data recovery and business continuity in cloud …data recovery and business continuity in cloud...
TRANSCRIPT
Data recovery and business continuity in Cloud computing: A Review of
the Research Literature
1Mohammad M. Alshammari, 2Ali A. Alwan, 3Imad Fakhri Al-Shaikhli 1Department of Computer Science, Kulliyyah of Information and Communication Technology,
International Islamic University Malaysia, Kuala Lumpur, Malaysia,
2Department of Computer Science, Kulliyyah of Information and Communication Technology,
International Islamic University Malaysia, Kuala Lumpur, Malaysia,
3Department of Computer Science, Kulliyyah of Information and Communication Technology,
International Islamic University Malaysia, Kuala Lumpur, Malaysia
Abstract Cloud Computing is an attracting technology in the area of information technology as it carries a
number of distinct technologies which have established over time. Disaster Recovery (DR) is a system in
which can be used to reduce the actual downtime once software or hardware breakdown. Business
Continuity (BC) is an important requirement for the majority of organizations. This paper reviews the
research literature on the concepts of cloud computing, disaster recovery, and business continuity. A
systematic review carried out of the research dealing with the content of cloud computing, disaster
recovery, and business continuity, a literature search was conducted on several electronic databases.
Studies published from the years 1995 to 2015 were considered and were selected. This review paper
helps the information technology industry to clarify how and have a comprehensive idea about the
concepts of cloud computing, disaster recovery, and business continuity and their associated benefits
and issues.
Keywords: Cloud Computing, Disaster Recovery, Business Continuity
1. Introduction
Cloud computing gets to be more preferred within large-scale computing day-to-day for its power to
share world-wide distributed resources. The entire value of the worldwide cloud computing services is
anticipated to attain $241 billion by the end of 2020 [1]. Cloud computing is a strategy to boost the
capability as well as include functionality dynamically without the need of investing in different
infrastructure, training new employees, or even accreditation of new software package. It expands
Information Technology’s (IT) current abilities. Within the last several years, cloud computing has
developed from being an attractive business strategy to one of the rapidly expanding segments of the
Information technology sector. Nowadays Small and Medium Business (SMB) organizations are
progressively understanding that simply by making use of the cloud they are able to acquire immediate
access to most effective business applications as well as significantly grow their infrastructure resources,
all at minimal expense [2].
Cloud computing is definitely a promising model for business computing [3]. It's describes important
infrastructure to have an up-and coming type of service provision which includes the benefit of reducing
expense by sharing computing and storage sources [4]. Currently, Cloud Computing is really a huge
technology that is exceeding all of the earlier technologies of computing of this competitive and
demanding Information technology industry [5].
Cloud computing is consistently growing and there are many main cloud computing providers
including Amazon, Google, Microsoft, Yahoo and many others who are offering solutions including
Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Storage-as-a- Service and Infrastructure-
as-a-Service (IaaS) [6]. In addition, considering the possibility to substantially minimizing expenses by
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
80
optimization and also maximizing operating as well as economic effectiveness, cloud computing is an
excellent technology. Furthermore, cloud computing can tremendously boost its cooperation, speed, and
also range, thus empowering a totally worldwide computing model on the internet infrastructure. On top
of that, the cloud computing has advantages in delivering additional scalable, fault tolerant services [4].
A disaster is a natural or man-made danger leading to a situation of significant degree which causes
substantial actual destruction, loss of life, or extreme change to the surroundings [7]. The task of
information and communication technology (ICT) in disaster management happens to be growing. Huge
amounts of disaster-related data have been produced. Standard storage and data running technique tend
to be dealing with difficulties in achieving the actual efficiency, scalability, and also accessibility [8].
Cloud-based disaster recovery has grown to be widely used in many field due to its range of positive
aspects. Since the disaster recovery is present within a cloud, it minimizes the actual up-front capital
costs [7]. In the situation of disaster data management, Big Data indicates the enormous bunch of data
sets produced through different individuals and also consists of different data structures, which includes
structured, semi-structured, and unstructured data [8]. Furthermore, every inability within software or
hardware could possibly disrupt the actual work-flows or data and therefore, would certainly threat the
customers. Consequently, Big Data come with an essential demand to add deployment of a disaster
recovery plan to guarantee safe sources of data [9].
Businesses are subjected to threats that can interrupt operations, disaffect clients and also endanger
company trustworthiness as well as income avenues. Threat can even be exposed to an organization by
changes [10]. Data is incredibly beneficial business resource, the data is essential for businesses,
particularly highly dependent on the data of businesses [11].
Over time, businesses experienced a number of system failures which in turn take a direct effect on
their particular most important resource, data and its safety [12]. Businesses are beginning to consider
cloud computing technology as a means to reduce expense while maximizing earnings, given that over
all sectors administrators are under constant stress to cut back capital resources, cloud techniques provide
them with the means to fulfill this aim [13].
Several private and public industry businesses employ Disaster Recovery (DR) systems to deliver
data protection for their information as well as application solutions. A vital concern in delivering a DR
services are to assist Business Continuity (BC) [14]. Furthermore, BC is an important requirement of
numerous organizations, being a quick service disturbance could influences enterprise goals leading to
substantial failures with regards to income, business reputation and losses of share of the market [15].
