Multi-Tenant Provisioning System For Cloud Based Backup Services

Multi-tenant provisioning system for cloud based backup services

The Problem
Backup and storage vendors find many of their users backing up their systems to cloud using their proprietary backup software, but the issue was that each of those users had to register and provision systems on the cloud provider themselves. This was a huge risk with the backup vendor to rely on the user’s knowledge of the cloud systems and its usage in addition to the added risk of having a disbursed bill for the different services. The users get two to three different bills from the cloud provider as well as the backup provider at the end of each cycle. The solution was to have a multi tenant auto provisioning system where users come in and register one time and the backup provider maintains a multi tenant provisioning and recovery system for all their users.

Why Multi Tenancy?
Multi tenancy increases efficiency if it can be scaled. In a cloud environment it’s a reality and the scaling is taken care of by the cloud provider. In a cloud management system where the tenants are users of an automated provisioning system, the scaling is on the management of the cloud resources provisioned by the users. One can deploy SOA based architecture using Windows workflow foundation solution using a web console. This will enable the user to provision, de-provision and manage their resources online and be able to secure their resources using firewall settings on the provisioning console. The provisioning system sets a workflow in place for each of its activities and the final result of the workflow is communicated to the user through an email or a web update. The activities in the workflow are governed by the type of resources being provisioned like a system or an IP or an additional volume. The workflows trace back and de-provision the resources in case of a crash or issue at any level in the workflow. As the users scale web services, load balancing was used to balance the request load using DNS round robin. Strict security is maintained at all levels of the architecture with SSL requests to all ports and certificates used for inter port communication. Resource usage is billed to each user based on the runtime and volume usage.

What is difficult in the multi tenant mode?
The workflows are the difficult part in a multi tenant provisioning system. Getting the proper workflows designed and deployed is critical to these applications. The time taken for each activity in the workflow has to be estimated and proper wait or loop mechanism implemented for cases where provisioning a resource takes extra time. Workflows are stateless and once the request is sent from the web layer to the business layer where the workflow resides, the response to the web layer will be sent from any of the activities in the workflow. A send mail activity caters to sending the provisioned resource information back to the user.

The cost advantage
The management service provider gets the advantage of provisioning the cheapest resource from the available pool for any cloud provider but this can be scaled to other cloud providers in a seamless manner. The user in turn has the advantage of having a single portal to manage all their resources. Time taken to provision systems and security are lessened with the predictive and scheduled workflows. The cost advantage the provider receives will be passed on to their customers as they scale.

By Anup Pal, Vice President, Global Solutions and Support & VinodKumar Panicker, Manager, