Study of Cloud Computing Security Based on Private Face Recognition

Total Page:16

File Type:pdf, Size:1020Kb

Study of Cloud Computing Security Based on Private Face Recognition Study of Cloud Computing Security Based on Private Face Recognition Chenguang Wang, Huaizhi Yan School of Software, Beijing Institute of Technology Lab of Computer Network Defense Technology, Beijing Institute of Technology Beijing 100081, China {2007270702, yhzhi }@bit.edu.cn Abstract—Supporting study of a method to solve cloud [2] introduced the basic concepts of secure computing. Later, computing security issue with private face recognition. The people provided a lot of secure calculation solutions, namely method has three parts: user part provides face images; cloud combinatorial circuits [3, 4], ordered binary decision diagrams initialization part has a face subspace and templates database; [5], branching programs [6, 7], or one-dimensional look-up cloud private matching identification part contains the core table [6].However, the computational complexity of these algorithm of the method, comparing two encrypted numbers methods are too high to meet the paper, for the considering of under double-encrypted conditions. The experimental results combining biometric with cloud computing. Therefore, specific show the method can ensure that cloud neither know user’s real methods must be improved. face data, nor the face private matching identification result, to make user’s face data secure, we develop a credible, efficient, Some people try to use the private biometric matching low-complex method to guarantee cloud computing security. identification, especially in fingerprint and iris [8,9,10].However, these show more concerns on hardware Keywords-cloud computing security; private matching architecture, such as biological data hash template is stored on identification; face recognition the server. Server can know the result of matching (to only ensure the template is stored securely). In contrast, our I. INTRODUCTION scenario allows hide this information, and apply it to cloud Cloud computing is the network trend, with which people's computing .As far as we know, there is no helpful solution to lives have more relationship. However, a major characteristic solve the problem, when cloud computing involved with of cloud computing is distributed computation based on biometrics, efficiency and security problems appears. unfixed nodes, operations often carried out without trusted nodes, so the calculation involved with user privacy III. APPROACH information is insecure. Assume that cloud is B, user is A. The diagram of our In this paper, we focus on how to solve the security issues approaching method is summarized in Fig. 1. of cloud computing. Cloud computing security based on private face recognition ‘s significance is that face recognition will be applied to the cloud computing for the first time, supporting proof of private matching identification resolves security issues of cloud computing credibly, efficiently. Calculation of face recognition and matching is under encrypted conditions, user sends a double encrypted face image to cloud, and cloud operates face recognition and matching under the encrypted conditions, the result is encrypted again before encrypted transmission to user [1]. In this way, cloud neither knows user’s real face data, nor which face and the face matches in templates, ensure no leakage of user privacy data. The remainder of the paper is organized as follows. In Section 2 we provide a brief overview of the related work. In Section 3, we give detailed analysis of cloud computing security based on private face recognition method. Section 4 Figure 1. Method diagram. shows our experimental data and results .Our conclusion is provided in Section 5.. Our method is divided into three parts: user, cloud initialization and private matching identification part of cloud. II. RELATED WORK User part uses a series of face preprocessing method to do with original images, using Paillier [11] encryption algorithm The solution to the issue needs three-part collaboration; encrypt processed images; cloud initialization part uses the therefore, secure multi-collaborative computing is needed. Yao This work is supported by a grant from the Basic Research Program of Beijing Institute of Technology. 978-1-4244-5392-4/10/$26.00 ©2010 IEEE processed original images to establish subspaces and face Step4.When B received the information, it will be encoded templates database through PCA [12] algorithm; cloud private to be transmitted to the point M on Ep(a,b), and generates a matching identification part has projection, distance random integer r(r<n). calculation, minimum distance finding [13] combined to achieve a face matching and recognition under encrypted Step5.B calculates points C1=M+rK; C2=r. conditions; cloud and user’s communication is also in Step6.B passes C1、C2 to A. encrypted domain. Experimental results show that the method is credible and efficient to support cloud computing security Step7.After receiving the information, A calculates C1-kC2; study. the result is the point M. Because C1-kC2=M+rK- k(rG)=M+rK-r(kG)=M, then the point M can be explicitly A. User Part decode. A reads the original image, firstly preprocessing , then face B. Cloud Initialization Part detection and graying, also face vectoring ,after double- encrypt each pixel data ,data sent to B. Processing diagram The role of the part is to establish face subspace and the shown in Fig. 2 below: matching face templates database. Suppose there are M face images for matching. After a series of preprocessing described above, like detection, graying, and vectoring to get M face vectors, denoted as . Using PCA algorithm, the input data is M individual face vectors, then obtain eigenvector matrix , set , the matrix ’s column k denoted as . Use the formula to get projection coefficient of each face templates image , denoted as and Figure 2. User processing diagram. Preprocessing including image light, color, size, etc. makes Pass the feature vector matrix and the projection of each the input of each original image uniform and consistent; face face templates’ coefficient to private matching identification detection and graying contain finding the face region from part of cloud. original image, and cutting face down in unifying size, then convert each pixel’s RGB three-color value to gray scale data; In order to ensure private matching identification simple, face vectoring transforms the two-dimensional face image to the mean face needs calculated, denoted by , is defined one-dimensional vector, Denoted as , Double encryption as . Finally, pass the mean face to private firstly use Paillier encryption algorithm to encrypt each pixel’s matching identification part. gray value, following paper presents "[]" on behalf of Paillier encryption process, Encryption will be denoted by C. Cloud Private Matching Identification Part vector .Then, use Elliptical encryption, Denoted by , represent Elliptic encryption process in following paper with This part is the core of B, achieving face matching "[[]]".Finally, is passed to B. recognition in encrypted domain, using Paillier encryption algorithm and Elliptic encryption algorithm for double Encryption algorithm uses Paillier, because the Paillier encryption. encryption algorithm is additively homomorphic, and the encryption process is more simple and efficient. Paillier This section is divided into three steps, namely, projection, encryption algorithm is additively homomorphic because: distance calculation, minimum distance finding. , further: . Cloud private 1) Projection matching identification are based on the above two properties. This step is to project the high-dimensional original data Using Elliptic encryption for the distributed computation into lower-dimensional subspace, then obtain the projection and poor security when communicating with cloud computing. coefficients of original face. Set data received by B is . Because the group protocol based on Elliptic encryption In the case of non-encrypted condition, firstly, using enables cloud and user’s communication data secure, credible, original one-dimensional face vector subtract the average face, and complete when in an insecure, open network namely: communication environment. Elliptic encryption is described as follows: Step1.A selects an Elliptic curve Ep(a,b), y2=x3+ax+b(mod p), and get a point on the Elliptic curve as point G. (1) Step2.A selects a private key k, and generates public key K=kG. Then project to the subspace, namely: Step3. A sends Ep(a,b)and point K,G to B. (2) Where and so transmission doesn’t leak. Later, B sends M to A. is the decrypted by A with their own private key to obtain projection coefficient of input face and also a computing base and , double encrypted to , then pass to B. Following for the following distance calculation. diagram Fig. 3 show the transmission: But for B, to protect user privacy, the operation must be carried out in the encrypted domain. Because Paillier encryption algorithm is additively homomorphic, the following Cloud B User A operations happen: Figure 3. Double encrypted transmission diagram. (3) So B's projection calculation becomes: When B obtain , decrypt to , then process obey below: (4) (8) After the M times’ operation, B can receive encrypted projection coefficient . Later, multiply together each to compute .. Note’s As B knows and each , the operation is very calculation performs only once. The computation of distance convenient. More importantly, these operations are without A, between each template and input face can directly use . face templates database will not be leaked to A. Operation of both sides
Recommended publications
  • Building Your Hybrid Cloud Strategy with AWS Ebook
    Building Your Hybrid Cloud Strategy with AWS eBook A Guide to Extending and Optimizing Your Hybrid Cloud Environment Contents Introduction 3 Hybrid Cloud Benefits 4 Common AWS Hybrid Cloud Workloads 6 Key AWS Hybrid Cloud Technologies and Services 6 VMware Cloud on AWS 18 AWS Outposts: A Truly Consistent Hybrid Experience 21 Becoming Migration Ready 23 Hybrid Cloud Enablement Partners 24 Conclusion 26 Further Reading and Key Resources 27 © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Introduction Optimizing IT Across Cloud and On-Premises Environments Public sector organizations continue to do more with less, find ways to innovate and bring new ideas to their organizations while dealing with security and maintaining mission-critical legacy systems. Evolving cloud capabilities are transforming the IT landscape for many public sector organizations, some use cases a hybrid cloud approach can help ease and accelerate a path to modernization and cloud adoption. For some use cases a hybrid cloud approach became a more feasible path to IT modernization and cloud adoption. For example, some customers have applications that require the lowest network latency possible, or they already achieve consistent and predicable performance in an on- premises environment, but want to use new cloud tools to enhance the application (e.g. Enterprise Resource Planning systems, real-time sensor data processing, industrial automation and transaction processing). Some customers may encounter unique challenges such as federal regulations associated with data residency, or limitations on their use of the cloud. A hybrid cloud (the use of both on-premises and cloud resources), allows IT organizations to optimize the performance and costs of every application, project and system in either the cloud, on-premises datacenters, or a combination of both.