2. Methodology
A systematic literature search was carried out on fourteen databases. The databases were ACM Digital
Library, IEEE Xplore Digital Library, Annual Reviews, Computer Source: Consumer Edition,
ScienceDirect Backfiles Collections, CS Digital Library, J-STAGE, ProceedingsFirst, Scopus, Web of
Science, COMPENDEX, Emerald, ProQuest ERIC, Springer Online Journal Collection. The search was
completed by employing thesaurus terms and free text words, combining them in a suitable way. The
terms used were: cloud computing, data recovery, and business continuity. Furthermore, free text words
were ANDed and ORed with the suitable thesaurus terms and some other search phrases. English-
language articles published in peer-reviewed journals from the year 1995 up to 2016 were involved.
Table 1. Iterative inclusion and exclusion selection criteria
Round 1: review of title
and abstract
Inclusion criteria:
Study generally the cloud computing, data recovery, and
business continuity
Round 2: review of full
text articles
Inclusion criteria:
Must have an evaluation component (qualitative,
quantitative or both)
Exclusion criteria:
Focus on cloud computing
Focus on data recovery
Focus on business continuity
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
81
Iterative inclusion and exclusion selection criteria were formulated and applied through two rounds
of screening in our systematic review as demonstrated in Table 1. In the first round, titles and abstracts
were screened by the author independently to retain articles featuring cloud computing. For the second
round a screening of full-text articles were evaluated, and articles were chosen. Throughout the second
round, the inclusion and exclusion were highly processed. Articles were omitted once they were out of
our investigation range.
Initially the search yielded 302 articles. These articles have been reviewed to exclude articles that
failed to fulfill the selection criteria: (1) focus on cloud computing, (2) focus on data recovery, (3) focus
on business continuity, and (4) paper written in English. The final number of articles involved in the
review was thus 84 as revealed in Figure 1. A total of 218 articles were excluded based on the criteria
given in each round.
Figure 1. Selection process for study inclusion
3. Pre-study
According to the National Institute of Standards and Technology (NIST), cloud computing is
described as a model for empowering easy, on-demand access to a joint pool associated with configurable
computing sources which can be provisioned quickly as well as launched through minimum
administration efforts or perhaps service provider interaction. Cloud computing not really a buzzword
however has transforming and enhancing the approach we take to employ computing platforms. A
growing number of businesses happen to be transferring in direction of cloud computing for its positive
aspects and also simplicity of maintenance [16].
Cloud computing concept refer to offering of computing resources over the web, therefore we have
been utilizing the over net at a different place to store data rather than maintaining information by
ourselves or application for our own demand [17]. Additionally, Cloud Computing could be regarded as
an Internet-based growth and make use of IT and resources. Cloud Computing is commonly termed as
an innovative business model in which core computing, software functionality as well as storage
resources are outsourced when needed in order to share third-party infrastructures [18]. In addition, cloud
computing is a mixture of many essential technologies which have developed and also grown up through
the years [6].
Cloud Computing has introduced significant improvements towards the IT sector and also changes in
the means of considering and used paradigms, it has been imagined as the future technology architecture
of Information technology firm, it is also quickly trans-forming the nature of how enterprise employ IT
[18]. There are four ways that cloud storage could be implemented including private, public, community
and hybrid cloud [19].
Disaster recovery (DR) system in line with the level of resistance could be split into data disaster
recovery and disaster recovery applications [11]. Disaster recovery, is designed to develop a stand by
database that may supersede the actual host system to cope with operations once the host system could
not function due to disasters, therefore the actual operations could be handled normally [20].
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
82
An ICT based Disaster Management System (DMS) must be smartly designed to cope with all four
levels of the DMS life-cycle in which involve planning, emergency response, recovery and post-
planning. Additionally DMS includes six main elements which are Web Portal, Role Manager, Workflow
Engine, Workflow Scheduler, Workflow Monitor and Notification [21]. Cloud suppliers present Backup-
service for Disaster Recovery over cloud platform that is a Do-it-Yourself (DIY) model [14].
A study by [14], suggest a Disaster recovery solution for distributed businesses and every business
center may possibly consist of a number of sub applications for data generation as displayed in Figure 2.
Figure 2. Deployment architecture of Optimal
4. Cloud computing
Currently the cloud computing presents an innovative form of computing platform. Additionally,
cloud computing modify as well as enhances the way we make use of the computing platform [22]. The
IT sector is growing at a fast pace as highlighted in Figure 3. Many of us learn about new technology
along with developments in IT, on a regular basis. A number of technologies remain and a few disappear
with no track. Cloud Computing is definitely the most popular buzzword within the IT sector nowadays.
Furthermore, it is nothing more or less than the offering of computing as well as storage space ability as
a service to enterprises [23].
Figure 3. Evolution of Computing
The concept of cloud computing was initially utilized by computer professor Chellappa [23]. Cloud
computing is among present-day most exciting technologies due to its ability to minimize expense related
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
83
to computing whilst maximizing overall flexibility and also scalability for computer processes [24].
Cloud computing is an innovative technology rich in possibility to provide solutions with regard to
analyze associated with disasters’ progress, natural, technical or social, that may produce disasters and
also to offer solutions which could decrease their particular consequences [25]. It is also attractive to
businesses because it removes the requirement of preparing in advance with regard to provisioning, and
also enables them to begin with little resources [26].
Cloud computing has released an innovative era of upcoming computing, transform a big part of IT
sector, enhance the investment and utilize of IT hardware and software, as well as obtain substantial
interest from worldwide and regional IT players, countrywide authorities, as well as global businesses
[27-31]. Furthermore, cloud computing Technology is established through virtualization [32][33]. Based
on [26], The National Institute of Standards and Technology (NIST) describes cloud computing through
explaining five important characteristics, three cloud service models, and four cloud deployment models
as demonstrated in Figure 4.
