Keywords
|
Cloud Computing, Disaster recovery techniques, Traditional disaster recovery, Disaster recovery planning, Disaster recovery as a service. |
INTRODUCTION
|
To handle devices or licensed softwares in an organization having more employees and to provide those softwares to all employees for their work without any delay is slight difficult by using physical hardware. to overcome this problems cloud computing is developed. cloud computing is internet based computing process in which systems are interconnected with sharing resources by each other. internet is the medium acts between cloud and user. cloud has many servers of application, platform and infrastructure. client is connected to cloud server and can store data through internet and can access the data from anywhere. it is a real time communication network. we can run our programs from anywhere by accessing cloud. using cloud we can access any software or data without paying any money to cloud. |
When a system crashes or power failure occurs there s a chance of loss of data and some times it may result it in financial loss. This system crashing and other problems occur due to natural Disasters or by human from causing expensive service disruptions. When a disaster occurs in business continuity the company may get huge loss of data and also financial loss. It is a phenomenon that can cause damage to life and property and destroy the economic, social and cultural life of people. When disaster occurs company need to protect the data from loss. Cloud providing companies like Google, Amazon, Microsoft etc., experienced cloud disaster with a huge loss of data and servers. When disaster occurs at client side backup will be stored in cloud but if disaster occurs in cloud data will be lost. Natural disasters may occur due to bad weather results in disaster |
To overcome these disasters there are some disaster recovery techniques which are used to recover data. Backing up the data is the old technique which is used for disaster recovery. There are many companies which developed Disaster recovery techniques as required to their business continuity. Dedicated and shared models are the two approaches for disaster recovery based on cost and speed. Storing the data from cloud infrastructure inorder to recover when disaster occur. Every organization should have a documented disaster recovery process and should test that process at least twice each year. |
Causes of Data Loss
|
There are 6 causes of data loss due to disaster occurrence |
Natural Disasters: when natural disasters occur then 2% of the data will be lost. The main reasons of occurrence natural disasters are mundane and nefarious. Due to mundane and nefarious effects one cannot recognize the data loss when disaster occurs. |
Mission critical application failure: when an application is left unusable for few days then it causes a catastrophic failure and in some organizations it may be mission critical. By using all applications that are stored in cloud may reduce the catastrophic failures. |
Network failure: cloud and clients are connected by internet and when network fails the systems which are connected to cloud are crashed and data will be lost and applications which are working based on cloud will also suffer. As network failures IP based phones and telecommunications will also suffer. |
Network intrusion: when a virus is invaded onto the applications then there is a chance of occurrence of disaster. By placing unusable applications in that place on a watch list we can prevent occurrence of disaster. |
Hacking or malicious code: disaster occurs in inside or outside of the organization although they prevent hacking or malicious code from modifying data there is a loss of data. In US annually they spend $10 billion to recover this type of data loss. |
System failure: if infrastructure in a organization fails then whole systems which are connected in that organization will crash. This will affect the operating systems. |
The main reason for occurrence of disaster is human, 60% of the data centers are failed. According to US survey cloud in small businesses fails to reopen their business after catastrophic affect. |
Traditional Disaster Recovery
|
Traditional disaster recovery was developed by share group which are divided into 6 tiers. |
Tier 0: no offsite data that means there is no disaster recovery plan and no saved data. To recover data it may take weeks and it is unsuccessful. |
Tier 1: data backup without hotsite that means data is taken backup by offsite not by hotsite. To retrieve the data that is taken backup is time taken process. By not having their own redundant servers it is time taking process to locate and configure appropriate systems. |
Tier 2: data backup with hotsite that means organizations maintain data backup as well as hotsite it is the fastest process. By having a hot backup site when disaster occurs we can run applications at stand by servers. |
Tier 3: instead of taking backup by physical media it provides an electronic vault so that backup data is network accessible to hot site. As hotsite backup is cost effective it is better to access it by network. |
Tier 4: point in time copies means that organization maintains more timely point in time backup of crucial data is network accessible to host site. |
Tier 5: transaction integrity means that transactions are consistent between production systems and recovery sites. So, there should be no loss of data. |
