Data Migration Need, Strategy, Challenges, Methodology, Categories, Risks, Uses with Cloud Computing, and Improvements in Its Using with Cloud Using Suggested Proposed Model (DMig 1)
Data Migration is a multi-step process that begins with analyzing old
data and culminates in data uploading and reconciliation in new applications.
With the rapid growth of data, organizations constantly need to migrate data.
Data migration can be a complex process as testing must be done to ensure data
quality. Migration also can be very costly if best practices are not followed
and hidden costs are not identified in the early stage. On the
other hand, many organizations today instead of buying IT equipment (hardware and/or
software) and managing it themselves, they prefer to buy services from IT
service providers. The number of service providers is increasing dramatically
and the cloud is becoming the preferred tool for more cloud storage services.
However, as more information and personal data are transferred to the cloud, to
social media sites, DropBox, Baidu WangPan, etc., data security and privacy
issues are questioned. So, academia and industry circles strive to find an
effective way to secure data migration in the cloud. Various resolving methods
and encryption techniques have been implemented. In this work, we will try to
cover many important points in data migration as Strategy, Challenges, Need,
methodology, Categories, Risks, and Uses with Cloud computing. Finally, we
discuss data migration security and privacy challenge and how to solve this
problem by making improvements in it’s using with Cloud through suggested
proposed model that enhances data security and privacy by gathering Advanced
Encryption Standard-256 (ATS256), Data Dispersion Algorithms and Secure Hash
Algorithm-512. This model achieves verifiable security ratings and fast
execution times.
References
[1]
Sarmah, S.S. (2018) Data Migration. Science and Technology, 8, 1-10.
[2]
Best Practices for Data Migration (2007) Methodologies for Planning, Designing, Migrating and Validating Data Migration. IBM Global Technology Services.
[3]
Thalheim, B. and Wang, Q. (2013) Data Migration: A Theoretical Perspective. The Journal of Data Knowledge Engineering, 87, 260-278. https://doi.org/10.1016/j.datak.2012.12.003
[4]
Howard, P. and Potter, C. (2007) Data Migration in Global 2000, Research, Forecasts and Survey Results. A Survey Paper by Bloor Research. http://www.bloorresearch.com/research/survey/876/data_migrtaion_survey.html
[5]
Hull, R. (1984) Relative Information Capacity of Simple Relational Database Schemata. In: Proceedings of Principles of Database Systems, ACM, New York, 97-109. https://doi.org/10.1145/588011.588027
[6]
(2004) Rapid Application Development (RAD) for Data Migration = White Paper Solutions by Premier International. http://www.premier-international.com/pdf/Applaud_White_Paper.pdf
[7]
Alibaba Cloud. Data Migration Methodology. aliyun.com, Alibaba Migration Platform and Related Solutions.
[8]
Nordic Backup (2017) 7 Steps to Include in Your Data Migration Plan. https://medium.com/@NordicBackup/7-steps-to-include-in-your-data-migration-plan-42d571dc01ab
[9]
Chellamuthu, P. (2014) Data Migration Challenges and Solution for Successful Implementation.
[10]
Sighom, J.R.N., Zhang, P. and You, L. (2017) Security Enhancement for Data Migration in the Cloud. Future Internet, 9, 23. https://doi.org/10.3390/fi9030023
[11]
NIST (2017) Cloud Computing Program-29 July 2016: Cloud Computing. https://www.nist.Gov/programs-projects/cloud-computing
[12]
Wolfgang, G. (2017) Cost Reduction Remains Chief Reason to Adopt Cloud, Confusion Still Apparent. http://www.tomsitpro.com/articles/cloud_survey-kpmg-tech_adoption-provider-itsecurity,1-803.html
[13]
Jaeger, B. (2016) Security as a Service Working Group, Defined Categories of Security as a Service (Preview)-Continuous Monitoring as a Service. Cloud Security Alliance 2016. https://downloads.cloudsecurityalliance.org/assets/research/security-as-a-service/csa-categories-securities-prep.pdf
[14]
Wall, M. (2016) Can We Trust Cloud Providers to Keep Our Data Safe? http://www.bbc.com/news/business-36151754
[15]
(2016) White Paper. Securing Sensitive Data within Amazon Web Services Ec2 and Ebs: Challenges and the Solutions to Protecting Data within the AWS Cloud. Copyright 2013 Vormetric. http://go.thalesesecurity.com/rs/480-LWA-970/images/wp-securing-data-within-AWS.pdf
[16]
Rancourt, C. (2017) Celebrities Hacked: “Are Your Personal Photos Safe in the Cloud?” http://www.nextadvisor.com/blog/2014/09/02/celebrities-hacked-personal-photos-cloud-safe
[17]
Ahmadi, M., Moghaddam, F.F., Jam, A.J., Gholizadeh, S. and Eslami, M. (2014) A 3-Level Re-Encryption Model to Ensure Data Protection in Cloud Computing Environments. Proceedings of the IEEE Conference on System, Process & Control, Kuala Lumpur, 12-14 December 2014. https://doi.org/10.1109/SPC.2014.7086226
[18]
Surv, N., Wanve, B., Kamble, R., Patil, S. and Katti, J. (2015) Framework for Client Side AES Encryption Technique in Cloud Computing. Proceedings of the IEEE International Advance Computing Conference, Bangalore, 12-13 June 2015, 525-528. https://doi.org/10.1109/IADCC.2015.7154763
[19]
Singh, S. and Kumar, V. (2015) Secured User’s Authentication and Private Data Storage-Access Scheme in Cloud Computing Using Elliptic Curve Cryptography. Proceedings of the 2015 2nd International Conference on Computing for Sustainable Global Development, New Delhi, 11-13 March 2015.
[20]
Raj, G., Kesireddi, R.C. and Gupta, S. (2015) Enhancement of Security Mechanism for Confidential Data Using AES-128, 192 and 256 Bit Encryption in Cloud. Proceedings of the 2015 1st International Conference on Next Generation Computing Technologies, Dehradun, 4-5 September 2015. https://doi.org/10.1109/NGCT.2015.7375144
[21]
Arockiam, L. and Monikandan, S. (2014) Efficient Cloud Storage Confidentiality to Ensure Data Security. Proceedings of the International Conference on Computer Communication and Informatics, Coimbatore, 3-5 January 2014, 1-5. https://doi.org/10.1109/ICCCI.2014.6921762
[22]
Suthar, K. and Patel, J. (2015) EncryScation. A Novel Framework for Cloud IAAS, DAAS Security Using Encryption and Obfuscation Techniques. Proceedings of the 2015 5th Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, 26-28 November 2015. https://doi.org/10.1109/NUICONE.2015.7449636
[23]
Mar, K.K., Law, C.Y. and Chin, V. (2015) Secure Personal Cloud Storage. Proceedings of the 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015), London, 14-16 December 2015. https://doi.org/10.1109/ICITST.2015.7412068
[24]
Zhang, X. and Wang, H. (2013) A Study of the Use of IDAs in Cloud Storage. International Journal of Future Computer and Communication, 212, 67-70. https://doi.org/10.7763/IJFCC.2013.V2.123
[25]
Rich, S. and Gellman, B. (2016) NSA Seeks to Build Quantum Computer That Could Crack Most Types of Encryption. https://www.washingtonpost.com/world/national-security/nsa-seeks-to-build-quantum-computer-that-could-crack-most-types-of-encryption/2014/01/02/8fff297e-7195-11e3-8def-a33011492df2_story.html?utm_term=.217ad6b56479
[26]
Balamurugan, S., Sathyanarayana, S. and Manikandasaran, S.S. (2016) ESSAO: Enhanced Security Service Algorithm Using Data Obfuscation Technique to Protect Data in Public Cloud Storage. Indian Journal of Science and Technology, 9, 1-6. https://doi.org/10.17485/ijst/2016/v9i17/90229
[27]
Rubenking, N.J. (2017) The Best Encryption Software of 2017. http://www.pcmag.com/article/347066/the-best-encryption-software-of-2016
[28]
Mishra, B. and Jena, D. (2016) Securing Files in the Cloud. Proceedings of the 2016 IEEE International Conference on Cloud Computing in Emerging Markets, Bangalore, 19-21 October 2016. https://doi.org/10.1109/CCEM.2016.016
[29]
Stallings, W. (2005) Cryptography and Network Security Principles and Practices. 6th Edition, Prentice Hall, Upper Saddle River.