Survey on Data Recovery for Cloud Storage

Cloud computing provides people with lots of convenient services. Computing and storage of data are transferred from the local mobile terminal to the cloud server. Putting everything in the Cloud brings people convenient, but it also cause more various insecurity that cloud storage solutions must face at the same time. Much work has been done to solve the challenges. In this paper, we focus on the data recovery for cloud storage, present a comprehensive survey of existing problems and their current solutions on data recovery issues, discuss data security technologies of the data storage and recovery in cloud and describe some key factors and their role in data recovery.

[1]  Yan Zhao,et al.  Providing privacy preserving in cloud computing , 2009, 2009 International Conference on Test and Measurement.

[2]  Jianhua Che,et al.  Study on the Security Models and Strategies of Cloud Computing , 2011 .

[3]  Y. K. Malaiya,et al.  Evaluating disaster recovery plans using the cloud , 2013, 2013 Proceedings Annual Reliability and Maintainability Symposium (RAMS).

[4]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[5]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[6]  M. Wiboonrat An empirical IT contingency planning model for disaster recovery strategy selection , 2008, 2008 IEEE International Engineering Management Conference.

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Dan Lin,et al.  Data protection models for service provisioning in the cloud , 2010, SACMAT '10.

[9]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.

[10]  Arun Venkataramani,et al.  Disaster Recovery as a Cloud Service: Economic Benefits & Deployment Challenges , 2010, HotCloud.

[11]  M. Wiboonrat,et al.  Optimization strategy for disaster recovery , 2008, 2008 4th IEEE International Conference on Management of Innovation and Technology.

[12]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[13]  David Bermbach,et al.  MetaStorage: A Federated Cloud Storage System to Manage Consistency-Latency Tradeoffs , 2011, 2011 IEEE 4th International Conference on Cloud Computing.

[14]  Antonio Pescapè,et al.  Cloud monitoring: A survey , 2013, Comput. Networks.

[15]  Mohammad Reza Abbasy,et al.  Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences , 2011, 2011 IEEE World Congress on Services.