The document describes a proposed system called FogDrive Disaster Backup as a Service that uses fog computing to provide backup for cloud server data. It aims to provide an easy-to-use and secure backup system. The system would use cloud and encryption techniques to backup and store data on a FogDrive server located within the local network. It would include OpenPGP encryption of backups and allow users to manage their encrypted backups through a dashboard. The system architecture was presented, including modules for the cloud provider, FogDrive server, and backup software service.
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
Today’s most modern research area of computing is cloud comput
ing due to its ability to diminish the costs
associated with virtualization, high availability, dynamic resource pools and increases the efficien
cy of
computing. But still it contains some drawbacks such as privacy, security, etc. This paper is thorou
ghly
focused on the security of data of multi tenant model obtains from the virtualization feature of clo
ud
computing. We use AES
-
128 bit algorithm and cloud SQL to protect sensitive data before storing in the
cloud. When the authorized customer arises for usag
e of data, then data firstly decrypted after that
provides to the customer. Multi tenant infrastructure is supported by Google, which prefers pushing
of
contents in short iteration cycle. As the customer is distributed and their demands can arise anywhe
re,
anytime so data can’t store at particular site it must be available different sites also. For this f
aster
accessing by different users from different places Google is the best one. To get high reliability a
nd
availability data is stored in encrypted befor
e storing in database and updated every time after usage. It is
very easy to use without requiring any software. This authenticate user can recover their encrypted
and
decrypted data, afford efficient and data storage security in the cloud.
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
Today’s most modern research area of computing is cloud comput
ing due to its ability to diminish the costs
associated with virtualization, high availability, dynamic resource pools and increases the efficien
cy of
computing. But still it contains some drawbacks such as privacy, security, etc. This paper is thorou
ghly
focused on the security of data of multi tenant model obtains from the virtualization feature of clo
ud
computing. We use AES
-
128 bit algorithm and cloud SQL to protect sensitive data before storing in the
cloud. When the authorized customer arises for usag
e of data, then data firstly decrypted after that
provides to the customer. Multi tenant infrastructure is supported by Google, which prefers pushing
of
contents in short iteration cycle. As the customer is distributed and their demands can arise anywhe
re,
anytime so data can’t store at particular site it must be available different sites also. For this f
aster
accessing by different users from different places Google is the best one. To get high reliability a
nd
availability data is stored in encrypted befor
e storing in database and updated every time after usage. It is
very easy to use without requiring any software. This authenticate user can recover their encrypted
and
decrypted data, afford efficient and data storage security in the cloud.
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...cscpconf
In this paper we propose a new cloud computing environment where we approach a trusted
cloud environment which is controlled by both the client and the cloud environment. Our
approach is mainly divided into two parts. First part is controlled by the normal user which gets
permission by the cloud environment for performing operation and for loading data. Second
part shows a secure trusted computing for the cloud, if the admin of the cloud want to see the
data then it take permission from the client environment. This provides a way to hide the data
and normal user can protect their data from the cloud provider. This provides a two way
security which helps both the cloud and the normal user. For the above concept we propose a
java based algorithm. In this paper we also provide a comparative study between our novel and the traditional approach. It also proof that our method shows good result in comparison to the previous one
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Securing the digital landscape is paramount in our interconnected world. This abstract delves into the fundamentals of cyber security, exploring its vital role in safeguarding individuals, organizations, and nations against the pervasive threat of cybercrime. It examines the evolving challenges posed by cyber threats, from sophisticated attacks to emerging vulnerabilities, while elucidating practical strategies to mitigate risks and fortify defenses. Through an exploration of cybercrime's multifaceted nature, coupled with insights into the latest antivirus and firewall technologies, this abstract equips readers with essential knowledge to navigate the digital realm safely and responsibly.
