Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Archiving-As-A-Service:A Comprehensive Reference Architecture Using Cloud Computing to Monitor and Supervise the Archive Documents from Long Term Point of View


Affiliations
1 Dept. of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, Karnataka, India
     

   Subscribe/Renew Journal


This article analyzes the needs and proposes a cloud based comprehensive reference architecture based on the concept of “Archiving-as-a-Service”. The reference architecture is designed in the context of new technology and organization for storing the documents and ensuring their security, reliability, availability, and authenticity over long periods of time. The article aims to bring changes in the practices of archiving documents by proposing comprehensive reference architecture with possibilities of wider approach to current outsourcing problems. This perspective, addresses the impact of cloud computing on today’s archiving business, archiving service gaps, and the need of changes in the archive practice. The prototype implementation of selected modules, consider monitoring and supervising the archive documents. Finally, the authors justify the comprehensive reference architecture with the performance evaluations for some crucial services such as archiving, re-encryption, confirmation of integrity and proof of existence.

Keywords

Archive Document, Archiving as a Service, Archive Reference Architecture, Long Term Preservation.
Subscription Login to verify subscription
User
Notifications
Font Size


  • H. Stancic, A. Rajh, and I. Milosevic, ““Archiving-as-a-Service”: Influence of cloud computing on the archival theory and practice,” White Paper [Online], 2016. Available: http://www.unesco.org/new/fileadmin/MULTIMEDIA/HQ/CI/CI/pdf/mow/VC_Stancic_et_al_26_B_1430.pdf
  • Osterman Research, Inc., “Strategies for archiving in hybrid environments,” An Osterman Research Whitepaper, published October 2017. Available: https://www.viewpointe.com/uploadedfiles/viewpointe/pdfs/strategies%20for%20archiving%20in%20hybrid%20environments%20-%20viewpointe.pdf
  • R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, “Role-based access control models,” Computer, vol. 29, no. 2, pp. 38-47, February 1996. DOI: 10.1109/2.485845
  • B. Lavoie, “Meeting the challenges of digital preservation: The OAIS reference model,” The OAIS Reference Model, DPC Technology Watch Report, October 2014. Available: www.oclc.org/research/publications/library/2000/lavoie-oais.html
  • BSI Technical Guideline 03125, “Preservation of evidence of cryptographically signed documents, federal office for information security,” October 2015. Available: https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TG03125/BSI_TR_03125_TR-ESOR_V1_2_EN_Main.pdf?__blob=publicationFile&v=1
  • D. Huhnlein, U. Korte, L. Langer, and A. Wiesmaier, “A comprehensive reference architecture for trustworthy long-term archiving of sensitive data,” 2009 3rd International Conference on New Technologies, Mobility and Security, Cairo, pp. 1-5, 2009. DOI: 10.1109/NTMS.2009.5384830
  • A. H. Shanthakumara, and N. R. Sunitha, “A novel archival system with dynamically balanced security, reliability and availability,” 2016 International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS), Bangalore, pp. 27-33, 2016. DOI: 10.1109/CSITSS.2016.7779435
  • A. H. Shanthakumara, and N. R. Sunitha, 2018, “Techniques to certify integrity and proof of existence for a periodical re-encryption-based long-term archival systems,” in N. Rao, R. Brooks, and C. Wu. (eds), Proceedings of International Symposium on Sensor Networks, Systems and Security (ISSNSS), Springer, Cham, 2017. Available: https://doi.org/10.1007/978-3-319-75683-7_16
  • A. H. Shanthakumara, and N. R. Sunitha, “A comprehensive reference architecture for re-encryption based archival systems with insurability services,” 2017 2nd International Conference on Emerging Computation and Information Technologies (ICECIT), pp. 1-5, 2017.
  • W. Paynter, “Developing practical automatic metadata assignment and evaluation tools for internet resources,” Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL’05), Denver, CO, pp. 291-300, 2005. DOI: 10.1145/1065385.1065454
  • M. Waldman, A. D. Rubin, and L. F. Cranor, “Publius: A robust, tamper evident, censorship-resistant, web publishing system,” in Proceedings of the 9th USENIX Security Symposium, pp. 59-72, August 2000.
  • A. Haeberlen, A. Mislove, and P. Druschel, “Glacier: Highly durable, decentralized storage despite massive correlated failures,” in Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), USENIX, Boston, MA, May 2005.
  • P. Maniatis, M. Roussopoulos, T. J. Giuli, D. S. H. Rosenthal, and M. Baker, “The LOCKSS peer-to-peer digital preservation system,” ACM Transactions on Computer Systems, vol. 23, no. 1, pp. 2-50, 2005.
  • S. Quinlan, and S. Dorward, “Venti: A new approach to archival storage,” in Proceedings of the 2002 Conference on File and Storage Technologies (FAST), UNISEX, pp. 89-101, Monterey, California, USA, 2002.
  • L. L. You, K. T. Pollack, and D. D. E. Long, “Presidio: A framework for efficient archival data storage,” ACM Transactions on Storage, article 6, July 2011. Available: http://dx.doi.org/10.1145/1970348.1970351
  • T. M. Wong, C. Wang, and J. M. Wing, “Verifiable secret redistribution for archive systems,” in 2002 Proceedings of the First International IEEE Security in Storage Workshop, pp. 94-105, 2002. DOI: 10.1109/SISW.2002.1183515
  • G. R. Ganger, P. K. Khosla, M. Bakkaloglu, M. W. Bigrigg, .........., and J. J. Wylie, “Survivable storage systems,” 2001 Proceedings of the DARPA Information Survivability Conference & Exposition II (DISCEX’01), vol. 2, pp. 184-195, Anaheim, CA, 2001. DOI: 10.1109/DISCEX.2001.932171
  • M. Bellare, and S. K. Miner, “A forward-secure digital signature scheme,” Advances in Cryptology-Crypto 99, Springer-Verleg, 1999.
  • Microsoft Azure (n.d.), Azure Archive Storage. Retrieved from https://azure.microsoft.com/en-in/services/storage/archive/
  • AWS (n.d.), Data Archive. Retrieved from https://aws.amazon.com/archive/
  • Google cloud platform (n.d.), Archival Cloud Storage: Nearline & Coldline. Retrieved from https://cloud.google.com/storage/archival/
  • ZDNet (n.d.), Archiving as a service: A cold-storage solution. Retrieved from https://www.zdnet.com/article/archiving-as-a-service-a-cold-storage-solution/
  • Enron Data, RData file (enron-mysqldump). Available: http://www.ahschulz.de/enron-email-data/

Abstract Views: 298

PDF Views: 0




  • Archiving-As-A-Service:A Comprehensive Reference Architecture Using Cloud Computing to Monitor and Supervise the Archive Documents from Long Term Point of View

Abstract Views: 298  |  PDF Views: 0

Authors

A. H. Shanthakumara
Dept. of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, Karnataka, India
N. R. Sunitha
Dept. of Computer Science and Engineering, Siddaganga Institute of Technology, Tumakuru, Karnataka, India

Abstract


This article analyzes the needs and proposes a cloud based comprehensive reference architecture based on the concept of “Archiving-as-a-Service”. The reference architecture is designed in the context of new technology and organization for storing the documents and ensuring their security, reliability, availability, and authenticity over long periods of time. The article aims to bring changes in the practices of archiving documents by proposing comprehensive reference architecture with possibilities of wider approach to current outsourcing problems. This perspective, addresses the impact of cloud computing on today’s archiving business, archiving service gaps, and the need of changes in the archive practice. The prototype implementation of selected modules, consider monitoring and supervising the archive documents. Finally, the authors justify the comprehensive reference architecture with the performance evaluations for some crucial services such as archiving, re-encryption, confirmation of integrity and proof of existence.

Keywords


Archive Document, Archiving as a Service, Archive Reference Architecture, Long Term Preservation.

References