data recovery and business continuity in cloud …data recovery and business continuity in cloud...

15
Data recovery and business continuity in Cloud computing: A Review of the Research Literature 1 Mohammad M. Alshammari, 2 Ali A. Alwan, 3 Imad Fakhri Al-Shaikhli 1 Department of Computer Science, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur, Malaysia, [email protected] 2 Department of Computer Science, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur, Malaysia, [email protected] 3 Department of Computer Science, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, Kuala Lumpur, Malaysia [email protected] Abstract Cloud Computing is an attracting technology in the area of information technology as it carries a number of distinct technologies which have established over time. Disaster Recovery (DR) is a system in which can be used to reduce the actual downtime once software or hardware breakdown. Business Continuity (BC) is an important requirement for the majority of organizations. This paper reviews the research literature on the concepts of cloud computing, disaster recovery, and business continuity. A systematic review carried out of the research dealing with the content of cloud computing, disaster recovery, and business continuity, a literature search was conducted on several electronic databases. Studies published from the years 1995 to 2015 were considered and were selected. This review paper helps the information technology industry to clarify how and have a comprehensive idea about the concepts of cloud computing, disaster recovery, and business continuity and their associated benefits and issues. Keywords: Cloud Computing, Disaster Recovery, Business Continuity 1. Introduction Cloud computing gets to be more preferred within large-scale computing day-to-day for its power to share world-wide distributed resources. The entire value of the worldwide cloud computing services is anticipated to attain $241 billion by the end of 2020 [1]. Cloud computing is a strategy to boost the capability as well as include functionality dynamically without the need of investing in different infrastructure, training new employees, or even accreditation of new software package. It expands Information Technology’s (IT) current abilities. Within the last several years, cloud computing has developed from being an attractive business strategy to one of the rapidly expanding segments of the Information technology sector. Nowadays Small and Medium Business (SMB) organizations are progressively understanding that simply by making use of the cloud they are able to acquire immediate access to most effective business applications as well as significantly grow their infrastructure resources, all at minimal expense [2]. Cloud computing is definitely a promising model for business computing [3]. It's describes important infrastructure to have an up-and coming type of service provision which includes the benefit of reducing expense by sharing computing and storage sources [4]. Currently, Cloud Computing is really a huge technology that is exceeding all of the earlier technologies of computing of this competitive and demanding Information technology industry [5]. Cloud computing is consistently growing and there are many main cloud computing providers including Amazon, Google, Microsoft, Yahoo and many others who are offering solutions including Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Storage-as-a- Service and Infrastructure- as-a-Service (IaaS) [6]. In addition, considering the possibility to substantially minimizing expenses by Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016 80

Upload: others

Post on 06-Apr-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Data recovery and business continuity in Cloud computing: A Review of

the Research Literature

1Mohammad M. Alshammari, 2Ali A. Alwan, 3Imad Fakhri Al-Shaikhli 1Department of Computer Science, Kulliyyah of Information and Communication Technology,

International Islamic University Malaysia, Kuala Lumpur, Malaysia,

[email protected]

2Department of Computer Science, Kulliyyah of Information and Communication Technology,

International Islamic University Malaysia, Kuala Lumpur, Malaysia,

[email protected]

3Department of Computer Science, Kulliyyah of Information and Communication Technology,

International Islamic University Malaysia, Kuala Lumpur, Malaysia

[email protected]

Abstract Cloud Computing is an attracting technology in the area of information technology as it carries a

number of distinct technologies which have established over time. Disaster Recovery (DR) is a system in

which can be used to reduce the actual downtime once software or hardware breakdown. Business

Continuity (BC) is an important requirement for the majority of organizations. This paper reviews the

research literature on the concepts of cloud computing, disaster recovery, and business continuity. A

systematic review carried out of the research dealing with the content of cloud computing, disaster

recovery, and business continuity, a literature search was conducted on several electronic databases.

Studies published from the years 1995 to 2015 were considered and were selected. This review paper

helps the information technology industry to clarify how and have a comprehensive idea about the

concepts of cloud computing, disaster recovery, and business continuity and their associated benefits

and issues.

Keywords: Cloud Computing, Disaster Recovery, Business Continuity

1. Introduction

Cloud computing gets to be more preferred within large-scale computing day-to-day for its power to

share world-wide distributed resources. The entire value of the worldwide cloud computing services is

anticipated to attain $241 billion by the end of 2020 [1]. Cloud computing is a strategy to boost the

capability as well as include functionality dynamically without the need of investing in different

infrastructure, training new employees, or even accreditation of new software package. It expands

Information Technology’s (IT) current abilities. Within the last several years, cloud computing has

developed from being an attractive business strategy to one of the rapidly expanding segments of the

Information technology sector. Nowadays Small and Medium Business (SMB) organizations are

progressively understanding that simply by making use of the cloud they are able to acquire immediate

access to most effective business applications as well as significantly grow their infrastructure resources,

all at minimal expense [2].

Cloud computing is definitely a promising model for business computing [3]. It's describes important

infrastructure to have an up-and coming type of service provision which includes the benefit of reducing

expense by sharing computing and storage sources [4]. Currently, Cloud Computing is really a huge

technology that is exceeding all of the earlier technologies of computing of this competitive and

demanding Information technology industry [5].

Cloud computing is consistently growing and there are many main cloud computing providers

including Amazon, Google, Microsoft, Yahoo and many others who are offering solutions including

Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS), Storage-as-a- Service and Infrastructure-

as-a-Service (IaaS) [6]. In addition, considering the possibility to substantially minimizing expenses by

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

80

optimization and also maximizing operating as well as economic effectiveness, cloud computing is an

excellent technology. Furthermore, cloud computing can tremendously boost its cooperation, speed, and

also range, thus empowering a totally worldwide computing model on the internet infrastructure. On top

of that, the cloud computing has advantages in delivering additional scalable, fault tolerant services [4].