In today's interconnected world, the protection of digital assets is paramount. This abstract serves as a deep dive into the foundational principles and advanced strategies of cyber security, illuminating its indispensable role in safeguarding individuals, organizations, and nations against the ever-looming specter of cybercrime. Beginning with an exploration of cyber security's core tenets, including confidentiality, integrity, and availability, readers are introduced to the fundamental principles that underpin effective defense strategies. Through insightful analysis and real-world examples, the abstract highlights the critical importance of maintaining these principles in the face of evolving cyber threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmIJERA Editor
In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, we propose a smart remote data backup algorithm, Seed Block Algorithm. The objective of proposed algorithm is twofold; first it help the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. The time related issues are also being solved by proposed seed block algorithm such that it will take minimum time for the recovery process. Proposed seed block algorithm also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques.
2137ad - Characters that live in Merindol and are at the center of main storiesluforfor
Kurgan is a russian expatriate that is secretly in love with Sonia Contado. Henry is a british soldier that took refuge in Merindol Colony in 2137ad. He is the lover of Sonia Contado.
Survey on Privacy- Preserving Multi keyword Ranked Search over Encrypted Clou...Editor IJMTER
The advent of cloud computing, data owners are motivated to outsource their complex
data management systems from local sites to commercial public cloud for great flexibility and
economic savings. But for protecting data privacy, sensitive data has to be encrypted before
outsourcing.Considering the large number of data users and documents in cloud, it is crucial for
the search service to allow multi-keyword query and provide result similarity ranking to meet the
effective data retrieval need. Related works on searchable encryption focus on single keyword
search or Boolean keyword search, and rarely differentiate the search results. We first propose a
basic MRSE scheme using secure inner product computation, and then significantly improve it to
meet different privacy requirements in two levels of threat models. The Incremental High Utility
Pattern Transaction Frequency Tree (IHUPTF-Tree) is designed according to the transaction
frequency (descending order) of items to obtain a compact tree.
By using high utility pattern the items can be arranged in an efficient manner. Tree structure
is used to sort the items. Thus the items are sorted and frequent pattern is obtained. The frequent
pattern items are retrieved from the database by using hybrid tree (H-Tree) structure. So the
execution time becomes faster. Finally, the frequent pattern item that satisfies the threshold value
is displayed.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
Cloud computing is new way of economical and efficient storage. The single data mart storage system is a less
secure because data remain under a single data mart. This can lead to data loss due to different causes like
hacking, server failure etc. If an attacker chooses to attack a specific client, then he can aim at a fixed cloud
provider, try to have access to the client’s information. This makes an easy job of the attackers, both inside and
outside attackers get the benefit of using data mining to a great extent. Inside attackers refer to malicious
employees at a cloud provider. Thus single data mart storage architecture is the biggest security threat
concerning data mining on cloud, so in this paper present the secure replication approach that encrypt based on
biocrypt and replicate the data in distributed data mart storage system. This approach involves the encryption,
replication and storage of data
Securing the digital landscape is paramount in our interconnected world. This abstract delves into the fundamentals of cyber security, exploring its vital role in safeguarding individuals, organizations, and nations against the pervasive threat of cybercrime. It examines the evolving challenges posed by cyber threats, from sophisticated attacks to emerging vulnerabilities, while elucidating practical strategies to mitigate risks and fortify defenses. Through an exploration of cybercrime's multifaceted nature, coupled with insights into the latest antivirus and firewall technologies, this abstract equips readers with essential knowledge to navigate the digital realm safely and responsibly.
In today's interconnected world, the protection of digital assets is paramount. This abstract serves as a deep dive into the foundational principles and advanced strategies of cyber security, illuminating its indispensable role in safeguarding individuals, organizations, and nations against the ever-looming specter of cybercrime. Beginning with an exploration of cyber security's core tenets, including confidentiality, integrity, and availability, readers are introduced to the fundamental principles that underpin effective defense strategies. Through insightful analysis and real-world examples, the abstract highlights the critical importance of maintaining these principles in the face of evolving cyber threats.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Back-Up and Recovery Techniques for Cloud Server Using Seed Block AlgorithmIJERA Editor
In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. To cater this, we propose a smart remote data backup algorithm, Seed Block Algorithm. The objective of proposed algorithm is twofold; first it help the users to collect information from any remote location in the absence of network connectivity and second to recover the files in case of the file deletion or if the cloud gets destroyed due to any reason. The time related issues are also being solved by proposed seed block algorithm such that it will take minimum time for the recovery process. Proposed seed block algorithm also focuses on the security concept for the back-up files stored at remote server, without using any of the existing encryption techniques.