    [Show full text]
  • Magic Quadrant for Enterprise High-Productivity Application Platform As a Service
    This research note is restricted to the personal use of [email protected]. Magic Quadrant for Enterprise High- Productivity Application Platform as a Service Published: 26 April 2018 ID: G00331975 Analyst(s): Paul Vincent, Van Baker, Yefim Natis, Kimihiko Iijima, Mark Driver, Rob Dunie, Jason Wong, Aashish Gupta High-productivity application platform as a service continues to increase its footprint across enterprise IT as businesses juggle the demand for applications, digital business requirements and skill set challenges. We examine these market forces and the leading enterprise vendors for such platforms. Market Definition/Description Platform as a service (PaaS) is application infrastructure functionality enriched with cloud characteristics and offered as a service. Application platform as a service (aPaaS) is a PaaS offering that supports application development, deployment and execution in the cloud. It encapsulates resources such as infrastructure. High- productivity aPaaS (hpaPaaS) provides rapid application development (RAD) features for development, deployment and execution — in the cloud. High-productivity application platform as a service (hpaPaaS) solutions provide services for declarative, model-driven application design and development, and simplified one-button deployments. They typically create metadata and interpret that metadata at runtime; many allow optional procedural programming extensions. The underlying infrastructure of these solutions is opaque to the user as they do not deal with servers or containers directly. The rapid application development (RAD) features are often referred to as "low-code" and "no-code" support. These hpaPaaS solutions contrast with those for "high-control" aPaaS, which need professional programming — "pro-code" support, through third-generation languages (3GLs) — and provide transparent access to the underlying infrastructure.
    [Show full text]
  • An Introduction to Cloud Databases a Guide for Administrators
    Compliments of An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram & Sam Alapati REPORT Break free from old guard databases AWS provides the broadest selection of purpose-built databases allowing you to save, grow, and innovate faster Enterprise scale at 3-5x the performance 14+ database engines 1/10th the cost of vs popular alternatives - more than any other commercial databases provider Learn more: aws.amazon.com/databases An Introduction to Cloud Databases A Guide for Administrators Wendy Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Beijing Boston Farnham Sebastopol Tokyo An Introduction to Cloud Databases by Wendy A. Neu, Vlad Vlasceanu, Andy Oram, and Sam Alapati Copyright © 2019 O’Reilly Media Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more infor‐ mation, contact our corporate/institutional sales department: 800-998-9938 or [email protected]. Development Editor: Jeff Bleiel Interior Designer: David Futato Acquisitions Editor: Jonathan Hassell Cover Designer: Karen Montgomery Production Editor: Katherine Tozer Illustrator: Rebecca Demarest Copyeditor: Octal Publishing, LLC September 2019: First Edition Revision History for the First Edition 2019-08-19: First Release The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. An Introduction to Cloud Databases, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. The views expressed in this work are those of the authors, and do not represent the publisher’s views.