Traditional disaster recovery offers better RPO’s and RTO’s. Traditional geographic redundancy is an alternative technique that has data centers having sufficient equipment to store data when backup is made. To assure rapid recovery time objective it is necessary to deploy same type or hardware or software to geo-redundant sites. Virtualization simplifies traditional disaster recovery by relaxing compatibilities requirements by deploying hardware on recovery site. Hardware configuration on recovery site should be equal to primary site to carry the entire traffic load served by impacted site acceptable service quality, reliability and latency. |
If applications are booted from scratch for disaster recovery then RTO onto virtual machines should be comparable with the RTO on traditional cold standby configurations |
Disaster recovery requirements
|
This explains key features for effective cloud service when disaster occurs. |
Recovery point objective: maximum time period taken for data loss when an disaster occurs is calculated RPO. The necessary RPO is generally a business decision—for some applications absolutely no data can be lost (RPO=0), requiring continuous synchronous replication to be used, while for other applications, the acceptable data loss could range from a few seconds to hours or even days. The recovery point objective identifies how much data you are willing to lose in the event of a disaster. |
Your RPO is typically governed by the way in which you save and back up data: |
• Weekly off-site backups will survive the loss of your data center with a week of data loss. Daily off-site backups are even better. |
• Daily on-site backups will survive the loss of your production environment with a day of data loss plus replicating transactions during the recovery period after the loss of the system. Hourly on-site backups are even better. |
• A NAS/SAN will survive the loss of any individual server, except for instances of data corruption with no data loss. |
• A clustered database will survive the loss of any individual data storage device or database node with no data loss. |
• A clustered database across multiple data centers will survive the loss of any individual data center with no data loss. |
Recovery time objective: it is a measurement of time upto which it can withstand and bring back to the system when a disaster occurs. It may be minutes, hours, and days. It may also include detection of failure and preparing required servers at backup site to initialize an application which is interrupted in middle of execution. The recovery time objective identifies how much downtime is acceptable in the event of a disaster. |
Performance: to make DR service useful performance is to be protected under failure free operation by using synchronous replication of application to the backup site and complete the performance of application to make it ready to use. |
Consistency: the application which is taken backup when disaster occurred should be replicated on same site after clearance of disaster at the consistent state. DR mechanism is useful to take backup when disaster occurs. |
DISASTER RECOVERY PLANNING
|
There are some mechanisms that are implemented for data backup when disaster recovery technique is used. So that when we want to take backup of a data we can follow some mechanisms. |
Backup sites can come from three different sources: |
• Companies specializing in providing disaster recovery services. |
• Other locations owned and operated by your organization. |
• A mutual agreement with another organization to share data center facilities in the event of a disaster. |
Hot Backup Site: It is very expensive to operate. This site works with organizations that operate real time processes. It is the duplicate of the original site. Loss in data is very minimal as we can relocate the data and continue our work what we are performing. It will save as a virtual image of our current data. In a few hours hot backup site can bring up to full production. It is priory used in the situations where disaster happening. |
Cool backup site: It is the least expensive to operate. It doesn’t take any backup of data copies or it doesn’t include hardware. Lack of hardware can startup with a minimal cost but require more time. Everything required to restore service to users must be procured and delivered to the site before recovery operation is performed. |
Warm backup site: It is already stocked with a hardware configuration on the backup site that found in primary site. To apply warm backup site the last data backup should be delivered to their primary sites. |
Disaster Recovery as a service
|
Disaster recovery as a service is an upcoming service as a nomenclature of cloud computing. It is a low cost service when compared to traditional disaster recovery. It is flexible in replicating physically or virtually. It provides application consistent recovery for some working applications like SQL server. It has pre-built options for virtual recovery environments including security, network connectivity and server failover when continuously replication among servers. When disaster occurs we can take backup and we can run our applications on service provided by disaster recovery until we get backup to primary site. Disaster recovery as a service to replicate critical servers and data centre infrastructure in cloud. |
Disaster recoveries as a service is free or pay on use offer. When incompatibilities are occurred due to software changes then breaking of DRaaS in cloud may occur.
|
The architecture of DRaaS is defined by three models. |
From Cloud: when the primary application or data is in cloud and backup or recovery site is in private data centre. |
In cloud: when both primary site and recovery site are in cloud. |
To cloud: when the application is in primary data centre and backup or recovery site is in cloud. |
To test the recovery processes sandboxes are used and they test without disrupting running application. It is only accessible to only system administrator. |
Solutions are pre-packaged services that provide a standard DR Failover to a cloud environment that you can buy on a pay-per-use basis with varying rates based upon your recovery point objective (RPO) and recovery time objective (RTO). |
CONCLUSION
|
As cloud computing is becoming very important in day to day life and every company is based on cloud computing. They are not aware of disasters in cloud; they don’t know any recovery mechanisms at first. When disaster occurred then all companies faced big loss of data and also financial then after many recovery mechanisms are introduced. As cloud nomenclature has a PaaS, IaaS, and SaaS as services which provide their service to cloud users in terms of infrastructure, software and platform as their requirement; so user can use cloud without any difficulty. By implementing DRaaS in cloud one can get recovered from data loss when he experiences a system failure or by natural disasters. So by implementing DRaaS in business continuity they can overcome their data loss. |
Tables at a glance
|
|
|
Figures at a glance
|
|
|
|
|
Figure 1 |
Figure 2 |
Figure 3 |
Figure 4 |
|
|
|
|
Figure 5 |
Figure 6 |
Figure 7 |
Figure 8 |
|
|
References
|
- https://en.wikipedia.org/wiki/Cloud_computing
- http://www.webopedia.com/TERM/C/cloud_computing.html
- http://www.cs.uwp.edu/staff/lincke/infosec/notes/BC-DR.ppt
- http://blog.ussignalcom.com/blog-1/bid/257525/6-Causes-of-Data-Loss-Prepare-your-Disaster-Recovery#_ftn2
- http://books.google.co.in/books?id=q0FaSaNEYK0C&pg=PA179&dq=cloud+
disaster+recovery&hl=en&sa=X&ei=wPXUYCPJIWIrAfSzICABA&ved=
0CEIQ6AEwAg#v=onepage&q=cloud%20disaster%20recovery&f=false
- http://www.pushbuttonrecovery.com/App_Themes/pbr/images/diagram_home_V1.jpg
- http://t1.gstatic.com/images?q=tbn:ANd9GcQnWtey5vjlaDofAVj1aeSiivZ1WlH1bWcZnI_nYMEqhnE6q7p2
- http://www.francescovolani.org/techlog/wp-content/uploads/2012 /04/RPORTO_Schema.png
- http://en.wikipedia.org/wiki/Backup_site
- https://access.redhat.com/site/documentation/enUS/Red_Hat_Enterprise_
Linux/4/html/Introduction_To_System_Administration/s2-disaster-recovery-sites.html
- http://www.liquidweb.com/img/disaster-recovery.jpg
- http://www.futurex.com/images/blog/disasterrecovery-plan.png
- Cloud Application Architectures building applications and infrastructure in the cloud by O'RELLYand George Reese.
- http://www.windstreambusiness.com/data-center-solutions/disaster-recovery/disaster-recovery-as-aservice
- http://www.windstreambusiness.com/media/299685/draas-large.jpg
- http://t1.gstatic.com/images?q=tbn:ANd9GcS_LS3KtFVs
C00YwagC2OmBV9GiX0EoZTjJJZXy38rzMLZk88HqqA
- http://en.wikipedia.org/wiki/Recovery_as_a_Service
- http://www.datacenterknowledge.com/wp- content/uploads/2011/10/netmagic-graphic1.jpg
- http://www.datacenterknowledge.com/wp- content/uploads/2011/10/netmagic-graphic3.jpg
- https://www.usenix.org/legacy/event/hotcloud10/tech/full_papers/Wood.pdf
|