A disaster is a natural or man-made danger leading to a situation of significant degree which causes

substantial actual destruction, loss of life, or extreme change to the surroundings [7]. The task of

information and communication technology (ICT) in disaster management happens to be growing. Huge

amounts of disaster-related data have been produced. Standard storage and data running technique tend

to be dealing with difficulties in achieving the actual efficiency, scalability, and also accessibility [8].

Cloud-based disaster recovery has grown to be widely used in many field due to its range of positive

aspects. Since the disaster recovery is present within a cloud, it minimizes the actual up-front capital

costs [7]. In the situation of disaster data management, Big Data indicates the enormous bunch of data

sets produced through different individuals and also consists of different data structures, which includes

structured, semi-structured, and unstructured data [8]. Furthermore, every inability within software or

hardware could possibly disrupt the actual work-flows or data and therefore, would certainly threat the

customers. Consequently, Big Data come with an essential demand to add deployment of a disaster

recovery plan to guarantee safe sources of data [9].

Businesses are subjected to threats that can interrupt operations, disaffect clients and also endanger

company trustworthiness as well as income avenues. Threat can even be exposed to an organization by

changes [10]. Data is incredibly beneficial business resource, the data is essential for businesses,

particularly highly dependent on the data of businesses [11].

Over time, businesses experienced a number of system failures which in turn take a direct effect on

their particular most important resource, data and its safety [12]. Businesses are beginning to consider

cloud computing technology as a means to reduce expense while maximizing earnings, given that over

all sectors administrators are under constant stress to cut back capital resources, cloud techniques provide

them with the means to fulfill this aim [13].

Several private and public industry businesses employ Disaster Recovery (DR) systems to deliver

data protection for their information as well as application solutions. A vital concern in delivering a DR

services are to assist Business Continuity (BC) [14]. Furthermore, BC is an important requirement of

numerous organizations, being a quick service disturbance could influences enterprise goals leading to

substantial failures with regards to income, business reputation and losses of share of the market [15].

2. Methodology

A systematic literature search was carried out on fourteen databases. The databases were ACM Digital

Library, IEEE Xplore Digital Library, Annual Reviews, Computer Source: Consumer Edition,

ScienceDirect Backfiles Collections, CS Digital Library, J-STAGE, ProceedingsFirst, Scopus, Web of

Science, COMPENDEX, Emerald, ProQuest ERIC, Springer Online Journal Collection. The search was

completed by employing thesaurus terms and free text words, combining them in a suitable way. The

terms used were: cloud computing, data recovery, and business continuity. Furthermore, free text words

were ANDed and ORed with the suitable thesaurus terms and some other search phrases. English-

language articles published in peer-reviewed journals from the year 1995 up to 2016 were involved.

Table 1. Iterative inclusion and exclusion selection criteria

Round 1: review of title

and abstract

Inclusion criteria:

Study generally the cloud computing, data recovery, and

business continuity

Round 2: review of full

text articles

Inclusion criteria:

Must have an evaluation component (qualitative,

quantitative or both)

Exclusion criteria:

Focus on cloud computing

Focus on data recovery

Focus on business continuity

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

81

Iterative inclusion and exclusion selection criteria were formulated and applied through two rounds

of screening in our systematic review as demonstrated in Table 1. In the first round, titles and abstracts

were screened by the author independently to retain articles featuring cloud computing. For the second

round a screening of full-text articles were evaluated, and articles were chosen. Throughout the second

round, the inclusion and exclusion were highly processed. Articles were omitted once they were out of

our investigation range.

Initially the search yielded 302 articles. These articles have been reviewed to exclude articles that

failed to fulfill the selection criteria: (1) focus on cloud computing, (2) focus on data recovery, (3) focus

on business continuity, and (4) paper written in English. The final number of articles involved in the

review was thus 84 as revealed in Figure 1. A total of 218 articles were excluded based on the criteria

given in each round.

Figure 1. Selection process for study inclusion

3. Pre-study

According to the National Institute of Standards and Technology (NIST), cloud computing is

described as a model for empowering easy, on-demand access to a joint pool associated with configurable

computing sources which can be provisioned quickly as well as launched through minimum

administration efforts or perhaps service provider interaction. Cloud computing not really a buzzword

however has transforming and enhancing the approach we take to employ computing platforms. A

growing number of businesses happen to be transferring in direction of cloud computing for its positive

aspects and also simplicity of maintenance [16].

Cloud computing concept refer to offering of computing resources over the web, therefore we have

been utilizing the over net at a different place to store data rather than maintaining information by

ourselves or application for our own demand [17]. Additionally, Cloud Computing could be regarded as

an Internet-based growth and make use of IT and resources. Cloud Computing is commonly termed as

an innovative business model in which core computing, software functionality as well as storage

resources are outsourced when needed in order to share third-party infrastructures [18]. In addition, cloud

computing is a mixture of many essential technologies which have developed and also grown up through

the years [6].

Cloud Computing has introduced significant improvements towards the IT sector and also changes in

the means of considering and used paradigms, it has been imagined as the future technology architecture

of Information technology firm, it is also quickly trans-forming the nature of how enterprise employ IT

[18]. There are four ways that cloud storage could be implemented including private, public, community

and hybrid cloud [19].

Disaster recovery (DR) system in line with the level of resistance could be split into data disaster

recovery and disaster recovery applications [11]. Disaster recovery, is designed to develop a stand by

database that may supersede the actual host system to cope with operations once the host system could

not function due to disasters, therefore the actual operations could be handled normally [20].

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

82

An ICT based Disaster Management System (DMS) must be smartly designed to cope with all four

levels of the DMS life-cycle in which involve planning, emergency response, recovery and post-

planning. Additionally DMS includes six main elements which are Web Portal, Role Manager, Workflow

Engine, Workflow Scheduler, Workflow Monitor and Notification [21]. Cloud suppliers present Backup-

service for Disaster Recovery over cloud platform that is a Do-it-Yourself (DIY) model [14].