Figure 4. Cloud computing model
Over the past decade, cloud computing has expanded as being a brand-new service paradigm, that
gets to be more preferred [34]. As well as, it offers online, powerful, and scalable virtualization assets
and services [35]. Cloud computing also boosts IT capabilities on the internet as being an innovative
form of service. Currently, small and medium business (SMB) businesses progressively recognize that
by making use of the cloud they can obtain immediate access to the most effective business applications
at a minimal expense [36].
Cloud Computing is an important technology as it carries a number of distinct technologies which
have established over time of commercial computing [23]. It is attracting technology in the area of
information technology furthermore, the cloud is transforming our life through providing consumers with
different forms of services [37]. In addition, it is about transferring solutions, computation or data off-
site to an internal or external, location-transparent, centralized center [38]. Cloud services elements are
generally split within the subsequent groups as represented in Figure 5.
Figure 5. Cloud computing service models
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
84
Cloud Software as a Service (SaaS) - The capability given to the client is to utilize the actual
provider’s applications operating over a cloud. The applications are obtainable through different
consumer units by a thin consumer interface.
Cloud Platform as a Service (PaaS) - The capability made available to the client is to set up into the
cloud client-created or obtained applications made from programming languages and tools backed up by
the provider.
Cloud Infrastructure as a Service (IaaS) - The capability given to the client is to deliver processing,
storage space, networks, along with other essential computing assets in which the client has the capacity
to set up as well as operate software.
Cloud Storage as a Service (StaaS) - It’s a part of IaaS. StaaS enables clients to keep their own
information at remote hard drives and also obtain them at any time through any location. Cloud storage
systems are anticipated to fulfill a number of demanding needs with regard to maintaining clients and
information, including substantial availableness, trustworthiness, overall performance, replication and
data regularity.
5. Data Recovery in the Cloud
With the high demand for cloud computing, disaster recovery employing cloud resources turns into
an incredible strategy [34]. Backup is usually a duplicate of data which is needed in the event of a data
loss or restoration. Backups secure data from human faults, hardware problems as well as natural
catastrophes [39][40]. In addition, Facebook currently has got over one billion users, with more than 618
million active users on a regular basis producing greater than 500 terabytes of new information every
day [8].
With the quick growth and development of IT, the scale of the information systems, the integrated as
well as the management productivity are actually the key indicators which assess the business's core
development, to obtain information system disaster backup, we should initially select the right backup
technology in line with the real scenario associated with disaster [41]. Moreover, a growing number of
services depend on IT systems currently, and a few of these, including economic service and also
healthcare service, tend to be essential to their clients and also community. Even a quite short time of
down time or even small volume of data loss could cause massive financial deficits or perhaps social
issues [42][34].
Getting ready for Disaster Recovery (DR) is among the most significant duties for IT data-centers
[43][44]. Also, the scope of DR has grown to be greater recently than ever before as a result of change
in business functions of various corporations. Internet connections have motivated the development of
new business models that need quick recovery and also constant procedures and also have the “zero-
downtime” as their supreme aim [45].
Research in disaster management includes several areas, the area of research engaged with the part of
IT in disaster management, has become attracting and elevated experts interest lately [8]. Several
organization in addition to federal government services employ Disaster Recovery (DR) systems to
reduce the actual downtime [42]. A short time associated with downtime would certainly lead to
substantial financial loss [37][46]. Furthermore, current statistics from the Cloud Industry Forum (CIF)
claimed that the use of cloud services has become a lot more popular day-to-day, the study states that
61% of UK corporations are currently adopting cloud services, an increase of 13% since 2011 [47][48].
Disaster recovery planning continues to be necessary aspects of any operating enterprise [49][50].
Furthermore, disasters, either manmade or natural, can result in costly service interruption. A pair of
unique DR models are often employed to avoid breakdown in a network: Traditional and cloud-based
service models. Based on IBM report [51], just 50% of disasters in IBM are associated with weather
conditions and the rest are due to different factors [1].
A study by [52], stated that DR performs an important role in restoring the corporation’s data in the
event of disaster and unsafe circumstances. DR is about getting ready for as well as dealing with a
disaster, for instance software or hardware breakdown, a network disruption, an electrical interruption,
actual physical destruction of a building such as flames or floods, human being mistake, as well as other
substantial event [53]. Planning anticipated weaknesses and also determine the requirements of the
enterprise and IT infrastructure, develop and then put into practice risk measures giving the corporation
with a disaster strategy [44].
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
85
The structure of disaster recovery is "distributed computing, centralized storage". In accordance with
various requirements, disaster recovery includes three levels which includes data-level disaster recovery,
system level disaster recovery, and application-level disaster recovery. Data-level disaster recovery is
regarded as the basic and it could guarantee the safety of the application data. System level disaster
recovery disaster has additional demands with regard to operating-system associated with application
server [3]. A standard architecture of disaster recovery is presented in Figure 6.
Figure 6. Standard architecture of disaster recovery
Considering the quick growth of the information society, data storage results in being more
significant. Once the data which is not utilized temporarily but essential, it will likely be kept in cloud
storage [35]. Cloud storage is a principle extended and produced from the perception of cloud computing
[3]. Placing all things in the Cloud gives customers hassle-free [35]. Cloud storage is a repository in
which the data is preserved, handled, and is also made accessible to businesses over the web [19]. In
addition, cloud storage offers online storage in which data kept in way of virtualized pool which is
normally hosted by others [5].