2137ad - Characters that live in Merindol and are at the center of main storiesluforfor
Kurgan is a russian expatriate that is secretly in love with Sonia Contado. Henry is a british soldier that took refuge in Merindol Colony in 2137ad. He is the lover of Sonia Contado.
Hadj Ounis's most notable work is his sculpture titled "Metamorphosis." This piece showcases Ounis's mastery of form and texture, as he seamlessly combines metal and wood to create a dynamic and visually striking composition. The juxtaposition of the two materials creates a sense of tension and harmony, inviting viewers to contemplate the relationship between nature and industry.
Explore the multifaceted world of Muntadher Saleh, an Iraqi polymath renowned for his expertise in visual art, writing, design, and pharmacy. This SlideShare delves into his innovative contributions across various disciplines, showcasing his unique ability to blend traditional themes with modern aesthetics. Learn about his impactful artworks, thought-provoking literary pieces, and his vision as a Neo-Pop artist dedicated to raising awareness about Iraq's cultural heritage. Discover why Muntadher Saleh is celebrated as "The Last Polymath" and how his multidisciplinary talents continue to inspire and influence.
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...luforfor
This are the interiors of the Merindol Colony in 2137ad after the Climate Change Collapse and the Apocalipse Wars. Merindol is a small Colony in the Italian Alps where there are around 4000 humans. The Colony values mainly around meritocracy and selection by effort.
2137ad Merindol Colony Interiors where refugee try to build a seemengly norm...
FOG drive Keerthana3rd ppt.pptx
1. FogDrive Disaster Backup as a Service for
Cloud Server using Fog Computing
Batch Members:
Keerthana K (712818104019)
Rohit Prakash (712818104032)
Sharmila S M (712818104037)
Guided By,
Prof. D. Suganthi M.E,(Ph.D.),
Department of CSE
2. Objective
The purpose of online backup is simple and
straightforward: to protect the information –
whether it's business data or personal – from the
risk of loss associated with user error, hacking,
or any other kind of technological disaster.
3. Problem Identified
Data loss can result from user error, a malicious
attack, unauthorized access or breach, incomplete
data sync, incompatible software, power outages,
or disasters like extreme weather, flooding, and
fire.
4. Existing System
• TrustyDrive is a dmizes the storage needs using the sec-
cs data structure for deduplication of flat contents.
• ExpanStor is another Multi-Cloud storage system with
dynamic data distribution. It applies a Client-Server
architecture instead of a pure Client-Based
implementation.
5. Proposed System
• Proposed FogDrive to provide an easy-to-use, highly
secure, and reliable backup system using state-of-the-art
Cloud and encryption techniques.
• The FogDrive BDaaS provider manages the entire backup
process, providing the client with a user-friendly dashboard
to manage their data in the cloud and FogDrive.
• OpenPGP(Pretty Good Privacy (PGP)) Scheme based
Encrypted backups allow you personal control over your
data by locking it up with passwords meaning only your
authorized users can access it.
6. Hardware specification
• Processors: Intel® Core™ i5 processor 4300M at
2.60 GHz or 2.59 GHz (1 socket, 2 cores, 2
threads per core), 8 GB of DRAM.
• Disk space: 320 GB.
• Operating systems: Windows® 10, macOS*, and
Linux*.
7. Software Specification
• Server Side : Python 3.7.4(64-bit) or (32-bit)
• Client Side : HTML, CSS, Bootstrap
• IDE : Flask 1.1.1
• Back end: MySQL 5.