A study by [14], suggest a Disaster recovery solution for distributed businesses and every business

center may possibly consist of a number of sub applications for data generation as displayed in Figure 2.

Figure 2. Deployment architecture of Optimal

4. Cloud computing

Currently the cloud computing presents an innovative form of computing platform. Additionally,

cloud computing modify as well as enhances the way we make use of the computing platform [22]. The

IT sector is growing at a fast pace as highlighted in Figure 3. Many of us learn about new technology

along with developments in IT, on a regular basis. A number of technologies remain and a few disappear

with no track. Cloud Computing is definitely the most popular buzzword within the IT sector nowadays.

Furthermore, it is nothing more or less than the offering of computing as well as storage space ability as

a service to enterprises [23].

Figure 3. Evolution of Computing

The concept of cloud computing was initially utilized by computer professor Chellappa [23]. Cloud

computing is among present-day most exciting technologies due to its ability to minimize expense related

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

83

to computing whilst maximizing overall flexibility and also scalability for computer processes [24].

Cloud computing is an innovative technology rich in possibility to provide solutions with regard to

analyze associated with disasters’ progress, natural, technical or social, that may produce disasters and

also to offer solutions which could decrease their particular consequences [25]. It is also attractive to

businesses because it removes the requirement of preparing in advance with regard to provisioning, and

also enables them to begin with little resources [26].

Cloud computing has released an innovative era of upcoming computing, transform a big part of IT

sector, enhance the investment and utilize of IT hardware and software, as well as obtain substantial

interest from worldwide and regional IT players, countrywide authorities, as well as global businesses

[27-31]. Furthermore, cloud computing Technology is established through virtualization [32][33]. Based

on [26], The National Institute of Standards and Technology (NIST) describes cloud computing through

explaining five important characteristics, three cloud service models, and four cloud deployment models

as demonstrated in Figure 4.

Figure 4. Cloud computing model

Over the past decade, cloud computing has expanded as being a brand-new service paradigm, that

gets to be more preferred [34]. As well as, it offers online, powerful, and scalable virtualization assets

and services [35]. Cloud computing also boosts IT capabilities on the internet as being an innovative

form of service. Currently, small and medium business (SMB) businesses progressively recognize that

by making use of the cloud they can obtain immediate access to the most effective business applications

at a minimal expense [36].

Cloud Computing is an important technology as it carries a number of distinct technologies which

have established over time of commercial computing [23]. It is attracting technology in the area of

information technology furthermore, the cloud is transforming our life through providing consumers with

different forms of services [37]. In addition, it is about transferring solutions, computation or data off-

site to an internal or external, location-transparent, centralized center [38]. Cloud services elements are

generally split within the subsequent groups as represented in Figure 5.

Figure 5. Cloud computing service models

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

84

Cloud Software as a Service (SaaS) - The capability given to the client is to utilize the actual

provider’s applications operating over a cloud. The applications are obtainable through different

consumer units by a thin consumer interface.

Cloud Platform as a Service (PaaS) - The capability made available to the client is to set up into the

cloud client-created or obtained applications made from programming languages and tools backed up by

the provider.

Cloud Infrastructure as a Service (IaaS) - The capability given to the client is to deliver processing,

storage space, networks, along with other essential computing assets in which the client has the capacity

to set up as well as operate software.

Cloud Storage as a Service (StaaS) - It’s a part of IaaS. StaaS enables clients to keep their own

information at remote hard drives and also obtain them at any time through any location. Cloud storage

systems are anticipated to fulfill a number of demanding needs with regard to maintaining clients and

information, including substantial availableness, trustworthiness, overall performance, replication and

data regularity.

5. Data Recovery in the Cloud

With the high demand for cloud computing, disaster recovery employing cloud resources turns into

an incredible strategy [34]. Backup is usually a duplicate of data which is needed in the event of a data

loss or restoration. Backups secure data from human faults, hardware problems as well as natural

catastrophes [39][40]. In addition, Facebook currently has got over one billion users, with more than 618

million active users on a regular basis producing greater than 500 terabytes of new information every

day [8].

With the quick growth and development of IT, the scale of the information systems, the integrated as

well as the management productivity are actually the key indicators which assess the business's core

development, to obtain information system disaster backup, we should initially select the right backup

technology in line with the real scenario associated with disaster [41]. Moreover, a growing number of

services depend on IT systems currently, and a few of these, including economic service and also

healthcare service, tend to be essential to their clients and also community. Even a quite short time of

down time or even small volume of data loss could cause massive financial deficits or perhaps social

issues [42][34].

Getting ready for Disaster Recovery (DR) is among the most significant duties for IT data-centers

[43][44]. Also, the scope of DR has grown to be greater recently than ever before as a result of change

in business functions of various corporations. Internet connections have motivated the development of

new business models that need quick recovery and also constant procedures and also have the “zero-

downtime” as their supreme aim [45].

Research in disaster management includes several areas, the area of research engaged with the part of

IT in disaster management, has become attracting and elevated experts interest lately [8]. Several

organization in addition to federal government services employ Disaster Recovery (DR) systems to

reduce the actual downtime [42]. A short time associated with downtime would certainly lead to

substantial financial loss [37][46]. Furthermore, current statistics from the Cloud Industry Forum (CIF)

claimed that the use of cloud services has become a lot more popular day-to-day, the study states that

61% of UK corporations are currently adopting cloud services, an increase of 13% since 2011 [47][48].

Disaster recovery planning continues to be necessary aspects of any operating enterprise [49][50].

Furthermore, disasters, either manmade or natural, can result in costly service interruption. A pair of

unique DR models are often employed to avoid breakdown in a network: Traditional and cloud-based

service models. Based on IBM report [51], just 50% of disasters in IBM are associated with weather

conditions and the rest are due to different factors [1].

