Real Time Disaster Recovery and Active Backup of Linux Server
Keywords:
Disaster Recovery, Backup, Linux ServersAbstract
Backup and disaster recovery are critical to the survival of your business; as in those without a solution will find themselves out of business when the inevitable disaster, be it technical failure, natural, or a malicious human, brings their systems down. It is therefore entirely logical that businesses should put in some time and energy towards finding a good backup and disaster recovery solution. This buyers guide hopes to reduce the amount of time and energy you spend finding the right solution by giving you a good starting point from which to begin your search. Included below you will find an analysis of industry trends and current debates. In this paper we provide a way to provide active backup to linux servers in situations of recovery. We also provide a real time system implementation for dealing with disaster recoveries.
References
- Disaster Recovery Layer for Distributed OpenShift Deployments L. Tomas; P. Kokkinos; V. Anagnostopoulos; O. Feder; D. Kyriazis; K. Meth; E. Varvarigos; T. Varvarigou IEEE Transactions on Cloud Computing
- Unified human and robot command for disaster recovery situations Carlos Ibarra Lopez; James Kuczynski; Holly A. Yanco 2017 IEEE International Symposium on Technologies for Homeland Security (HST)
- Information Technology Disaster Recovery process improvement in organization Dinesh Alawanthan; Magiswary Dorasamy; Murali Raman 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) Year: 2017
- Yoichiro Ueno, Noriharu Miyaho, Shuichi Suzuki,Muzai Gakuendai, Inzai-shi, Chiba,Kazuo Ichihara, 2010, “Performance Evaluation of a Disaster Recovery System and Practical Network System Applications,” Fifth International Conference on Systems and Networks Communications, pp 256-259.
- Giuseppe Pirr´o, Paolo Trunfio , Domenico Talia, Paolo Missier and Carole Goble, 2010, “ERGOT: A Semantic-based System for Service Discovery in Distributed Infrastructures,” 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing.
- Eleni Palkopoulouy, Dominic A. Schupke, Thomas Bauscherty, 2011,“Recovery Time Analysis for the Shared Backup Router Resources (SBRR) Architecture”, IEEE ICC.
- Sheheryar Malik, Fabrice Huet, December 2011, “Virtual Cloud: Rent Out the Rented Resources," 6th International Conference on Internet Technology and Secure Transactions,11-14 ,Abu Dhabi, United Arab Emirates.
- Lili Sun, Jianwei An, Yang Yang, Ming Zeng, 2011, “Recovery Strategies for Service Composition in Dynamic Network,” International Conference on Cloud and Service Computing
- YUeno, N.Miyaho, and S.Suzuki, , 2009, “Disaster Recovery Mechanism using Widely Distributed Networking and Secure Metadata Handling Technology”, Proceedings of the 4th edition of the UPGRADE-CN workshop, pp. 45-48.
- Xi Zhou, Junshuai Shi, Yingxiao Xu, Yinsheng Li and Weiwei Sun, 2008, "A backup restoration algorithm of service composition in MANETs," Communication Technology ICCT 11th IEEE International Conference, pp. 588-591.
- M. Armbrust et al, “Above the clouds: A berkeley view of cloud computing,” http://www.eecs.berkeley.edu/Pubs/TechRpts/2009//EECS-2009-28.pdf.
- F.BKashani, C.Chen,C.Shahabi.WSPDS, 2004, “Web Services Peer to Peer Discovery Service ,” ICOMP.
- P.Demeester et al., 1999, “Resilience in Multilayer Networks,” IEEE Communications Magazine, Vol. 37, No. 8, p.70-76.
- S. Zhang, X. Chen, and X. Huo, 2010, “Cloud Computing Research and Development Trend,” IEEE Second International Conference on Future Networks, pp. 93-97.
- T. M. Coughlin and S. L. Linfoot, 2010, “A Novel Taxonomy for Consumer Metadata,” IEEE ICCE Conference.
- K. Keahey, M. Tsugawa, A. Matsunaga, J. Fortes, 2009, “Sky Computing”, IEEE Journal of Internet Computing, vol. 13, pp. 43-51.
- M. D. Assuncao, A.Costanzo and R. Buyya, 2009, “Evaluating the Cost- Benefit of Using Cloud Computing to Extend the Capacity of Clusters,” Proceedings of the 18th International Symposium on High Performance Distributed Computing (HPDC 2009), Germany.
- Wayne A. Jansen, 2011, “Cloud Hooks: Security and Privacy Issues in Cloud Computing, 44th Hawaii International Conference on System Sciences.Hawaii.
- Jinpeng et al, 2009, “Managing Security of Virtual Machine Images in a Cloud Environment”, CCSW, Chicago, USA.
- Ms..Kruti Sharma,Prof K.R.Singh, 2012, “Online data Backup And Disaster Recovery techniques in cloud computing: A review”, IJEIT, Vol.2, Issue 5
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.