There are four methods in which the cloud storage could be deployed including private, public,
community and hybrid cloud [19]. Furthermore, data security matters of cloud storage occur due to
insufficient certification, authorization and audit control, weak encrypted shield algorithms, poor keys,
risk of organization, unstable data center, and also lack of disaster recovery [54][35]. Although software
and data services are transparent, harmful attacks should definitely avoided. It is essential and hard to
make certain data security in cloud storage system. It's important to generate fault tolerant function in
considerably less expense for cloud storage and there should be fault-tolerant back-up system, which
could guarantee that data have a very reliable backup [3]. Cloud storage system architecture model is
made up of four layers which include access, application, infrastructure, and storage layers as indicated
in Figure 7.
Figure 7. Cloud storage system architecture
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
86
According to [8], Big Data describes significant and sophisticated data sets comprised of a number of
structured and unstructured data that are too large to be maintained through traditional methods.
Furthermore [55], stated that Big Data is categorized by volume, velocity and variety. Volume indicates
the amount of data, velocity relates both to how quick data are produced and how quick they should be
processed whilst, veracity is the capability to trust the data to be appropriate and also to utilize them to
generate essential selections. Traditional techniques tend to be dealing with several difficulties in
meeting the demands of Big Data, which includes storage, processing, management, search, transfer
among devices or storage locations, analysis, and visualization [8].
6. Business Continuity
With the dramatical improvement the information sector in addition to the escalating of world-wide
businesses, a massive enterprise information has considered as the core for the worldwide business
connections and data safe-keeping gets to be particularly significant. When the data this is simply not
utilized in the short term but vital, it's going to be stored in cloud storage [35]. Several corporations
would like to boost their opportunity to get over system failures and data loss, particularly to safeguard
themselves from natural as well as man-made disasters [22].
A number of small and big corporations nowadays depend on an internet existence. Continuity is an
important element the majority of organizations, as a unexpected service interruption can certainly
influence organization goals leading to substantial losses with regards to income, business status as well
as losses associated with market share [56][22]. As a point of interest in each and every organization,
data has a large measure of concern from both scholastic and mechanical views. As data evolves in size,
ensuring that it must be safely and securely set aside happens to be challenging [39].
In each and every enterprise there are a significant amount of data in digital format in which needed
the safety storage services. Data backup and Business Continuity matters have grown to be essential in
networks as the benefits and the need for electronic data is repeatedly escalating. Every single enterprise
demands a business continuity plan (BCP) or disaster recovery plan (DRP) and data backup that comes
within the expense limitations whilst getting the goal recovery requirements with regards to recovery
time objective (RTO) as well as recovery point objective (RPO) [22]. [57], strengthen this statement by
saying that, every enterprise needs BCP or DRP which often falls within expense constraints while
getting the concentrating on recovery requirements with regards to RTO and RPO.
The DR levels are classified through those two important measures RTO and RPO which are the
primary goals that should be achieved anytime assessing a great choice in a given operating and capital
costs [42][15]. Furthermore, RPO states the data we might afford to lose, the lower the RPO, the higher
the total expense of preserving the actual infrastructure environment for recovery [44]. This is more
investigated by [49] whom stated that, RPO indicates the highest possible appropriate period in between
a couple of backups while RTO describes the most acceptable time period a business process might be
disrupted as revealed in Figure 8.
Figure 8. Recovery point objective (RPO) and recovery time objective (RTO)
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
87
Disaster Recovery Planning (DRP) is related with the recovery of a key set of IT systems as well as
infrastructure elements. While, the Business Continuity Planning is associated with the business as a
complete piece handling business processes [44]. [22] Reinforces this statement by saying that, a key
principle in a DRP is the actual physical separation of the main and also back-up sites. A substantial
fraction of disasters consisting of those brought on through failures tend to be geographical as
demonstrated in Table 2.
Table 2. Disaster faced in five years period
Cause Organization
System upgrades 72%
Power outage 70%
Fire 69%
Configuration change management 64%
Cyber attacks 63%
Malicious employees 63%
Data leakage 63%
Flood 48%
Hurricane 47%
Earthquake 46%
Tornado 46%
Terrorism 45%
Tsunami 44%
Volcano 42%
War 42%
Others 1%
The role of ICT in disaster management continues to be growing, behavior of essential infrastructures
has been explained by simulation, and response plans have been made by government departments as
well as individual businesses [58]. In addition, existing data storage systems tend to be different and
present few or perhaps no integration features. To make the most of available data, a reliable and scalable
storage system sustained by data sharing, reuse, integration, as well as evaluation is required [59].
As an promising technology and business model, Cloud Computing has brought commercial
computing by storm given it offers quick access to a business' high-performance computing as well as
storage infrastructure by web services [38]. Furthermore, [34], stated that, DR-Cloud is consists of data
disaster recovery service customers and also multiple cloud service providers. The complete architecture
of DR-Cloud is shown in Figure 9 while Figure 10 shows the data backup and recovery models
correspondingly.
Figure 9. Data backup model
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
88
Figure 10. Data recovery model
Disasters might strike at anytime, anyplace, and most often take place along with minimal or no alert
[44][60]. Therefore, Most of the corporations tend to be seeking an improvement within their IT
infrastructure [23]. Cloud computing technology is a promising to modify the actual situation associated
with disaster recovery [61].