A study by [52], stated that DR performs an important role in restoring the corporation’s data in the

event of disaster and unsafe circumstances. DR is about getting ready for as well as dealing with a

disaster, for instance software or hardware breakdown, a network disruption, an electrical interruption,

actual physical destruction of a building such as flames or floods, human being mistake, as well as other

substantial event [53]. Planning anticipated weaknesses and also determine the requirements of the

enterprise and IT infrastructure, develop and then put into practice risk measures giving the corporation

with a disaster strategy [44].

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

85

The structure of disaster recovery is "distributed computing, centralized storage". In accordance with

various requirements, disaster recovery includes three levels which includes data-level disaster recovery,

system level disaster recovery, and application-level disaster recovery. Data-level disaster recovery is

regarded as the basic and it could guarantee the safety of the application data. System level disaster

recovery disaster has additional demands with regard to operating-system associated with application

server [3]. A standard architecture of disaster recovery is presented in Figure 6.

Figure 6. Standard architecture of disaster recovery

Considering the quick growth of the information society, data storage results in being more

significant. Once the data which is not utilized temporarily but essential, it will likely be kept in cloud

storage [35]. Cloud storage is a principle extended and produced from the perception of cloud computing

[3]. Placing all things in the Cloud gives customers hassle-free [35]. Cloud storage is a repository in

which the data is preserved, handled, and is also made accessible to businesses over the web [19]. In

addition, cloud storage offers online storage in which data kept in way of virtualized pool which is

normally hosted by others [5].

There are four methods in which the cloud storage could be deployed including private, public,

community and hybrid cloud [19]. Furthermore, data security matters of cloud storage occur due to

insufficient certification, authorization and audit control, weak encrypted shield algorithms, poor keys,

risk of organization, unstable data center, and also lack of disaster recovery [54][35]. Although software

and data services are transparent, harmful attacks should definitely avoided. It is essential and hard to

make certain data security in cloud storage system. It's important to generate fault tolerant function in

considerably less expense for cloud storage and there should be fault-tolerant back-up system, which

could guarantee that data have a very reliable backup [3]. Cloud storage system architecture model is

made up of four layers which include access, application, infrastructure, and storage layers as indicated

in Figure 7.

Figure 7. Cloud storage system architecture

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

86

According to [8], Big Data describes significant and sophisticated data sets comprised of a number of

structured and unstructured data that are too large to be maintained through traditional methods.

Furthermore [55], stated that Big Data is categorized by volume, velocity and variety. Volume indicates

the amount of data, velocity relates both to how quick data are produced and how quick they should be

processed whilst, veracity is the capability to trust the data to be appropriate and also to utilize them to

generate essential selections. Traditional techniques tend to be dealing with several difficulties in

meeting the demands of Big Data, which includes storage, processing, management, search, transfer

among devices or storage locations, analysis, and visualization [8].

6. Business Continuity

With the dramatical improvement the information sector in addition to the escalating of world-wide

businesses, a massive enterprise information has considered as the core for the worldwide business

connections and data safe-keeping gets to be particularly significant. When the data this is simply not

utilized in the short term but vital, it's going to be stored in cloud storage [35]. Several corporations

would like to boost their opportunity to get over system failures and data loss, particularly to safeguard

themselves from natural as well as man-made disasters [22].

A number of small and big corporations nowadays depend on an internet existence. Continuity is an

important element the majority of organizations, as a unexpected service interruption can certainly

influence organization goals leading to substantial losses with regards to income, business status as well

as losses associated with market share [56][22]. As a point of interest in each and every organization,

data has a large measure of concern from both scholastic and mechanical views. As data evolves in size,

ensuring that it must be safely and securely set aside happens to be challenging [39].

In each and every enterprise there are a significant amount of data in digital format in which needed

the safety storage services. Data backup and Business Continuity matters have grown to be essential in

networks as the benefits and the need for electronic data is repeatedly escalating. Every single enterprise

demands a business continuity plan (BCP) or disaster recovery plan (DRP) and data backup that comes

within the expense limitations whilst getting the goal recovery requirements with regards to recovery

time objective (RTO) as well as recovery point objective (RPO) [22]. [57], strengthen this statement by

saying that, every enterprise needs BCP or DRP which often falls within expense constraints while

getting the concentrating on recovery requirements with regards to RTO and RPO.

The DR levels are classified through those two important measures RTO and RPO which are the

primary goals that should be achieved anytime assessing a great choice in a given operating and capital

costs [42][15]. Furthermore, RPO states the data we might afford to lose, the lower the RPO, the higher

the total expense of preserving the actual infrastructure environment for recovery [44]. This is more

investigated by [49] whom stated that, RPO indicates the highest possible appropriate period in between

a couple of backups while RTO describes the most acceptable time period a business process might be

disrupted as revealed in Figure 8.

Figure 8. Recovery point objective (RPO) and recovery time objective (RTO)

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

87

Disaster Recovery Planning (DRP) is related with the recovery of a key set of IT systems as well as

infrastructure elements. While, the Business Continuity Planning is associated with the business as a

complete piece handling business processes [44]. [22] Reinforces this statement by saying that, a key

principle in a DRP is the actual physical separation of the main and also back-up sites. A substantial

fraction of disasters consisting of those brought on through failures tend to be geographical as

demonstrated in Table 2.

Table 2. Disaster faced in five years period

Cause Organization

System upgrades 72%

Power outage 70%

Fire 69%

Configuration change management 64%

Cyber attacks 63%

Malicious employees 63%

Data leakage 63%

Flood 48%

Hurricane 47%

Earthquake 46%

Tornado 46%

Terrorism 45%

Tsunami 44%

Volcano 42%

War 42%

Others 1%

The role of ICT in disaster management continues to be growing, behavior of essential infrastructures

has been explained by simulation, and response plans have been made by government departments as

well as individual businesses [58]. In addition, existing data storage systems tend to be different and

present few or perhaps no integration features. To make the most of available data, a reliable and scalable

storage system sustained by data sharing, reuse, integration, as well as evaluation is required [59].