• Server : Wamp server 2i
• DL DLL : TensorFlow, Pandas, SiKit Learn
8. System Architecture – Fog Drive Data
Backup
Login
Upload Data
Encrypt Data
Generate ISO
File
Compress Data
Received Data
Backup Data
Update
FogDrive
Store Data
Fog Drive
Open PGP
DBaaS Backup
Data Owner
Cloud Front End Interface
UI
Cloud
Backend
Server
9. System Architecture – DBaaS Data
Recovery
Forward Req toFD
Server Status
Received Req
Check Ser.Avai
Decompress ISO
Request Data
Check SStorage
Fog Drive
Response Data
Request Data
DBaaS Web Interface
Retrieve Req.Data
Response Data
Decrypt Data
Data Owner
Data User
10. Modules
1. Cloud Service Provider
2. FogDrive
3. DBaaS Software Service
3.1. PGP Module
3.2. FD ISO Backup
3.3. Backup Recovery
11. 1. Cloud Service Provider
• Data owner or user are able to upload, download, or
modify their data interactively and very fast.
• Its integrated with the FogDrive for Cloud Disaster
Backup
12. 2. FogDrive
• The FogDrive is a client side storage server.
• Edge or client devices and the FogDrive are in
the same Local Area Network (LAN)
13. 3. DBaas Software Service
• This is the backup system that runs on the
FogDrive.
• The DBaas offers a simple but safe backup
interface to the edge nodes, whereas completely
protecting the data on a distributed Cloud storage.
14. 3.1. Open PGP
• The data delta coming from the cloud is
encrypted using openPGP scheme.
• Pretty Good Privacy (PGP) is an encryption
system used for both encrypting and
decrypting sensitive files.
15. 3.2. FD ISO Backup
● Backup the data in compressed manner and store
it in FogDrive with minimal storage space
16. 3.3. Disaster Backup Recovery
• Cloud data retrieval and recovery of the entire
data can be conveniently performed using DBaaS
from Fog Drive.
• Then, DBaaS can search for the metadata on all
the configured CSPs and construct the backup
chain.
17. 4. Performance Evaluation
• Time taken to retrieve and restore the user
data to FogDrive at the time of cloud disaster.
• Time taken to compress and decompress the
data.
32. Conclusion
• As important network infrastructures to support data storage and
service delivery for worldwide users, cloud data centers are
facing great threaten by frequent disasters around the world and
thus the survivability of cloud data centers becomes a critical
issue.
• This project introduces FogStore -Disaster Backup as a Service
and FogDrive, a new data backup system based on Cloud and
Fog Computing.
• overcomes the problems of multi-Cloud using the Fog
Computing paradigm.
• System users can easily and securely backup, restore, and modify
their data without caring about the sophisticated operations to
protect and secure the data on Temporary-Cloud storage
33. References
1. J. Fu, Y. Liu, H. Chao, B.K. Bhargava, Z. Zhang, Secure data
storage and searching for industrial IoT by integrating fog
computing and cloud computing, IEEE Trans. Ind. Inf. 14 (10)
(2018) 4519–4528.
2. S. K. Monga, S. K. Ramachandra, and Y. Simmhan, ``ElfStore: A
resilient data storage service for federated edge and fog resources,''
in Proc. IEEE Int. Conf. Web Services (ICWS), Jul. 2019, pp. 336-
345.
3. R. Mayer, H. Gupta, E. Saurez, and U. Ramachandran, ``FogStore:
Toward a distributed data store for fog computing,'' in Proc. IEEE
Fog World Congr. (FWC), Oct. 2017, pp. 1- 6.
4. O. A. Nasr, Y. Amer, and M. AboBakr, ``The, `droplet': A new
personal device to enable fog computing,'' in Proc. 3rd Int. Conf.
Fog Mobile Edge Comput. (FMEC), Apr. 2018, pp. 93-99.
5. OpenPGP. Accessed: Nov. 15, 2020. [Online]. Available:
https://www.openpgp.org