    [Show full text]
  • Price-Performance in Modern Cloud Database Management Systems
    Price-Performance in Modern Cloud Database Management Systems McKnight Consulting Group December 2019 www.m c k n i g h t c g . c o m Executive Summary The pace of relational analytical databases deploying in the cloud are at an all-time high. And industry trends indicate that they are poised to expand dramatically in the next few years. The cloud is a disruptive technology, offering elastic scalability vis-à-vis on-premises deployments, enabling faster server deployment and application development, and allowing less costly storage. The cloud enables enterprises to differentiate and innovate with these database systems at a much more rapid pace than was ever possible before. For these reasons and others, many companies have leveraged the cloud to maintain or gain momentum as a company. The cost profile options for these cloud databases are straightforward if you accept the defaults for simple workload or POC environments. However, it can be enormously expensive and confusing if you seek the best price-performance for more robust, enterprise workloads and configurations. Initial entry costs and inadequately scoped POC environments can artificially lower the true costs of jumping into a cloud data warehouse environment. Cost predictability and certainty only happens when the entire picture of a production data warehouse environment is considered; all workloads, a true concurrency profile, an accurate assessment of users and a consideration of the durations of process execution. Architects and data warehouse owners must do their homework to make the right decision. With data warehouses, it is a matter of understanding the ways they scale, handle performance issues and concurrency.
    [Show full text]
  • The Impact of the Google Cloud to Increase the Performance for a Use Case in E-Commerce Platform
    International Journal of Computer Applications (0975 – 8887) Volume 177 – No. 35, February 2020 The Impact of the Google Cloud to Increase the Performance for a Use Case in E-Commerce Platform Silvana Greca Anxhela Kosta Department of Informatics Department of Informatics Faculty of Natural Sciences Faculty of Natural Sciences University of Tirana University of Tirana Tirana, Albania Tirana, Albania ABSTRACT Storing the unstructured and complex data in traditional SQL A massive amount of complex and huge digital data storing is database is very difficult[13]. For this reason, it was necessary caused due to the development of intelligent environments to create many types of database. NoSQL databases are useful and cloud computing. Today the organizations are using for applications that deal with very large semi-structured and Google Cloud platform to store and retrieve of all amount of unstructured data. NoSQL databases do not require a default their data at any time. Google offers database storage schema associated with the data. The purpose of the NoSQL like:Cloud Datastore for NoSQL non-relational database and databases is to increase the performance and scalability of a Cloud SQL for MySQL fully relational database. During specific application and service. years, enterprise organizations have accumulated growing Nowadays, e-commerce platform is very popular and is going stores of data, running analytics on that data to gain value through a transformation driven by customers who expect a from large information sets, and developing applications to seamless experience between online and in store. As a result, manage data exclusively. Traditional SQL databases are used many retailers are turning to cloud technologies in order to for storing and managing content of structured data, but with meet these needs.
    [Show full text]
  • Database Solutions on AWS
    Database Solutions on AWS Leveraging ISV AWS Marketplace Solutions November 2016 Database Solutions on AWS Nov 2016 Table of Contents Introduction......................................................................................................................................3 Operational Data Stores and Real Time Data Synchronization...........................................................5 Data Warehousing............................................................................................................................7 Data Lakes and Analytics Environments............................................................................................8 Application and Reporting Data Stores..............................................................................................9 Conclusion......................................................................................................................................10 Page 2 of 10 Database Solutions on AWS Nov 2016 Introduction Amazon Web Services has a number of database solutions for developers. An important choice that developers make is whether or not they are looking for a managed database or if they would prefer to operate their own database. In terms of managed databases, you can run managed relational databases like Amazon RDS which offers a choice of MySQL, Oracle, SQL Server, PostgreSQL, Amazon Aurora, or MariaDB database engines, scale compute and storage, Multi-AZ availability, and Read Replicas. You can also run managed NoSQL databases like Amazon DynamoDB
    [Show full text]
  • Performance Evaluation of Nosql Databases As a Service with YCSB: Couchbase Cloud, Mongodb Atlas, and AWS Dynamodb
    Performance Evaluation of NoSQL Databases as a Service with YCSB: Couchbase Cloud, MongoDB Atlas, and AWS DynamoDB This 24-page report evaluates and compares the throughput and latency of Couchbase Cloud, MongoDB Atlas, and Amazon DynamoDB across four varying workloads in three different cluster configurations. By Artsiom Yudovin, Data Engineer ​ ​ Uladzislau Kaminski, Senior Software Engineer ​ Ivan Shryma, Data Engineer ​ Sergey Bushik, Lead Software Engineer ​ Q4 2020 Table of Contents 1. Executive Summary 3 2. Testing Environment 3 2.1 YCSB instance configuration 3 2.2 MongoDB Atlas cluster configuration 4 2.3 Couchbase Cloud cluster configuration 5 2.4 Amazon DynamoDB cluster configuration 6 2.5 Prices 6 2.5.1 Couchbase costs 7 2.5.2 MongoDB Atlas costs 7 2.5.3 Amazon DynamoDB costs 8 3. Workloads and Tools 8 3.1 Workloads 8 3.2 Tools 8 4. YCSB Benchmark Results 10 4.1 Workload A: The update-heavy mode 10 4.1.1 Workload definition and model details 10 4.1.2 Query 10 4.1.3 Evaluation results 11 4.1.4 Summary 12 4.2 Workload E: Scanning short ranges 12 4.2.1 Workload definition and model details 12 4.2.3 Evaluation results 14 4.2.4 Summary 15 4.3 Pagination Workload: Filter with OFFSET and LIMIT 15 ​ 4.3.1 Workload definition and model details 15 4.3.2 Query 17 4.3.3 Evaluation results 17 4.3.4 Summary 18 4.4 JOIN Workload: JOIN operations with grouping and aggregation 18 ​ ​ 4.4.1 Workload definition and model details 18 4.4.2 Query 19 4.4.3 Evaluation results 20 4.4.4 Summary 20 5.