From the IT point of view, recovery will most likely stand for creating assistance for the running as
well as communications features regarded as essential by the enterprise society and then setting up
assistance regarding subsidiary systems. From the business viewpoint recovery usually means, having
the capacity to perform the business functions which are in the center of the enterprise then having the
capability to carry out subsidiary functions [44].
Client satisfaction is among the major objectives associated with a Service provider. Such satisfaction
is able to bring long lasting business expansion and far better business earnings [46][62][63]. In addition,
businesses can make use of DR services that are served by cloud service providers. By using these
services, information safety and service continuity tend to be assured for clients at several levels [1].
Table 3. Displays an overview of frequent difficulties as well as relevant solutions in DR plans
Table 3. Challenges and solutions of DR plans
Challenges Solutions Technique
Dependency cost Local backup
Scale up/down,
Dual-Role operation
Using a Linux box at the customer premises
Allocating resources to high priority
services.
Hiring and running idle physical nodes on
the secondary site
Failure prediction and
detection Security
Resource Management ,
GRB
SDDB
Prediction and replacement of risky hardware
Using monitoring unit
Using encryption, scrambling and shuffling
techniques
Replication latency Pipelined replication Performing replication and process
operations in parallel
Data storage Lack of
redundancy
IPCS
GRB, IPCS Using an inter private cloud
Multiple backup
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
89
An important concern in delivering DR services would be to assist Business Continuity (BC), enabling
applications to quickly come back on-line after having a disaster [42]. Therefore, DR thoughts are
element of the BC, business Continuity safeguards that a corporation might recover its IT systems as
well as enterprise procedures [44]. Furthermore, DR and BC demand that essential business information
is backed up occasionally and also saved in separated and safe locations [64].
DR includes the procedure and policies associated with planning for recovery or continuation of
technology infrastructure of corporation after having a natural or human-induced disaster. It is an
essential component of Business Continuity Management (BCM) [23]. In addition, BCM is a tool which
might be utilized to deliver better confidence that the results associated with processes and services could
be provided in case there is hazards [10].
Different researchers have recommended several development cycles for BCM, each of which places
focus on specific elements of BCM [10][65-68]. BCM involved nine levels that are program initiation,
project initiation, risk analysis, selecting risk mitigation strategies, monitoring and control,
implementation, testing, education and training, and review.
7. Research Issues in Cloud Computing, Data Recovery, and Business
Continuity
One of the primary issues in employing ICT in each and every field like authorities offices would be
to address the level of adaptability of ICT tools [69]. Currently, businesses developing their own
functions on computer system have got paid a lot more focus on information protection. Several elements
could potentially cause information protection issues that demand to be handled in various strategies
[20]. In addition, an effective disaster management depends on the collaboration between individuals;
nevertheless, the variety of the engaged individuals as well as their activities leads to huge information
heterogeneity. This heterogeneity of data, along with their amount, is among the primary problems in
delivering an extensive resolution in various disaster circumstances [8].
Natural disaster management ought to cope with massive amount of information comes from different
businesses as well as many individuals [21]. Furthermore, the optimal disaster recovery planning must
take under consideration the essential guidelines such as the cost, the cost of data transfers, and also the
cost of data storage [15]. Disaster recovery is a continual issue in IT platforms that it is an important
within cloud computing, due to the fact that cloud suppliers need to deliver the solutions for their clients
even though the data center is down [1].
An organization is subjected to hazards that might interrupt operations, disaffect clients as well as
compromise enterprise credibleness and also income streams [10]. Furthermore, many organizations
depend on DR solutions to avoid both manmade and natural disasters from causing costly service
interruptions. Unfortunately, existing DR services are available either at pricey, or with only weak
guarantees in regards to the level of data lost or time needed to resume functioning after having a disaster
[42]. [70] Furthermore, several businesses tend to be significantly looking into cloud-computing to save
expense.
A study by [39], stated that, the maintenance of a well-suited Backup and DR system has grown to be
a major issue. Additionally, a standard DR Service operates by duplicating application state in between
2 data locations; in case the main data center gets to be inaccessible, then the back-up site could take
over and can initialize a different backup of the application by making use of the recently duplicated data
[42].
The rapid growth and development of the Internet has contributed to a market of data resources, a rise
in the amount of data has generated difficulties with regards to storing as well as manipulating
unstructured data [71]. In addition, these shared resources might be quickly provisioned towards the
clients based on having to pay just for anything they employ [19].
In cloud computing, among the leading protection issues associated with businesses could be the
geographic location of the data which are currently being kept in the cloud particularly if they are located
within a different region since the legal guidelines of the host region of the equipment apply to the data
over the devices [72]. A number of clients and corporations have started utilizing cloud computing.
Nevertheless, they are worried about their own information whenever they store it on an alternative party
[4]. [37] Reinforces this statement by saying that, several security difficulties as well as concerns have
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
90
already been brought up including, threat management, trust & restoration procedure that must be taken
into consideration to deliver business continuity and greater consumer satisfaction.
As increasing numbers of data on consumers and organizations are located in the cloud, issues are
starting to expand regarding how secure an environment it is [2]. This is further emphasized by [73] who
stated that, security and privacy concerns is a substantial boundary with regard to customers to adapt into
Cloud Computing systems. Furthermore, the main approaching issue in cloud computing is the successful
disaster management [46].
A study by [16], state that, the significant issues in cloud computing are data backup and disaster
recovery. Disaster is among the significant factors impacting on the actual efficiency of the Cloud [46].
In addition, implementing cloud computing in an organization infrastructure deliver substantial
protection issues [74].
