2023
DOI: 10.54646/bijcs.019
|View full text |Cite
|
Sign up to set email alerts
|

A Secured Database Monitoring Method to Improve Data Backup and Recovery Operations in Cloud Computing

Abstract: In general, the company sometimes uses unregistered functions in database, which significantly improves performance, but does not leave the possibility of recovery except for backup. That is, actions must be performed immediately after passing the session. A queue problem is likely to cause data loss and downtime of about a week. In modern conditions, this can lead to the bankruptcy of the company. It can be seen that backup systems have been installed and configured, but despite this, they have not succeeded … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 85 publications
(7 citation statements)
references
References 28 publications
0
3
0
Order By: Relevance
“…This surge in embracing the cloud has changed the conventional approach to disaster recovery. About 70% of organizations have curated plans to augment their cloud expenditures, reflecting the huge shift in how the world perceives disaster recovery [18]. At the same time, cloud computing depicts an efficient means of managing digital assets.…”
Section: Cloud Disaster Recovery In Modern Businessmentioning
confidence: 99%
“…This surge in embracing the cloud has changed the conventional approach to disaster recovery. About 70% of organizations have curated plans to augment their cloud expenditures, reflecting the huge shift in how the world perceives disaster recovery [18]. At the same time, cloud computing depicts an efficient means of managing digital assets.…”
Section: Cloud Disaster Recovery In Modern Businessmentioning
confidence: 99%
“…This includes determining the most suitable methods and approaches for recovering IT systems and services, such as restoring from backups, activating redundant systems, or utilizing alternative infrastructure. Regarding backup and data recovery, the process entails the implementation of data backup and recovery mechanisms to protect critical data and ensure its availability for restoration [21], [22]. This involves regular and reliable backup processes, offsite storage of backups, and the testing of data recovery procedures to validate their effectiveness [23].…”
Section: Disaster Recovery Planningmentioning
confidence: 99%
“…However, their joint work is required as the number of PCs increases. It is the possibility of multiple people working with one document simultaneously [26].…”
Section: Introductionmentioning
confidence: 99%