    [Show full text]
  • Run Critical Databases in the Cloud
    Cloud Essentials Run Critical Databases in the Cloud Oracle has the most complete data management portfolio for any enterprise workload. Cloud computing is transforming business practices and simplifying data center operations. However, when it comes to moving critical database assets to the cloud, many IT leaders are cautious—and rightly so. They have seen the limitations of popular commodity cloud solutions, which mostly consist of fragmented hardware and software offerings that must be manually configured. IT pros must build their own platforms on top of the service provider’s commodity infrastructure, migrate their data, and then figure out how to keep everything in sync with the apps and data still maintained on premise. Oracle Autonomous Database provides enterprise-level scalability, security, performance, and automation—at a level that often exceeds what you can achieve in your own data center. You can subscribe to complete database platforms with a few clicks, eliminating the need to provision, build, and manage in-house databases and storage systems. With pay-as-you-grow configurations—all managed by Oracle experts— your organization will obtain operational flexibility with zero up-front capital expenses. It’s a great way to lower operational costs because you pay only for what you use. Read on to discover what a powerful cloud database can do for your business. Migrating to a Cloud Computing Model Modern businesses depend on their data more than cloud services work together automatically— ever before. That data is coming at an alarming rate, and in many cases, autonomously. placing crushing demands on data marts, enterprise data warehouses, and analytics systems.
    [Show full text]
  • Cloud Database Battle: AWS Vs. DIY Vs. Oracle
    Cloud Database Battle: AWS vs. DIY vs. Oracle Cloud Database Battle: AWS vs. DIY vs. Oracle by, David Floyer January 18th, 2021 The first premise of this research is that architecting the Oracle Cloud Database service to run on specialized hardware and software, either on-premises or in Oracle Cloud Infrastructure (OCI), allows the cloud database vendor to reduce costs significantly. This approach also allows the vendor to provide autonomous services based on economies of scale that further reduce the operational support costs. The combination of the two methods leads to halving the cost of running today’s cloud database application suites. The second premise is that future synchronous automation of business processes will require real-time integration between systems-of-record, advanced analytic/AI inference systems, and other data and cloud database types. This integration can only be achieved by sharing data between database types. Also, the operation of synchronous applications is too complex for traditional operational processes. Therefore, high levels of cloud database and application automation, and machine learning are imperatives for synchronous application deployment. Oracle Cloud Database is Tier-1 and in a class of its own. Wikibon recommends that larger enterprises with mission-critical workloads should not convert from Oracle to other databases. Instead, Wikibon recommends migrating to Autonomous Cloud Database on Oracle Exadata Cloud@Customer X8M, Oracle Exadata Cloud Service on OCI, or other Oracle Database cloud services. Wikibon recommends that enterprises minimize the number of separate databases and data types and use the converged Oracle Cloud Database instead. © 2021 Wikibon Research | Page 1 Cloud Database Battle: AWS vs.
    [Show full text]
  • Planning and Designing Databases on Aws(Awss04)Englisch
    PLANNING AND DESIGNING DATABASES ON AWS (AWSS04) ENGLISCH In this course, you will learn about the process of planning and designing both relational and nonrelational AWS databases. It will teach you how to use workload requirements to define database design considerations and also explore the features and capabilities of the eight AWS database services. By the end of the course, you will be able to determine which AWS database service is right for your workloads, and design the database to meet your requirements. Target Group • Data Engineers who are new to designing cloud databases or nonrelational databases • Solutions Architects who are designing services or architectures that are integrated with databases • Developers that are building cloud database-enabled applications Prerequisites • Familiarity with AWS Database Services, equivalent to AWS Database Offerings digital training • Understanding of database design concepts, and/or data modeling for relational or nonrelational databases • Familiarity with cloud computing concepts • Familiarity with general networking and encryption concepts • Understanding of the three V’s of data (volume, velocity, and variety) • Familiarity with basic data analytics concepts, equivalent to Data Analytics Fundamentals digital training • Understanding of general architecting best practices and the AWS Well-Architected Framework, equivalent to Architecting on AWS classroom training Main Topics • Apply database concepts, database management, and data modeling techniques • Evaluate hosting databases on
    [Show full text]
  • Recent Trends for Efficient and Secure Accessing Scheme for Cloud Database
    © 2017 IJEDR | Volume 5, Issue 4 | ISSN: 2321-9939 Recent Trends for Efficient and Secure Accessing Scheme for Cloud Database Dr. Santosh S. Lomte1, Swati V. Khidse2 1Principal VDF’s School of Engineering & Technology, Latur, India, 2 PhD Student 1, 2 Department of Computer Science & Engineering, 2Dr. B. A. M. University, Aurangabad, Maharashtra, India. ________________________________________________________________________________________________________ Abstract - Cloud computing provides an enormous amount of virtual storage, it provides access to servers, storage, databases and a broad set of application services over the Internet. Its popularity is growing day by day. Consequently, there is a need for strong authentication schemes for securing access to cloud database. Data protection and security are the primary factors in cloud database for gaining user's trust and making successful use of cloud technology. There are number of data protections and data security techniques that have been proposed in the research field of cloud computing. However, there is need for enhancing data protection techniques. Index Terms—Encryption, Data Protection, Confidentiality, Obfuscation; ________________________________________________________________________________________________________ I. INTRODUCTION Cloud computing allows their users to store and access computing resources and data over INTERNET rather than from the local hard drive. It also helps to increase the storage capacity because users can use more than one cloud services for storing their data and thus reduce the cost because there is no need for owning an expensive computer with larger memory. According to the US National Institute of Standards and Technology (NIST), cloud computing is a model enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1].
    [Show full text]
  • Database High Availability As a Service for Cloud
    DBHAAAS – DATABASE HIGH AVAILABILITY AS A SERVICE FOR CLOUD COMPUTING A DISSERTATION IN Computer Science and Telecommunications and Computer Networking Presented to the Faculty of the University of Missouri-Kansas City in partial fulfillment of the requirements for the degree DOCTOR OF PHILOSOPHY by CHETAN JAISWAL B.E., Rajiv Gandhi Technical University, 2007 Kansas City, Missouri 2016 © 2016 CHETAN JAISWAL ALL RIGHTS RESERVED DBHAAAS – DATABASE HIGH AVAILABILITY AS A SERVICE FOR CLOUD COMPUTING Chetan Jaiswal, Candidate for the Doctor of Philosophy Degree University of Missouri-Kansas City, 2016 ABSTRACT On conventional database systems, the recovery manager applies transaction Undo or Redo operation or a combination of them to recover the last consistent state of the database from a system failure. Transaction redo, compared to undo, helps to shorten the system downtime so the execution of transactions is managed in such a way that majority of transactions require redo to recover the database. To further reduce the recovery time, the recovery module uses “Checkpoint” operation. Even though it is possible to eliminate transaction redo altogether, the conventional system architecture, however, is not capable to deploy innovative approaches. The availability of “Virtual” machines on cloud has given us an architecture that makes it possible to completely do away with transaction redo which allows us to eliminate the effect of system or transaction failure by taking the database to the next consistent state. In this dissertation, we present a novel scheme of eliminating the effect of such failures by applying transaction “roll-forward.” Our approach intelligently applies roll-forward from the iii point of failure which removes the effect of system failure on the database.
    [Show full text]