As an promising technology and business model, Cloud Computing has brought commercial

computing by storm given it offers quick access to a business' high-performance computing as well as

storage infrastructure by web services [38]. Furthermore, [34], stated that, DR-Cloud is consists of data

disaster recovery service customers and also multiple cloud service providers. The complete architecture

of DR-Cloud is shown in Figure 9 while Figure 10 shows the data backup and recovery models

correspondingly.

Figure 9. Data backup model

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

88

Figure 10. Data recovery model

Disasters might strike at anytime, anyplace, and most often take place along with minimal or no alert

[44][60]. Therefore, Most of the corporations tend to be seeking an improvement within their IT

infrastructure [23]. Cloud computing technology is a promising to modify the actual situation associated

with disaster recovery [61].

From the IT point of view, recovery will most likely stand for creating assistance for the running as

well as communications features regarded as essential by the enterprise society and then setting up

assistance regarding subsidiary systems. From the business viewpoint recovery usually means, having

the capacity to perform the business functions which are in the center of the enterprise then having the

capability to carry out subsidiary functions [44].

Client satisfaction is among the major objectives associated with a Service provider. Such satisfaction

is able to bring long lasting business expansion and far better business earnings [46][62][63]. In addition,

businesses can make use of DR services that are served by cloud service providers. By using these

services, information safety and service continuity tend to be assured for clients at several levels [1].

Table 3. Displays an overview of frequent difficulties as well as relevant solutions in DR plans

Table 3. Challenges and solutions of DR plans

Challenges Solutions Technique

Dependency cost Local backup

Scale up/down,

Dual-Role operation

Using a Linux box at the customer premises

Allocating resources to high priority

services.

Hiring and running idle physical nodes on

the secondary site

Failure prediction and

detection Security

Resource Management ,

GRB

SDDB

Prediction and replacement of risky hardware

Using monitoring unit

Using encryption, scrambling and shuffling

techniques

Replication latency Pipelined replication Performing replication and process

operations in parallel

Data storage Lack of

redundancy

IPCS

GRB, IPCS Using an inter private cloud

Multiple backup

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

89

An important concern in delivering DR services would be to assist Business Continuity (BC), enabling

applications to quickly come back on-line after having a disaster [42]. Therefore, DR thoughts are

element of the BC, business Continuity safeguards that a corporation might recover its IT systems as

well as enterprise procedures [44]. Furthermore, DR and BC demand that essential business information

is backed up occasionally and also saved in separated and safe locations [64].

DR includes the procedure and policies associated with planning for recovery or continuation of

technology infrastructure of corporation after having a natural or human-induced disaster. It is an

essential component of Business Continuity Management (BCM) [23]. In addition, BCM is a tool which

might be utilized to deliver better confidence that the results associated with processes and services could

be provided in case there is hazards [10].

Different researchers have recommended several development cycles for BCM, each of which places

focus on specific elements of BCM [10][65-68]. BCM involved nine levels that are program initiation,

project initiation, risk analysis, selecting risk mitigation strategies, monitoring and control,

implementation, testing, education and training, and review.

7. Research Issues in Cloud Computing, Data Recovery, and Business

Continuity

One of the primary issues in employing ICT in each and every field like authorities offices would be

to address the level of adaptability of ICT tools [69]. Currently, businesses developing their own

functions on computer system have got paid a lot more focus on information protection. Several elements

could potentially cause information protection issues that demand to be handled in various strategies

[20]. In addition, an effective disaster management depends on the collaboration between individuals;

nevertheless, the variety of the engaged individuals as well as their activities leads to huge information

heterogeneity. This heterogeneity of data, along with their amount, is among the primary problems in

delivering an extensive resolution in various disaster circumstances [8].

Natural disaster management ought to cope with massive amount of information comes from different

businesses as well as many individuals [21]. Furthermore, the optimal disaster recovery planning must

take under consideration the essential guidelines such as the cost, the cost of data transfers, and also the

cost of data storage [15]. Disaster recovery is a continual issue in IT platforms that it is an important

within cloud computing, due to the fact that cloud suppliers need to deliver the solutions for their clients

even though the data center is down [1].

An organization is subjected to hazards that might interrupt operations, disaffect clients as well as

compromise enterprise credibleness and also income streams [10]. Furthermore, many organizations

depend on DR solutions to avoid both manmade and natural disasters from causing costly service

interruptions. Unfortunately, existing DR services are available either at pricey, or with only weak

guarantees in regards to the level of data lost or time needed to resume functioning after having a disaster

[42]. [70] Furthermore, several businesses tend to be significantly looking into cloud-computing to save

expense.

A study by [39], stated that, the maintenance of a well-suited Backup and DR system has grown to be

a major issue. Additionally, a standard DR Service operates by duplicating application state in between

2 data locations; in case the main data center gets to be inaccessible, then the back-up site could take

over and can initialize a different backup of the application by making use of the recently duplicated data

[42].

The rapid growth and development of the Internet has contributed to a market of data resources, a rise

in the amount of data has generated difficulties with regards to storing as well as manipulating

unstructured data [71]. In addition, these shared resources might be quickly provisioned towards the

clients based on having to pay just for anything they employ [19].

In cloud computing, among the leading protection issues associated with businesses could be the

geographic location of the data which are currently being kept in the cloud particularly if they are located

within a different region since the legal guidelines of the host region of the equipment apply to the data

over the devices [72]. A number of clients and corporations have started utilizing cloud computing.

Nevertheless, they are worried about their own information whenever they store it on an alternative party

[4]. [37] Reinforces this statement by saying that, several security difficulties as well as concerns have

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

90

already been brought up including, threat management, trust & restoration procedure that must be taken

into consideration to deliver business continuity and greater consumer satisfaction.

