Abstract
With the increase in the number of applications that are deployed and executed in a cloud, cloud service providers face several maintenance related issues due to the high volume of data involved. The inability to effectively organize the information for decision making can have a serious impact on business decision making. The use of a cloud’s storage facilities for data backup and archiving provides flexibility and data preservation features at a very low cost. In this paper, we present an efficient data management system that can archive, store and manage information effectively. The massive amount of data in the cloud is grouped based on Jaccard Similarity into six different buckets. Two sets of data retention policies are proposed for the cloud archive framework. These policies are applied to each of the buckets individually to identify the data to be archived. Additionally, homomorphic encryption is applied to provide a level of security to the data to be archived. This data is archived into the cloud to provide a data storage environment as a service that is optimized for long term data retention, security and that is compliant with the data retention policy. This framework eventually improves the availability, confidentiality and reduces the access latency significantly.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
IBM Global Technology Services. http://www.ibm.com/services/be/en/it-services/Cloud_based_data_archiving_service.pdf
Prom, C.: Requirements for electronic records management systems (2011). Accessed 24 Mar 2012 (2011)
Hall, P.: Opportunities for CSPs in enterprise-grade public cloud computing. OVUM, May 2012
Megaupload file-sharing site shut down. http://www.bbc.com/news/technology-16642369
Qiu, S., Zhou, J., Yang, T.: Versioned file backup and synchronization for storage clouds. In: 2013 13th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid), pp. 302–310. IEEE (2013)
Data archiving. http://searchdatabackup.techtarget.com/definition/data-archiving
Liu, B., Cao, F., Zhou, M., Mogel, G., Documet, L.: Trends in PACS image storage and archive. Comput. Med. Imaging Graph. 27(2), 165–174 (2003)
Kephart, J.O., Walsh, W.E.: An artificial intelligence perspective on autonomic computing policies. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004, Proceedings, pp. 3–12. IEEE (2004)
Li, J., Stephenson, B., Motahari-Nezhad, H.R., Singhal, S.: GEODAC: a data assurance policy specification and enforcement framework for outsourced services. IEEE Trans. Serv. Comput. 4(4), 340–354 (2011)
Teevan, J.: How people re-find information when the web changes (2004)
Teng, C.C., Mitchell, J., Walker, C., Swan, A., Davila, C., Howard, D., Needham, T.: A medical image archive solution in the cloud. In: 2010 IEEE International Conference on Software Engineering and Service Sciences, pp. 431–434. IEEE (2010)
Huang, L.C., Liu, W.C., Chou, S.C.T.: Howcare: a personal health cloud archive and care-partners’ community. In: 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1237–1241. IEEE (2013)
Amazon S3. https://aws.amazon.com/s3/
Jaeger, P.T., Lin, J., Grimes, J.M.: Cloud computing and information policy: computing in a policy cloud? J. Inform. Technol. Politics 5(3), 269–283 (2008)
Gharaibeh, A., Constantinescu, C., Lu, M., Sharma, A., Routray, R.R., Sarkar, P., Pease, D., Ripeanu, M.: CloudDT: efficient tape resource management using deduplication in cloud backup and archival services. In: Proceedings of the 8th International Conference on Network and Service Management, pp. 169–173. International Federation for Information Processing (2012)
Niwattanakul, S., Singthongchai, J., Naenudorn, E., Wanapu, S.: Using of Jaccard coefficient for keywords similarity. In: Proceedings of the International MultiConference of Engineers and Computer Scientists, vol. 1, pp. 13–15 (2013)
Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic encryption applied to the cloud computing security. In: Proceedings of the World Congress on Engineering, vol. 1, pp. 4–6 (2012)
Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 325–341. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_18
Kornevs, M., Minkevica, V., Holm, M.: Cloud computing evaluation based on financial metrics. Inf. Technol. Manage. Sci. 15(1), 87–92 (2012)
Amazon S3 Pricing. https://aws.amazon.com/s3/pricing/
Keeping Data For A Long Time. http://www.forbes.com/forbes/welcome/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sabireen, H., Kirthica, S., Sridhar, R. (2018). Secure Data Archiving Using Enhanced Data Retention Policies. In: R, S., Sharma, M. (eds) Data Science Analytics and Applications. DaSAA 2017. Communications in Computer and Information Science, vol 804. Springer, Singapore. https://doi.org/10.1007/978-981-10-8603-8_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-8603-8_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8602-1
Online ISBN: 978-981-10-8603-8
eBook Packages: Computer ScienceComputer Science (R0)