Stochastic Modeling of Database Backup Policy for a Computer System

As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure. However, this method spends high overhead costs for massive data transmission and much processing time in the normal operation of the database. To cover such weak points, incremental and full backup methods are adopted before updated trucks reach a predetermined level. Moreover, when the number of full backup files exceeded a predetermined level, we stop incremental and full backups and switch it to the image copy. This paper applies cumulative damage model to backup of files in a database system, by putting damage shock by update, failure shock by database failure and damage by dumped files, and considers the tradeoff among overhead costs of image copy and incremental, full backup methods, and discusses analytically an optimal policy for the image copy backup interval. Finally, numerical examples are given in the case of Poisson process and exponential distributions.

[1]  Satoshi Fukumoto,et al.  Optimal backup policy for a database system with incremental and full backups , 2003 .

[2]  Toshio Nakagawa,et al.  CUMULATIVE DAMAGE MODEL WITH TWO KINDS OF SHOCKS AND ITS APPLICATION TO THE BACKUP POLICY , 1999 .

[3]  Guy M. Lohman,et al.  Optimal policy for batch operations: backup, checkpointing, reorganization, and updating , 1977, SIGMOD '77.

[4]  A. Murat Tekalp,et al.  Resilient peer-to-peer streaming of scalable video over hierarchical multicast trees with backup parent pools , 2012, Signal Process. Image Commun..

[5]  Marco Gramaglia,et al.  Off-line incentive mechanism for long-term P2P backup storage , 2012, Comput. Commun..

[6]  Maryline Laurent-Maknavicius,et al.  A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider , 2010, Comput. Secur..

[7]  Guy M. Lohman,et al.  Optimal policy for batch operations: backup, checkpointing, reorganization, and updating , 1977, TODS.

[8]  M LohmanGuy,et al.  Optimal policy for batch operations , 1977 .

[9]  中村 正治,et al.  Stochastic reliability modeling, optimization and applications , 2010 .

[10]  Toshio Nakagawa,et al.  Shock and Damage Models in Reliability Theory , 2006 .

[11]  K. Suzuki,et al.  Storage management software for mainframe and UNIX : Storage devices & systems , 1995 .

[12]  Tommy Ward Security of Backup Data , 2006, Inf. Secur. J. A Glob. Perspect..

[13]  Jing Ma,et al.  A novel adaptive current protection scheme for distribution systems with distributed generation , 2012 .

[14]  Andreas Reuter,et al.  Principles of transaction-oriented database recovery , 1983, CSUR.

[15]  Qi Han,et al.  Fault Tolerant Evaluation of Continuous Selection Queries over Sensor Data , 2009, Int. J. Distributed Sens. Networks.

[16]  Nakagawa Toshio,et al.  Two Generational Garbage Collection Models with Major Collection Time , 2010 .

[17]  Giampaolo Bella,et al.  Distributed Backup through Information Dispersal , 2006, Electron. Notes Theor. Comput. Sci..

[18]  Toshio Nakagawa,et al.  Optimal Backup Interval for a Database System with Full and Periodic Incremental Backup , 2010, J. Comput..

[19]  Toshio Nakagawa,et al.  Optimal Tenuring and Major Collection times for a Generational Garbage Collector , 2012, Asia Pac. J. Oper. Res..