As increasing numbers of data on consumers and organizations are located in the cloud, issues are

starting to expand regarding how secure an environment it is [2]. This is further emphasized by [73] who

stated that, security and privacy concerns is a substantial boundary with regard to customers to adapt into

Cloud Computing systems. Furthermore, the main approaching issue in cloud computing is the successful

disaster management [46].

A study by [16], state that, the significant issues in cloud computing are data backup and disaster

recovery. Disaster is among the significant factors impacting on the actual efficiency of the Cloud [46].

In addition, implementing cloud computing in an organization infrastructure deliver substantial

protection issues [74].

The necessity of cloud computing is escalating day-to-day [5]. In cloud computing, there are

difficulties in implementing cloud computing, one of the primary concern is the data protection as well

as privacy of data [26]. This is more emphasized by [54][35], whom stated that, data protection problems

with cloud storage happen to be due to insufficient certification, authorization as well as audit

management, vulnerable encryption algorithms, vulnerable keys, risk of association, questionable data

center, and also insufficient disaster recovery.

Cloud services depending on datacenter networks have become essential. Protecting such a network

from catastrophes like earthquakes, tornados and also terrorist strikes is really important [75].

Furthermore, there were situations where there was really a full blackout of whole cloud solution which

makes it inaccessible for a long time [72]. Googlemail went down for 2 hours [76]. Thus, the losing of

business could possibly be disastrous [74].

A study conducted by [77], over the risks going through cloud computing also it determined the actual

streaming risks this includes: abuse and nefarious, vulnerable application programming interfaces,

malicious insiders, shared technology vulnerabilities, data loss, account, service & traffic hijacking, and

unknown risk profile.

In cloud computing, substantial protection is among the significant boundaries intended for starting

the new period of making use of cloud computing as a steady and secure tool [31]. Furthermore,

considerations are increasingly being expressed and discussed in regards to the protection concerns

introduced by developing data disaster-recovery service over the cloud [2][78][79][36].

According to [30][52], security is a crucial element for any businesses. Furthermore, cloud computing

promise for a significant improvements on the way to save data as well as operate applications [38].

Placing everything in the Cloud gives customers hassle-free, but it also result in additional different

uncertainty which cloud storage solutions need to encounter simultaneously [35].

8. References

[1] Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., & Othman, M. (2014). Disaster

recovery in cloud computing. Computer and Information Science, 7(4), 39.

[2] Subashini, S., & Kavitha, V. (2011). A survey on security issues in delivery models of cloud

computing. Journal of network and computer applications, 34(1), 1-11.

[3] Jian-Hua, Z., & Nan, Z. (2011, August). Cloud computing-based data storage and disaster recovery.

In Future Computer Science and Education (ICFCSE), 2011 International Conference on (pp. 629-

632). IEEE.

[4] Ben Omran, O. M., & Panda, B. (2014, December). A new technique to partition and manage data

security in cloud databases. In Internet Technology and Secured Transactions (ICITST), 2014 9th

International Conference for (pp. 191-196). IEEE.

[5] Suguna, S., & Suhasini, A. (2015). Enriched multi objective optimization based cloud disaster

recovery. Karbala International Journal of Modern, 1(2), 122-128.

[6] Bisong, A., & Rahman, M. (2011). An overview of the security in enterprise cloud

computing. preprint arXiv:1101.5613.

[7] Nayar, K. B., & Kumar, V. (2015). Benefits of cloud computing during disaster. In Proceedings of

the International Conference on Transformations in Engineering Education (pp. 191-201). Springer

India.

[8] Grolinger, K. (2013). Disaster Data Management in Cloud Environments. The University of Western

Ontario, 1-121. Retrieved from http://ir.lib.uwo.ca/cgi/viewcontent.cgi?article=3216&context=etd

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

91

[9] Mansoori, B., Rosipko, B., Erhard, K. K., & Sunshine, J. L. (2014). Design and implementation of

disaster recovery and business solution. Journal of digital imaging, 27(1), 19-25.

[10] Gibb, F., & Buchanan, S. (2006). A framework for business continuity management. International

journal of information management, 26(2), 128-141.

[11] Liu, X. J. (2010, July). A brief analysis of the disaster recovery backup technology in Oracle

database DataGuard. In 2010 2nd International Conference on Industrial and Information Systems.

[12] Otero, A. R., Otero, C. E., Qureshi, A.(2010). Securing data transfer in the cloud through introducing

identification packet and UDT – authentication option field: a characterization. International Journal

of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010. Retrieved from

http://airccse.org/journal/nsa/1010ijnsa01.pdf

[13] Brandl D. (2010, January). Don't cloud your compliance data. Control Engineering, 57(1), 23.

[14] Saquib, Z., Tyagi, V., Bokare, S., Dongawe, S., Dwivedi, M., & Dwivedi, J. (2013, September). A

new approach to disaster recovery as a service over cloud for database system. In Advanced

Computing Technologies (ICACT), 2013 15th International Conference on (pp. 1-6). IEEE.

[15] Alhazmi, O. H., & Malaiya, Y. K. (2012, November). Assessing disaster recovery alternatives:

colocation or cloud. In Software Reliability Engineering Workshops (ISSREW), 2012 IEEE 23rd

International Symposium on (pp. 19-20). IEEE.

[16] Javaraiah, V. (2011, December). Backup for cloud and disaster recovery for consumers.

In Advanced Networks and Telecommunication (ANTS), 2011 IEEE 5th International Conference

on (pp. 1-3). IEEE.

[17] Kadam, M., Jidge, P., Tambe, S., Tayade, E., & Bhusari, V. (2014). Cloud Database Management

System. International Journal of Scientific Research and Education, 2(03).

[18] Andre, F. M. (2011). Availability and confidentiality in storage clouds (Doctoral dissertation,

CARNEGIE MELLON UNIVERSITY).

[19] Prabavathy, B., Priya, K., & Babu, C. (2013, July). A load balancing algorithm for private cloud

storage. In Computing, Communications and Networking Technologies (ICCCNT), 2013 Fourth

International Conference on (pp. 1-6). IEEE.

