{"title":"Optimized Damage Assessment in Large Datasets in Cloud","authors":"B. Panda, Shruthi Ramakrishnan","doi":"10.1109/UCC56403.2022.00067","DOIUrl":null,"url":null,"abstract":"Given the many advantages of cloud computing, many organizations, including those managing critical information systems, have been opting to move their data and applications to clouds. However, storing a large volume of time sensitive critical data in clouds brings about major security challenges. If a cyberattack on the cloud system succeeds in affecting the critical data, the damage spreads through the database rapidly due to the interdependency nature of such data. Without a fast and efficient damage assessment and recovery process, many critical applications will be impacted resulting in the unavailability of the vital operations of such systems. In this paper, we present a model that can accelerate damage assessment, and therefore recovery, of a large and interdependent data set by quickly separating affected and unaffected zones and releasing the unaffected data to be used by the corresponding applications when the recovery of the affected data continues.","PeriodicalId":203244,"journal":{"name":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE/ACM 15th International Conference on Utility and Cloud Computing (UCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCC56403.2022.00067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Given the many advantages of cloud computing, many organizations, including those managing critical information systems, have been opting to move their data and applications to clouds. However, storing a large volume of time sensitive critical data in clouds brings about major security challenges. If a cyberattack on the cloud system succeeds in affecting the critical data, the damage spreads through the database rapidly due to the interdependency nature of such data. Without a fast and efficient damage assessment and recovery process, many critical applications will be impacted resulting in the unavailability of the vital operations of such systems. In this paper, we present a model that can accelerate damage assessment, and therefore recovery, of a large and interdependent data set by quickly separating affected and unaffected zones and releasing the unaffected data to be used by the corresponding applications when the recovery of the affected data continues.