The necessity of cloud computing is escalating day-to-day [5]. In cloud computing, there are
difficulties in implementing cloud computing, one of the primary concern is the data protection as well
as privacy of data [26]. This is more emphasized by [54][35], whom stated that, data protection problems
with cloud storage happen to be due to insufficient certification, authorization as well as audit
management, vulnerable encryption algorithms, vulnerable keys, risk of association, questionable data
center, and also insufficient disaster recovery.
Cloud services depending on datacenter networks have become essential. Protecting such a network
from catastrophes like earthquakes, tornados and also terrorist strikes is really important [75].
Furthermore, there were situations where there was really a full blackout of whole cloud solution which
makes it inaccessible for a long time [72]. Googlemail went down for 2 hours [76]. Thus, the losing of
business could possibly be disastrous [74].
A study conducted by [77], over the risks going through cloud computing also it determined the actual
streaming risks this includes: abuse and nefarious, vulnerable application programming interfaces,
malicious insiders, shared technology vulnerabilities, data loss, account, service & traffic hijacking, and
unknown risk profile.
In cloud computing, substantial protection is among the significant boundaries intended for starting
the new period of making use of cloud computing as a steady and secure tool [31]. Furthermore,
considerations are increasingly being expressed and discussed in regards to the protection concerns
introduced by developing data disaster-recovery service over the cloud [2][78][79][36].
According to [30][52], security is a crucial element for any businesses. Furthermore, cloud computing
promise for a significant improvements on the way to save data as well as operate applications [38].
Placing everything in the Cloud gives customers hassle-free, but it also result in additional different
uncertainty which cloud storage solutions need to encounter simultaneously [35].
8. References
[1] Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster
recovery in cloud computing. Computer and Information Science, 7(4), 39.
[2] Subashini, S., & Kavitha, V. (2011). A survey on security issues in delivery models of cloud
computing. Journal of network and computer applications, 34(1), 1-11.
[3] Jian-Hua, Z., & Nan, Z. (2011, August). Cloud computing-based data storage and disaster recovery.
In Future Computer Science and Education (ICFCSE), 2011 International Conference on (pp. 629-
632). IEEE.
[4] Ben Omran, O. M., & Panda, B. (2014, December). A new technique to partition and manage data
security in cloud databases. In Internet Technology and Secured Transactions (ICITST), 2014 9th
International Conference for (pp. 191-196). IEEE.
[5] Suguna, S., & Suhasini, A. (2015). Enriched multi objective optimization based cloud disaster
recovery. Karbala International Journal of Modern, 1(2), 122-128.
[6] Bisong, A., & Rahman, M. (2011). An overview of the security in enterprise cloud
computing. preprint arXiv:1101.5613.
[7] Nayar, K. B., & Kumar, V. (2015). Benefits of cloud computing during disaster. In Proceedings of
the International Conference on Transformations in Engineering Education (pp. 191-201). Springer
India.
[8] Grolinger, K. (2013). Disaster Data Management in Cloud Environments. The University of Western
Ontario, 1-121. Retrieved from http://ir.lib.uwo.ca/cgi/viewcontent.cgi?article=3216&context=etd
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
91
[9] Mansoori, B., Rosipko, B., Erhard, K. K., & Sunshine, J. L. (2014). Design and implementation of
disaster recovery and business solution. Journal of digital imaging, 27(1), 19-25.
[10] Gibb, F., & Buchanan, S. (2006). A framework for business continuity management. International
journal of information management, 26(2), 128-141.
[11] Liu, X. J. (2010, July). A brief analysis of the disaster recovery backup technology in Oracle
database DataGuard. In 2010 2nd International Conference on Industrial and Information Systems.
[12] Otero, A. R., Otero, C. E., Qureshi, A.(2010). Securing data transfer in the cloud through introducing
identification packet and UDT – authentication option field: a characterization. International Journal
of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010. Retrieved from
http://airccse.org/journal/nsa/1010ijnsa01.pdf
[13] Brandl D. (2010, January). Don't cloud your compliance data. Control Engineering, 57(1), 23.
[14] Saquib, Z., Tyagi, V., Bokare, S., Dongawe, S., Dwivedi, M., & Dwivedi, J. (2013, September). A
new approach to disaster recovery as a service over cloud for database system. In Advanced
Computing Technologies (ICACT), 2013 15th International Conference on (pp. 1-6). IEEE.
[15] Alhazmi, O. H., & Malaiya, Y. K. (2012, November). Assessing disaster recovery alternatives:
colocation or cloud. In Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd
International Symposium on (pp. 19-20). IEEE.
[16] Javaraiah, V. (2011, December). Backup for cloud and disaster recovery for consumers.
In Advanced Networks and Telecommunication (ANTS), 2011 IEEE 5th International Conference
on (pp. 1-3). IEEE.
[17] Kadam, M., Jidge, P., Tambe, S., Tayade, E., & Bhusari, V. (2014). Cloud Database Management
System. International Journal of Scientific Research and Education, 2(03).
[18] Andre, F. M. (2011). Availability and confidentiality in storage clouds (Doctoral dissertation,
CARNEGIE MELLON UNIVERSITY).
[19] Prabavathy, B., Priya, K., & Babu, C. (2013, July). A load balancing algorithm for private cloud
storage. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth
International Conference on (pp. 1-6). IEEE.
[20] Hong, X. (2006). A database monitoring and disaster recovery system. InFrontiers of WWW
Research and Development-APWeb 2006 (pp. 1201-1204). Springer Berlin Heidelberg.