[20] Hong, X. (2006). A database monitoring and disaster recovery system. InFrontiers of WWW

Research and Development-APWeb 2006 (pp. 1201-1204). Springer Berlin Heidelberg.

[21] Habiba, M., & Akhter, S. (2013). A Cloud Based Natural Disaster Management System. In Grid and

Pervasive Computing (pp. 152-161). Springer Berlin Heidelberg.

[22] Suguna, S., & Suhasini, A. (2014, February). Overview of data backup and disaster recovery in

cloud. In Information Communication and Embedded Systems, 2014 International Conference

on (pp. 1-7). IEEE.

[23] Prakash, S., Mody, S., Wahab, A., Swaminathan, S., & Paramount, R. (2012). Disaster recovery

services in the cloud. InCloud Computing Technologies, Applications and Management, 2012

International Conference on (pp. 139-144). IEEE.

[24] Thingom, C., & Suma, V. (2014, February). Ensured availability of resources in a highly reliable

mode through enhanced approaches for effective disaster management. In Electronics and

Communication Systems (ICECS), 2014 International Conference on (pp. 1-6). IEEE.

[25] Craus, M., & Butincu, C. (2014). The Potential of Cloud Computing for Analysis and Finding

Solutions. In Improving Disaster Resilience and Mitigation-IT Means and Tools (pp. 239-252).

Springer Netherlands.

[26] Shahzad, F. (2014). State-of-the-art survey on cloud computing security Challenges, and

solutions. Procedia Computer Science, 37, 357-362.

[27] Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008, November). Cloud computing and grid computing

360-degree. In Grid Computing Environments Workshop, 2008. GCE'08 (pp. 1-10). Ieee.

[28] Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., & Brandic, I. (2009). Cloud computing and

emerging IT platforms: Vision, hype, and reality for delivering computing. Future Generation

computer systems, 25 (6), 599-616.

[29] Mell, P., & Grance, T. (2010). The NIST definition of cloud computing. ACM, 53(6).

[30] Armbrust, M., Fox, A., Griffith, R., Joseph, Katz, R., Konwinski & Zaharia, M. (2010). A view of

cloud computing. Communications of the ACM, 53(4), 50-58.

[31] Suna, D., Changb, G., Suna, L., & Wanga, X. (2011). Surveying and analyzing security, privacy and

trust issues in cloud computing. Procedia Engineering, 15, 2852-2856.

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

92

[32] Sun, A., Ji, T., Yue, Q., & Yang, S. (2013, January). Virtual machine scheduling, motion and disaster

recovery model for IaaS cloud computing. In Conference Anthology, IEEE (pp. 1-5). IEEE.

[33] Ahmaro, I. Y., Bin Mohd Yusoff, M. Z., & Abualkishik, A. M. (2014, November). The current

practices of green computing approaches in Malaysia. In Information Technology and Multimedia

(ICIMU), 2014 International Conference on (pp. 341-345). IEEE.

[34] Gu, Y., Wang, D., & Liu, C. (2014). DR-Cloud: Multi-cloud based disaster recovery. Tsinghua

Science and Technology, 19(1), 13-23.

[35] Shi, X., Guo, K., Lu, Y., & Chen, X. (2013). Survey on Data Recovery for Cloud. In Trustworthy

Computing and Services (pp. 176-184). Springer Berlin Heidelberg.

[36] Chen, Z., Yao, W., & Wang, C. (2012). Security and Trust Model for Data Disaster-Recovery on

the Cloud. In Trustworthy Computing and Services (pp. 140-147). Springer Berlin Heidelberg.

[37] Radha, D., & Patil, R.(2013) Load Balancing with Disaster Recovery using Multi Cloud.

[38] Wu, J., Ping, L., Ge, X., Wang, Y., & Fu, J. (2010, June). Cloud storage as the infrastructure of

cloud. In Intelligent Computing and Cognitive (ICICCI), 2010 International Conference on (pp. 380-

383). IEEE.

[39] Yarrapothu, S. (2015). Effectiveness of Backup and Disaster Recovery: A Comparative study on

Tape and Cloud based Backup and Disaster Recovery.

[40] Snedaker, S. (2013). Business continuity and disaster recovery planning for IT. Newnes.

[41] Ping, Y., Bo, K., Jinping, L., & Mengxia, L. (2010, June). Remote disaster recovery system

architecture based on database replication. InComputer and Communication Technologies in

Agriculture Engineering, 2010 International Conference On (Vol. 1, pp. 254-257). IEEE

[42] Wood, T., Cecchet, E., Ramakrishnan, K. K., Shenoy, P. J., van der Merwe, J. E., & Venkataramani,

A. (2010). Disaster Recovery as a Cloud: Economic Benefits & Deployment

Challenges. HotCloud, 10, 8-15.

[43] Nayak, T., Routray, R., Singh, A., Uttamchandani, S., & Verma, A. (2010, April). End-to-end

disaster recovery planning. InNetwork Operations and Management Symposium (NOMS), 2010

IEEE (pp. 357-364). IEEE.

[44] Prazeres, A., & Lopes, E. (2013). Disaster recovery–a project planning case study. Procedia

Technology, 9, 795-805.

[45] Wu, R., Li, R., Yu, F., Yue, G., & Wen, J. (2006, November). Research on Remote Heterogeneous

Disaster Recovery Technology in Grid Computing. In Semantics, Knowledge and Grid, 2006.

SKG'06. Second International Conference on (pp. 75-75). IEEE.

[46] Mahitha, O., & Suma, V. (2014). Effective Disaster Management to Enhance the Cloud. Proceedings

of the 48th Annual Convention of Computer of India-Vol I (pp. 583-591). Springer International

Publishing.

[47] UK Cloud adoption and trends for 2013’. Cloud Industry Forum, (2012). Accessed Aug 2013. http://

cloudindustryforum.org/downloads/ whitepapers/cif-white-paper-8-2012- uk-cloud-adoption-and-

2013-trends. pdf.

