Stochastic Modeling of Database Backup Policy for a Computer System

DOI: 10.4236/jsea.2013.62009   PDF   HTML     4,028 Downloads   6,597 Views   Citations


As the computer system has developed much in this highly information-oriented society, database security has become a very important problem and its backup strategies need to be made more efficiently and safety. The image copy method has been used as the most simple and dependable recovery mechanism for media failure. However, this method spends high overhead costs for massive data transmission and much processing time in the normal operation of the database. To cover such weak points, incremental and full backup methods are adopted before updated trucks reach a predetermined level. Moreover, when the number of full backup files exceeded a predetermined level, we stop incremental and full backups and switch it to the image copy. This paper applies cumulative damage model to backup of files in a database system, by putting damage shock by update, failure shock by database failure and damage by dumped files, and considers the tradeoff among overhead costs of image copy and incremental, full backup methods, and discusses analytically an optimal policy for the image copy backup interval. Finally, numerical examples are given in the case of Poisson process and exponential distributions.

Share and Cite:

S. Nakamura, X. Zhao and T. Nakagawa, "Stochastic Modeling of Database Backup Policy for a Computer System," Journal of Software Engineering and Applications, Vol. 6 No. 2, 2013, pp. 53-58. doi: 10.4236/jsea.2013.62009.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] T. Ward, “Security of Backup Data,” Information Systems Security, Vol. 15, No. 1, 2006, pp. 31-34. doi:10.1201/1086.1065898X/45926.15.1.20060301/92683.6
[2] T. Haerder and J. Muckstadt, “Optimal Policy for Batch Operations: Backup, Checkpointing, Reorganization, and Updating,” ACM Transactionson Database Systems, Vol. 2, No. 3, 1977, pp. 209-222. doi:10.1145/320557.320558
[3] I. Lazaridis, et al., “Fault Tolerant Evaluation of Continuous Selection Queries over Sensor Data,” International Journal of Distributed Sensor Networks, Vol. 5, No. 4, 2009, pp. 338-360. doi:10.1080/15501320701585600
[4] H. Jarraya and M. Laurent, “A Secure Peer-to-Peer Backup Service Keeping Great Autonomy While under the Supervision of a Provider,” Computers & Security, Vol. 29, No. 2, 2010, pp. 180-195. doi:10.1016/j.cose.2009.10.003
[5] M. Gramaglia, M. Urue?a and I. Martinez-Yelmo, “Off-Line Incentive Mechanism for Long-term P2P Backup Storage,” Computer Communications, Vol. 35, No. 12, 2012, pp. 1516-1526. doi:10.1016/j.comcom.2012.04.017
[6] M. Fesci-Sayita, E. TurhanTunalib and A. Murat Tekalpc, “Resilient Peer-to-Peer Streaming of Scalable Video over Hierarchical Multicast Trees with Backup Parent Pools,” Signal Processing: Image Communication,Vol. 27, No. 2, 2012, pp. 113-125. doi:10.1016/j.image.2011.11.004
[7] G. Bella, C. Pistagna and S. Riccobene, “Distributed Backup through Information Dispersal,” Electronic Notes in Theoretical Computer Science, Vol. 142, No. 3, 2006, pp. 63-77. doi:10.1016/j.entcs.2004.11.046
[8] J. Ma, et al., “A Novel Adaptive Current Protection Scheme for Distribution Systems with Distributed Generation,” International Journal of Electrical Power & Energy Systems, Vol. 43, No. 1, 2012, pp. 1460-1466.
[10] K. Suzuki and K. Nakajima, “Storage Management Software,” FUJITSU, Vol.48, No. 4, 1997, pp. 389-397.
[11] G. Lohman and A. Reuter, “Principles of Transaction Oriented Database Recovery,” ACM Computing Surveys, Vol. 15, No. 4, 1983, pp. 287-317. doi:10.1145/289.291
[12] C. Qian, S. Nakamura and T. Nakagawa, “Cumulative Damage Model with Two Kinds of Shocks and Its Application to the Backup Policy,” Journal of the Operations Research Society of Japan, Vol. 42, No. 4, 1999, pp. 501-511. doi:10.1016/S0453-4514(00)87116-1
[13] S. Nakamura, C. Qian, S. Fukumoto and T. Nakagawa, “Optimal Backup Policy for a Database System with Incremental and Full Backups,” Mathematical and Computer Modelling, Vol. 38, No. 11-13, 2003, pp. 1373-1379. doi:10.1016/S0895-7177(03)90140-3
[14] C. Qian, Y. Huang, X. Zhao and T. Nakagawa, “Optimal Backup Interval for a Database System with Full and Periodic Increment Backup,” Journal of Computers, Vol. 5, No. 4, 2010, pp. 557-564. doi:10.4304/jcp.5.4.557-564
[15] T. Nakagawa, “Shock and Damage Models in Reliability Theory,” Springer, London, 2007.
[16] S. Nakamura and T. Nakagawa, “Stochastic Reliability Modeling, Optimization and Applications,” World Scientific, Singapore, 2010.
[17] X. Zhao, S. Nakamura and T. Nakagawa, “Two Generational Garbage Collection Models with Major Collection Time,” IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, Vol. E94-A, No. 7, 2011, pp.1558-1566.
[18] X. Zhao, S. Nakamura and T. Nakagawa, “Optimal Tenuring and Major Collection Times for a Generation Garbage Collector,” Asia-Pacific Journal of Operational Research, Vol. 29, No. 3, 2012, p. 1240018 (17 pages).

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.