[21] Habiba, M., & Akhter, S. (2013). A Cloud Based Natural Disaster Management System. In Grid and
Pervasive Computing (pp. 152-161). Springer Berlin Heidelberg.
[22] Suguna, S., & Suhasini, A. (2014, February). Overview of data backup and disaster recovery in
cloud. In Information Communication and Embedded Systems, 2014 International Conference
on (pp. 1-7). IEEE.
[23] Prakash, S., Mody, S., Wahab, A., Swaminathan, S., & Paramount, R. (2012). Disaster recovery
services in the cloud. InCloud Computing Technologies, Applications and Management, 2012
International Conference on (pp. 139-144). IEEE.
[24] Thingom, C., & Suma, V. (2014, February). Ensured availability of resources in a highly reliable
mode through enhanced approaches for effective disaster management. In Electronics and
Communication Systems (ICECS), 2014 International Conference on (pp. 1-6). IEEE.
[25] Craus, M., & Butincu, C. (2014). The Potential of Cloud Computing for Analysis and Finding
Solutions. In Improving Disaster Resilience and Mitigation-IT Means and Tools (pp. 239-252).
Springer Netherlands.
[26] Shahzad, F. (2014). State-of-the-art survey on cloud computing security Challenges, and
solutions. Procedia Computer Science, 37, 357-362.
[27] Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008, November). Cloud computing and grid computing
360-degree. In Grid Computing Environments Workshop, 2008. GCE'08 (pp. 1-10). Ieee.
[28] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and
emerging IT platforms: Vision, hype, and reality for delivering computing. Future Generation
computer systems, 25 (6), 599-616.
[29] Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. ACM, 53(6).
[30] Armbrust, M., Fox, A., Griffith, R., Joseph, Katz, R., Konwinski & Zaharia, M. (2010). A view of
cloud computing. Communications of the ACM, 53(4), 50-58.
[31] Suna, D., Changb, G., Suna, L., & Wanga, X. (2011). Surveying and analyzing security, privacy and
trust issues in cloud computing. Procedia Engineering, 15, 2852-2856.
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
92
[32] Sun, A., Ji, T., Yue, Q., & Yang, S. (2013, January). Virtual machine scheduling, motion and disaster
recovery model for IaaS cloud computing. In Conference Anthology, IEEE (pp. 1-5). IEEE.
[33] Ahmaro, I. Y., Bin Mohd Yusoff, M. Z., & Abualkishik, A. M. (2014, November). The current
practices of green computing approaches in Malaysia. In Information Technology and Multimedia
(ICIMU), 2014 International Conference on (pp. 341-345). IEEE.
[34] Gu, Y., Wang, D., & Liu, C. (2014). DR-Cloud: Multi-cloud based disaster recovery. Tsinghua
Science and Technology, 19(1), 13-23.
[35] Shi, X., Guo, K., Lu, Y., & Chen, X. (2013). Survey on Data Recovery for Cloud. In Trustworthy
Computing and Services (pp. 176-184). Springer Berlin Heidelberg.
[36] Chen, Z., Yao, W., & Wang, C. (2012). Security and Trust Model for Data Disaster-Recovery on
the Cloud. In Trustworthy Computing and Services (pp. 140-147). Springer Berlin Heidelberg.
[37] Radha, D., & Patil, R.(2013) Load Balancing with Disaster Recovery using Multi Cloud.
[38] Wu, J., Ping, L., Ge, X., Wang, Y., & Fu, J. (2010, June). Cloud storage as the infrastructure of
cloud. In Intelligent Computing and Cognitive (ICICCI), 2010 International Conference on (pp. 380-
383). IEEE.
[39] Yarrapothu, S. (2015). Effectiveness of Backup and Disaster Recovery: A Comparative study on
Tape and Cloud based Backup and Disaster Recovery.
[40] Snedaker, S. (2013). Business continuity and disaster recovery planning for IT. Newnes.
[41] Ping, Y., Bo, K., Jinping, L., & Mengxia, L. (2010, June). Remote disaster recovery system
architecture based on database replication. InComputer and Communication Technologies in
Agriculture Engineering, 2010 International Conference On (Vol. 1, pp. 254-257). IEEE
[42] Wood, T., Cecchet, E., Ramakrishnan, K. K., Shenoy, P. J., van der Merwe, J. E., & Venkataramani,
A. (2010). Disaster Recovery as a Cloud: Economic Benefits & Deployment
Challenges. HotCloud, 10, 8-15.
[43] Nayak, T., Routray, R., Singh, A., Uttamchandani, S., & Verma, A. (2010, April). End-to-end
disaster recovery planning. InNetwork Operations and Management Symposium (NOMS), 2010
IEEE (pp. 357-364). IEEE.
[44] Prazeres, A., & Lopes, E. (2013). Disaster recovery–a project planning case study. Procedia
Technology, 9, 795-805.
[45] Wu, R., Li, R., Yu, F., Yue, G., & Wen, J. (2006, November). Research on Remote Heterogeneous
Disaster Recovery Technology in Grid Computing. In Semantics, Knowledge and Grid, 2006.
SKG'06. Second International Conference on (pp. 75-75). IEEE.
[46] Mahitha, O., & Suma, V. (2014). Effective Disaster Management to Enhance the Cloud. Proceedings
of the 48th Annual Convention of Computer of India-Vol I (pp. 583-591). Springer International
Publishing.
