Abstract

In a world of interdependent economies and online transactions, a large volume of data hosted on the cyberspace a daily bases. Cyber threats and attacks are steadily increasing. Most time, these threats and attacks are targeted at service providers but service users are greatly affected by the attacks due to their vulnerability level. When disasters knockdown the infrastructures of a single service provider, it will have ripple effects on thousands of innocent service users. Therefore, service users need more than ever to prepare for major crises targeted at their service providers. To cope with this trends, every service user requires an independent business continuity plan (BCP) or disaster recovery plan (DRP) and data backup policy which falls within their cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO). The aim of this paper is to develop a model for a user-centric disaster recovery system to enable service users to independently develop their data backup policies that best suits their remote databases, and host same as a cloud service deployable on public cloud for users to subscribe to and be billed on pay-as-you-go billing model. The system developed is highly compatible with MYSQL, MSSQL and Oracle databases. A combination of Dynamic System Development Methodology (DSDM) and Object- Oriented Analysis and Design Methodology (OOADM) were used to design the system while Java Enterprise Edition (JEE) is used to develop the system. The encryption and compression mechanisms of the system were tested with various sizes of backup files ranging from 64 Kb to 20Mb and several performance metrics such as (1) Encryption time; (2) Compression size; (3) CPU clock cycles and battery power are compared and analysed with some well-known encryption and compression algorithms.

Highlights

  • In the world of technology, change is the only constant factor

  • In an event of major attach targeted at a single service provider, thousands of service users who have their enterprise applications hosted on the infrastructures of the service users will be greatly affected even when the attack is not originally targeted at them. To cope with this trends, every service user requires an independent business continuity plan (BCP) or disaster recovery plan (DRP) and data backup policy which falls within their cost constraints while achieving the target recovery requirements in terms of recovery time objective (RTO) and recovery point objective (RPO).In (Usman & Inyiama, 2019)auser-centric cyber disaster recovery system which permits service users to periodically creates back up of their remote databases and transfer such files to their premises was proposed

  • The Proposed Model In this work, we present a model for usercentric cyber disaster recovery system

Read more

Summary

Introduction

In the world of technology, change is the only constant factor. Computing in the past three decades witnessed a tremendous change in the way and manner data were processed which resulted in the emergence of distributed systems against the pre-existing centralized systems. It is interesting to see that presently, computing is going back to some sort of centralization with a brand name called Cloud computing (Westerlund & Kratzke, 2018). Prior to the emergence of cloud computing, supercomputers were used in specific areas like the military, government agencies, universities and research laboratories to handle enormous complex calculations. Aims at further diversifying the use of supercomputers by applying their power to solving problems that require complex computational resources (Buyya & Son, 2018). With the Internet connection, users are granted immediate access to a large number of the world's most sophisticated supercomputers together with their corresponding processing power, interconnected at diverse locations around the world

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.