures

  11. Metz, C.: Amazon outage spans clouds ‘insulated’ from each other (2011). http://www.theregister.co.uk/2011/04/21/amazon_web_services_outages_spans_zones/fromeachother

  12. Wiboonrat, M.: System reliability of fault tolerant data center. In: The Fifth International Conference on Communication Theory, Reliability, and Quality of Service, Chamonix, France, pp. 19–25 (2012)

    Google Scholar 

  13. Wiboonrat, M.: An empirical IT contingency planning model for disaster recovery strategy selection. In: IEEE International Conference on Engineering Management, Europe, Estoril, pp. 1–5 (2008)

    Google Scholar 

  14. Singha, R.: A multi-site disaster recovery solution based on IP storage networking. In: International Conference on Information and Computer Networks vol. 27, pp. 139–142 (2012)

    Google Scholar 

  15. Wiboonrat, M., Kosavisutte, K.: Optimization strategy for disaster recovery. In: 4th IEEE International Conference on Management of Innovation and Technology, Bangkok, pp. 675–680 (2008)

    Google Scholar 

  16. Bermbach, D., Klems, M., Tai, S., et al.: Metastorage: a federated cloud storage system to manage consistency-latency tradeoffs. In: 2011 IEEE International Conference on Cloud Computing (CLOUD), Washington, DC, pp. 452–459 (2011)

    Google Scholar 

  17. Alhazmi, O.H., Malaiya, Y.K.: Evaluating disaster recovery plans using the cloud. In: 2013 Proceedings of Annual on Reliability and Maintainability Symposium (RAMS), Orlando, FL, pp. 1−6 (2013)

    Google Scholar 

  18. Xiang, F., Liu, C.Y., Fang, B.X., et al.: Novel “rich cloud” based data disaster recovery strategy. J. Commun. 6, 92–101 (2013)

    Google Scholar 

  19. Wood, T., Cecchet, E., Ramakrishnan, K.K., et al.: Disaster recovery as a cloud service: economic benefits & deployment challenges. In: 2nd USENIX Workshop on Hot Topics in Cloud Computing, Boston, MA, pp. 1–7 (2010)

    Google Scholar 

  20. Aceto, G., Botta, A., Donato, D.W., et al.: Cloud monitoring: a survey. Comput. Netw. 57(9), 2093–2115 (2013)

    Article  Google Scholar 

Download references

Acknowledgement

This research was supported by National Science and Technology Major Projects (No. 2012ZX03002001), P. R. China.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kun Guo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shi, X., Guo, K., Lu, Y., Chen, X. (2014). Survey on Data Recovery for Cloud Storage. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2013. Communications in Computer and Information Science, vol 426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43908-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43908-1_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43907-4

  • Online ISBN: 978-3-662-43908-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics