DOI QR코드

DOI QR Code

재해복구시스템 통합 서버 이중화 테스트를 통한 서비스 전환 자동화 구현

Realization of Service Conversion Automation through Disaster Recovery System integrated Server Redundancy Test

  • 투고 : 2023.08.10
  • 심사 : 2023.09.21
  • 발행 : 2023.09.30

초록

최근, 정보화 사업이 확산됨에 따라 정보 시스템을 기반으로 다양한 공공 서비스가 수행되고 있다. 이러한 정보 시스템 기반의 공공 행정 서비스는 내부 업무 및 대외 서비스 등을 제공하고 있다. 최근에는 클라우드 기반의 공공 서비스 구축이 확장되면서 정보 시스템의 고도화가 관심을 받고 있다. 특히, 업무의 정보시스템 의존도가 증가하면서 정보 시스템의 중단 및 마비 등의 위험한 사태를 사전에 방지하기 위한 대응 체계 구축이 기업 뿐만 아니라 공공 기관에서도 화두가 되고 있다. 따라서, 본 논문에서는 재해복구시스템의 서비스 전환 자동화를 통해 복구시간 단축 및 시스템 운영의 효율성을 극대화하기 위한 재해복구시스템을 설계, 구축하였다. 논문에서 제안한 방식에 의해 설계, 구축된 재해복구시스템을 적용하여 통합 DR서버 이중화 테스트, 웹서버 이중화 테스트, FC-IP 이중화 테스트 및 SAN 스위치 이중화 테스트를 각각 수행하였다.

Recently, various public services are being performed based on information systems as the informatization business spreads. Public administration services based on these information systems provide internal and external services. In recent years, as the construction of cloud-based public services has been expanded, the advancement of information systems has attracted attention. In particular, as the dependence on information systems increases, the establishment of a response system to prevent dangerous situations such as interruption and paralysis of information systems in advance has become a hot topic not only in companies but also in public institutions. Therefore, in this paper, a disaster recovery system was designed and built to maximize the efficiency of system operation and shorten recovery time through service conversion automation of the disaster recovery system. The integrated DR server redundancy test, web server redundancy test, FC-IP redundancy test, and SAN switch redundancy test were performed respectively by applying the disaster recovery system designed and built according to the method proposed in the paper.

키워드

참고문헌

  1. J. H. Kim, D. K. Seo & K. H. Lee. (2014. On the A study for improving database recovery ratio of Disaster Recovery System in financial industry. Journal of the Korea Institute of Information Security and Cryptology, 24(4), 655-667. DOI : 10.3969/j.issn.1006-5342.2001.02.002
  2. H. J. Yoon, J. S. Kim, J. J. Park & T. W. Chang. (2015). Development of Electronic Documents and Management System for Transfer of Disaster Damage and Recovery Information. The Journal of Society for e-Business Studies, 20(2), 15-26. DOI : 10.7838/JSEBS.2015.20.2.015
  3. D. G. Yang & K. Y. Kim. (2016). Disaster Recovery Priority Decision for Credit Bureau Business Information System: Fuzzy-TOPSIS Approach. Management and Information Systems Review, 35(3), 173-193. DOI : 10.29214/DAMIS.2016.35.3.010
  4. J. H. Park, G. Y. Kim, J. S. Kim & J. C. Ryou. (2021). RUser-Centric Disaster Recovery System Based on Proxy Re-Encryption Using Blockchain and Distributed Storage. Journal of the Korea Institute of Information Security and Cryptology, 31(6), 1157-1169. DOI : 10.13089/JKIISC.2021.31.6.1157
  5. G. Y. Dong, sheng Wang & Chuanyi Liu. (2014). DR-cloud: Multi-cloud based disaster recovery service. Tsinghua Science and Technology, 19(1), 13-23. DOI : 10.1109/TST.2014.6733204
  6. Obour Agyekum, K. O. B., Xia, Q., Sifah, E. B., Gao, J., Xia, H., Du, X., & Guizani, M. (2019). A secured proxy-based data sharing module in IoT environments using blockchain. Sensors, 19(5), 1235. DOI : 10.3390/s19051235
  7. C. U. Lee & S. J. Lee. (2022). Experiment on countermeasures against cyber security vulnerabilities using redundancy of ISO 19847 Shipboard Data Server. Journal of Korea Multimedia Society, 25(6), 793-806. DOI : 10.9717/KMMS.2022.25.6.793
  8. Y. S. Han (2013). A Study on the Curriculum Design Engine Using a SES/DEVS. Journal of Engineering Education Research, 16(5), 18-23. DOI : 10.18108/JEER.2013.16.5.18
  9. M. J. Blas, H. Leone & S. Gonnet. (2022). DEVS-Based Formalism for the Modeling of Routing Processes. Software and Systems Modeling, 21, 1179-1208. DOI : 10.1007/s10270-021-00928-4
  10. Y. Han. (2020). Effectiveness Analysis of Programming Education for College of Education Student Based on Information Processing Theory Applied DEVS Methodology. Journal of Korea Multimedia Society, 23(9), 1191-1200. DOI : 10.9717/KMMS.2020.23.9.1191
  11. Y. J. Kim, J. Y. Yang, Y. M. Kim, J. Lee & C. Choi. (2016). Modeling Behavior of Mobile Application Using Discrete Event System Formalism. In: Proceeding of the 2016 Asian Simulation Conference, 40-48. DOI : 10.1007/978-981-10-2158-9_4
  12. M. J. Blas, S. Gonnet & H. Leone.(2017). Modeling user temporal behaviors using hybrid simulation models. IEEE Lat. Am. Trans. 15, 341-348. DOI : 10.1109/TLA.2017.7854631
  13. Y. G. Min & E. G. Kim (2023). Study on IaaS-based Cloud Architecture Infrastructure Configuration. The Journal of Innovation Industry Technology, 1(1), 1-8. DOI : 10.60032/JIIT.2023.1.1.1
  14. K. E. Bae & C. K. Suh. (2022). The Effect of Smart Work and Cloud Computing Fit on Intention to use Cloud Computing Based on TAM-TTF Model. The Journal of Information Systems, 31(2), 63-88. DOI : 10.5859/KAIS.2022.31.2.63
  15. S. M. Jeong, K. H. Yeom & J. S. Park. (2023). Learning Features Model to Support AI based Cloud Instance Migration. The Journal of Korean Institute of Next Generation Computing, 19(1), 20-29. DOI : 10.23019/KINGPC.19.1.202302.002