{"id":"https://openalex.org/W4379932902","doi":"https://doi.org/10.1145/3590837.3590927","title":"Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment","display_name":"Protecting customer databases to shield business data against ransomware attacks and effective disaster recovery in a hybrid production environment","publication_year":2022,"publication_date":"2022-12-23","ids":{"openalex":"https://openalex.org/W4379932902","doi":"https://doi.org/10.1145/3590837.3590927"},"language":"en","primary_location":{"id":"doi:10.1145/3590837.3590927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049856218","display_name":"Manoj Singhal","orcid":"https://orcid.org/0009-0003-6509-6234"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Manoj Kumar Singhal","raw_affiliation_strings":["Technology R&amp;D, Software Engineering, USA and \rComputer Science, Technology, India"],"raw_orcid":"https://orcid.org/0009-0003-6509-6234","affiliations":[{"raw_affiliation_string":"Technology R&amp;D, Software Engineering, USA and \rComputer Science, Technology, India","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5049856218"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.9571,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82715384,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backup","display_name":"Backup","score":0.964023232460022},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.733531653881073},{"id":"https://openalex.org/keywords/disaster-recovery","display_name":"Disaster recovery","score":0.7030511498451233},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.654572606086731},{"id":"https://openalex.org/keywords/backup-software","display_name":"Backup software","score":0.6368461847305298},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5839491486549377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5454677939414978},{"id":"https://openalex.org/keywords/business-continuity","display_name":"Business continuity","score":0.5405373573303223},{"id":"https://openalex.org/keywords/data-loss","display_name":"Data loss","score":0.5292023420333862},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.46922099590301514},{"id":"https://openalex.org/keywords/data-recovery","display_name":"Data recovery","score":0.4389794170856476},{"id":"https://openalex.org/keywords/data-deduplication","display_name":"Data deduplication","score":0.42250627279281616},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.41674286127090454},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.30671218037605286}],"concepts":[{"id":"https://openalex.org/C2780945871","wikidata":"https://www.wikidata.org/wiki/Q194274","display_name":"Backup","level":2,"score":0.964023232460022},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.733531653881073},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.7030511498451233},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.654572606086731},{"id":"https://openalex.org/C503016453","wikidata":"https://www.wikidata.org/wiki/Q4839801","display_name":"Backup software","level":3,"score":0.6368461847305298},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5839491486549377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5454677939414978},{"id":"https://openalex.org/C2778143579","wikidata":"https://www.wikidata.org/wiki/Q831801","display_name":"Business continuity","level":2,"score":0.5405373573303223},{"id":"https://openalex.org/C193519340","wikidata":"https://www.wikidata.org/wiki/Q891179","display_name":"Data loss","level":2,"score":0.5292023420333862},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.46922099590301514},{"id":"https://openalex.org/C529754248","wikidata":"https://www.wikidata.org/wiki/Q1054772","display_name":"Data recovery","level":2,"score":0.4389794170856476},{"id":"https://openalex.org/C32587265","wikidata":"https://www.wikidata.org/wiki/Q1182260","display_name":"Data deduplication","level":2,"score":0.42250627279281616},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.41674286127090454},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.30671218037605286}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3590837.3590927","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3590837.3590927","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Information Management &amp; Machine Intelligence","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","score":0.7799999713897705,"id":"https://metadata.un.org/sdg/13"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W425165360","https://openalex.org/W2028028866","https://openalex.org/W2215643646","https://openalex.org/W2285337995","https://openalex.org/W2883798867","https://openalex.org/W2963244523","https://openalex.org/W3158359785","https://openalex.org/W3203229294","https://openalex.org/W3209819679","https://openalex.org/W4205839607","https://openalex.org/W4231801390"],"related_works":["https://openalex.org/W4285245558","https://openalex.org/W2348132657","https://openalex.org/W2022966373","https://openalex.org/W2131579864","https://openalex.org/W2371581231","https://openalex.org/W2351388597","https://openalex.org/W2384608223","https://openalex.org/W2376610890","https://openalex.org/W2375056709","https://openalex.org/W2500597404"],"abstract_inverted_index":{"Backup":[0],"and":[1,11,18,26,109,116,120,131,136,165,201,217,219,228],"recovery":[2,39,218,230],"are":[3,142],"the":[4,42,58,67,98,163,211,233],"processes":[5],"of":[6,9,29,107,205,235],"making":[7],"copies":[8,89,101],"data":[10,44,59,130,180],"storing":[12],"it":[13,71,133],"securely":[14],"for":[15,134,215,225],"V.":[16],"Chang":[17],"G.":[19],"Wills,":[20],"\u201cA":[21],"model":[22],"to":[23,50,62,82,97,127,144,209],"compare":[24],"cloud":[25],"non-cloud":[27],"storage":[28,53,99],"big":[30],"data,":[31],"Future":[32,34],"Gener,\u201d":[33],"Gener.":[35],"Compute.":[36],"Syst.":[37],"Int":[38],"in":[40,77,149,171,178,232],"case":[41],"original":[43],"gets":[45],"damaged":[46],"or":[47,52,158],"lost":[48],"due":[49],"computer":[51],"system":[54,237],"failures.":[55,238],"During":[56],"recovery,":[57],"is":[60,208],"restored":[61],"its":[63,198],"operating":[64],"location":[65],"from":[66],"backup":[68,88,140,216,227],"copy,":[69],"so":[70],"can":[72,154],"once":[73,95],"again":[74],"be":[75,91,103],"used":[76],"business":[78,125],"operations.":[79],"In":[80],"order":[81],"safeguard":[83,128],"against":[84],"ransomware":[85],"risk,":[86],"these":[87,100],"should":[90],"immutable,":[92],"which":[93],"means":[94],"written":[96],"cannot":[102],"modified.":[104],"The":[105,203],"category":[106],"onsite":[108],"cloud-based":[110],"technology":[111],"solutions":[112,141,213,231],"known":[113],"as":[114],"\u2018backup":[115],"recovery\u2019":[117],"also":[118],"automates":[119],"supports":[121],"this":[122,206],"process,":[123],"enabling":[124],"firms":[126],"their":[129],"keep":[132],"operational":[135],"regulatory":[137],"requirements.":[138,166],"Multiple":[139],"available":[143,214],"protect":[145],"a":[146,150,156,172,176,179,184,188,223],"database":[147,189],"running":[148,170,190],"production":[151],"environment.":[152],"Customers":[153],"choose":[155],"specific":[157],"hybrid":[159],"solution":[160,186],"based":[161],"on":[162,175,191],"deployment":[164],"For":[167],"example,":[168],"databases":[169],"virtual":[173],"environment":[174],"hypervisor":[177],"center":[181],"may":[182],"have":[183],"different":[185,212],"than":[187],"bare":[192],"metal":[193],"servers.":[194],"Each":[195],"method":[196],"has":[197],"own":[199],"benefits":[200],"limitations.":[202],"goal":[204],"paper":[207],"discuss":[210],"come":[220],"up":[221],"with":[222],"proposal":[224],"effective":[226],"disaster":[229],"event":[234],"any":[236]},"counts_by_year":[{"year":2023,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