[47] UK Cloud adoption and trends for 2013’. Cloud Industry Forum, (2012). Accessed Aug 2013. http://
cloudindustryforum.org/downloads/ whitepapers/cif-white-paper-8-2012- uk-cloud-adoption-and-
2013-trends. pdf.
[48] Arean, O. (2013). Disaster recovery in the cloud. Network Security, 2013(9), 5-7
[49] Lenk, A., & Tai, S. (2014). Cloud standby: disaster recovery of distributed in the cloud. In Service-
Oriented and Cloud (pp. 32-46). Springer Berlin Heidelberg.
[50] Lenk, A. (2015, June). Cloud Standby Deployment: A Model-Driven Deployment for Disaster
Recovery. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on (pp. 933-
940). IEEE.
[51] IBM white paper. (2012). Virtualizing disaster recovery using cloud computing, IBM global
technology services.
[52] Chang, V. (2015). Towards a Big Data disaster recovery in a Private Cloud. Ad Hoc Networks, 35,
65-82.
[53] Robinson, Vamvadelis, & Narin, A. (2011). Using Amazon web services for disaster recovery.
[54] Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues
and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-
592
[55] Beyer, M. A., & Laney, D. (2012). The importance of ‘big data’: a definition.Stamford, CT: Gartner,
2014-2018.
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
93
[56] EMC (2009). Disaster Recovery for Small Businesses. Technical White Paper, 1-6. Retrieved July,
2016, from http://www.101datasolutions.co.uk/wp-content/uploads/2010/06/Disaster-Recovery-
For-Small-Business.pdf
[57] Alhazmi, O. H., & Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using cloud.
In Reliability and Maintainability, 2013 Proceedings-Annual (pp. 1-6). IEEE.
[58] Hristidis, V., Chen, S. C., Li, T., Luis, S., & Deng, Y. (2010). Survey of data management and
analysis in disaster. Journal of Systems and Software, 83(10), 1701-1714.
[59] Grolinger, K., Capretz, M. A., Mezghani, E., & Exposito, E. (2013, June). Knowledge as a service
framework for disaster data management. InEnabling Technologies: Infrastructure for
Collaborative, 22nd International Workshop on (pp. 313-318). IEEE.
[60] Matos, R., Andrade, E. C., & Maciel, P. (2014, October). Evaluation of a disaster recovery solution
through fault injection. In Systems, Man and Cybernetics (SMC), International Conference on (pp.
2675-2680). IEEE.
[61] Chidambaram, J., Prabhu, C., Rao, P., Wankar, R., Aneesh, C. S., & Agarwal, A. (2008, November).
A methodology for high availability of data for business continuity planning/disaster recovery in a
grid using replication in a distributed. In TENCON 2008-2008 Region 10 Conference (pp. 1-6).
IEEE.
[62] Gopalakrishnan Nair, T. R., & Suma, V. (2011). Defect management using pair metrics. Crosstalk,
The Journal of Defense Software Engineering, 24(6), 22-27.
[63] Suma, V., & Nair, T. R. (2010). Effective defect prevention approach in software process for better
quality levels. preprint arXiv:1001.3552.
[64] Sengupta, S., & Annervaz, K. M. (2014). Multi-site data distribution for disaster recovery: planning
framework. Future Generation Computer Systems, 41, 53-64.
[65] CCTA. (1995). An introduction to business continuity management. London: HMSO.
[66] Barnes, J. C. (2001). A guide to business continuity planning. Chichester: Wiley.
[67] Hiles, A., & Barnes, P. (2001). The definitive handbook of business continuity management.
Chichester: Wiley.
[68] Smith, D. J. (Ed.). (2002). Business continuity management: Good practice guidelines. Caversham:
Business Continuity Institute.
[69] Pokharel, M., Lee, S., & Park, J. S. (2010, July). Disaster recovery for system architecture using
cloud. In Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium
on (pp. 304-307). IEEE.
[70] Markoff, J. Barboza, D. ( 2010, February 18), 2 China Schools Said to Be Tied to Online Attacks.
Retrieved from http://www.nytimes.com/2010/02/19/technology/19china.html
[71] Deka, G. C. (2014). A survey of cloud database systems. IT Professional, (2), 50-57.
[72] Smith, R. (2009). Computing in the cloud. Research Technology Management, 52(5), 65- 68.
Retrieved March 17, 2010, from ABI/INFORM Global.
[73] Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010, November). Security and privacy in
cloud computing. In Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference
on (pp. 105-112). IEEE.
[74] Kavuri, S. K., & Nutalapati, A. (2015). Enterprise Cloud Computing Challenges and Related
Security. International Journal of Regulation and Governance, 1(2).
[75] El-Serafy, M. A., Elsayed, A. M., Aly, M. H., El-Badawy, E. S., & Ghaleb, I. A. (2014, September).
Multiple Routing Configurations for Datacenter Disaster Recovery Applicability and Challenges.
In Computer and Communication Engineering (ICCCE), 2014 International Conference on (pp. 146-
149). IEEE.
[76] Hoover, J. N. (2008, August 16). Outages force cloud computing user to rethink tactics.
InformationWeek. Retrieved on March 26, 2010 from
http://www.informationweek.com/news/services/saas/showArticle.jhtml?articleID=210004236
[77] Cloud Security Alliance (2010). Top Threats to Cloud Computing. Cloud Security Alliance.
Retrieved from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
[78] Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from
cloud. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International
Conference on (pp. 693-702). IEEE.
[79] Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud. Computer Law &
Security Review, 26(4), 391-397.
Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli
International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016
94