Enhancing the Disaster Recovery Plan Through Virtualization

Currently, organizations are increasingly aware of the need to protect their computer infrastructure to maintain continuity of operations. This process involves a number of different concerns including: managing natural disasters, equipment failure, and security breaches, poor data management, inadequate design, and complex/impractical design. The purpose of this article is to delineate how virtualization of hosts and cloud computing can be used to address the concerns resulting in improved computer infrastructure that can easily be restored following a natural disaster and which features fault tolerant hosts/components, isolates applications security attacks, is simpler in design, and is easier to manage. Further, because this technology has been out for a number of years and its capabilities have matured an attempt has been made to describe those capabilities as well as document successful applications.

[1]  Kevin Adams Geographically Distributed System for Catastrophic Recovery , 2002, LISA.

[2]  Lei Guo Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks , 2007, Comput. Commun..

[3]  Jon Toigo Disaster recovery planning: for computers and communication resources , 1996 .

[4]  Andrea Domenici,et al.  High availability using virtualization - 3RC , 2010, ArXiv.

[5]  Paula Ta-Shma,et al.  Using virtualization for high availability and disaster recovery , 2009, IBM J. Res. Dev..

[6]  Jon Toigo Disaster Recovery Planning: Preparing for the Unthinkable , 2002 .

[7]  John P. Barton,et al.  An ounce of prevention: integrated disaster planning for archives, libraries, and record centres , 2002 .

[8]  Arun Venkataramani,et al.  Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.

[9]  Geoffrey C. Fox,et al.  Distributed and Cloud Computing: From Parallel Processing to the Internet of Things , 2011 .

[10]  Marco Lovera,et al.  Black-box performance models for virtualized web service applications , 2010, WOSP/SIPEW '10.

[11]  Graham Pervan,et al.  How chief executive officers in large organizations view the management of their information systems , 1998, J. Inf. Technol..

[12]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[13]  Nick De Tura,et al.  Disaster recovery preparedness through continuous process optimization , 2004, Bell Labs Technical Journal.

[14]  Mark Stillwell,et al.  Dynamic Fractional Resource Scheduling for cluster platforms , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing, Workshops and Phd Forum (IPDPSW).

[15]  Carlos Maziero,et al.  Protecting host-based intrusion detectors through virtual machines , 2007, Comput. Networks.

[16]  John Hoopes Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting , 2008 .

[17]  P. K. Mudholkar,et al.  Disaster recovery planning with virtualization technologies in banking industry , 2011, ICWET.

[18]  Robert K. L. Gay,et al.  Grid-based large-scale Web3D collaborative virtual environment , 2007, Web3D '07.

[19]  James P. Hennessy,et al.  Multiple Operating Systems on One Processor Complex , 1989, IBM Syst. J..

[20]  Mehdi Khosrow-Pour,et al.  Printed at: , 2011 .

[21]  Andrew Hiles,et al.  The Definitive Handbook of Business Continuity Management , 2010 .

[22]  Weimin Zheng,et al.  Structure-independent disaster recovery: Concept, architecture and implementations , 2009, Science in China Series F: Information Sciences.

[23]  Sebastiaan H. von Solms,et al.  A Virtualized Environment Security (VES) model for a secure virtualized environment , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[24]  Grenville Armitage,et al.  Teaching IP Networking Fundamentals in Resource Constrained Educational Environments. , 2005 .

[25]  Mehdi Khosrow-Pour,et al.  Best Practices and Conceptual Innovations in Information Resources Management: Utilizing Technologies to Enable Global Progressions , 2008 .

[26]  Andrew Hiles Surviving a computer disaster , 1992 .

[27]  V. Latora,et al.  Complex networks: Structure and dynamics , 2006 .