[48] Arean, O. (2013). Disaster recovery in the cloud. Network Security, 2013(9), 5-7

[49] Lenk, A., & Tai, S. (2014). Cloud standby: disaster recovery of distributed in the cloud. In Service-

Oriented and Cloud (pp. 32-46). Springer Berlin Heidelberg.

[50] Lenk, A. (2015, June). Cloud Standby Deployment: A Model-Driven Deployment for Disaster

Recovery. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on (pp. 933-

940). IEEE.

[51] IBM white paper. (2012). Virtualizing disaster recovery using cloud computing, IBM global

technology services.

[52] Chang, V. (2015). Towards a Big Data disaster recovery in a Private Cloud. Ad Hoc Networks, 35,

65-82.

[53] Robinson, Vamvadelis, & Narin, A. (2011). Using Amazon web services for disaster recovery.

[54] Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues

and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-

592

[55] Beyer, M. A., & Laney, D. (2012). The importance of ‘big data’: a definition.Stamford, CT: Gartner,

2014-2018.

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

93

[56] EMC (2009). Disaster Recovery for Small Businesses. Technical White Paper, 1-6. Retrieved July,

2016, from http://www.101datasolutions.co.uk/wp-content/uploads/2010/06/Disaster-Recovery-

For-Small-Business.pdf

[57] Alhazmi, O. H., & Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using cloud.

In Reliability and Maintainability, 2013 Proceedings-Annual (pp. 1-6). IEEE.

[58] Hristidis, V., Chen, S. C., Li, T., Luis, S., & Deng, Y. (2010). Survey of data management and

analysis in disaster. Journal of Systems and Software, 83(10), 1701-1714.

[59] Grolinger, K., Capretz, M. A., Mezghani, E., & Exposito, E. (2013, June). Knowledge as a service

framework for disaster data management. InEnabling Technologies: Infrastructure for

Collaborative, 22nd International Workshop on (pp. 313-318). IEEE.

[60] Matos, R., Andrade, E. C., & Maciel, P. (2014, October). Evaluation of a disaster recovery solution

through fault injection. In Systems, Man and Cybernetics (SMC), International Conference on (pp.

2675-2680). IEEE.

[61] Chidambaram, J., Prabhu, C., Rao, P., Wankar, R., Aneesh, C. S., & Agarwal, A. (2008, November).

A methodology for high availability of data for business continuity planning/disaster recovery in a

grid using replication in a distributed. In TENCON 2008-2008 Region 10 Conference (pp. 1-6).

IEEE.

[62] Gopalakrishnan Nair, T. R., & Suma, V. (2011). Defect management using pair metrics. Crosstalk,

The Journal of Defense Software Engineering, 24(6), 22-27.

[63] Suma, V., & Nair, T. R. (2010). Effective defect prevention approach in software process for better

quality levels. preprint arXiv:1001.3552.

[64] Sengupta, S., & Annervaz, K. M. (2014). Multi-site data distribution for disaster recovery: planning

framework. Future Generation Computer Systems, 41, 53-64.

[65] CCTA. (1995). An introduction to business continuity management. London: HMSO.

[66] Barnes, J. C. (2001). A guide to business continuity planning. Chichester: Wiley.

[67] Hiles, A., & Barnes, P. (2001). The definitive handbook of business continuity management.

Chichester: Wiley.

[68] Smith, D. J. (Ed.). (2002). Business continuity management: Good practice guidelines. Caversham:

Business Continuity Institute.

[69] Pokharel, M., Lee, S., & Park, J. S. (2010, July). Disaster recovery for system architecture using

cloud. In Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium

on (pp. 304-307). IEEE.

[70] Markoff, J. Barboza, D. ( 2010, February 18), 2 China Schools Said to Be Tied to Online Attacks.

Retrieved from http://www.nytimes.com/2010/02/19/technology/19china.html

[71] Deka, G. C. (2014). A survey of cloud database systems. IT Professional, (2), 50-57.

[72] Smith, R. (2009). Computing in the cloud. Research Technology Management, 52(5), 65- 68.

Retrieved March 17, 2010, from ABI/INFORM Global.

[73] Zhou, M., Zhang, R., Xie, W., Qian, W., & Zhou, A. (2010, November). Security and privacy in

cloud computing. In Semantics Knowledge and Grid (SKG), 2010 Sixth International Conference

on (pp. 105-112). IEEE.

[74] Kavuri, S. K., & Nutalapati, A. (2015). Enterprise Cloud Computing Challenges and Related

Security. International Journal of Regulation and Governance, 1(2).

[75] El-Serafy, M. A., Elsayed, A. M., Aly, M. H., El-Badawy, E. S., & Ghaleb, I. A. (2014, September).

Multiple Routing Configurations for Datacenter Disaster Recovery Applicability and Challenges.

In Computer and Communication Engineering (ICCCE), 2014 International Conference on (pp. 146-

149). IEEE.

[76] Hoover, J. N. (2008, August 16). Outages force cloud computing user to rethink tactics.

InformationWeek. Retrieved on March 26, 2010 from

http://www.informationweek.com/news/services/saas/showArticle.jhtml?articleID=210004236

[77] Cloud Security Alliance (2010). Top Threats to Cloud Computing. Cloud Security Alliance.

Retrieved from http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf

[78] Pearson, S., & Benameur, A. (2010, November). Privacy, security and trust issues arising from

cloud. In Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International

Conference on (pp. 693-702). IEEE.

[79] Svantesson, D., & Clarke, R. (2010). Privacy and consumer risks in cloud. Computer Law &

Security Review, 26(4), 391-397.

Data recovery and business continuity in Cloud computing: A Review of the Research Literature Mohammad M. Alshammari, Ali A. Alwan, Imad Fakhri Al-Shaikhli

International Journal of Advancements in Computing Technology(IJACT) Volume8, Number5, Dec. 2016

94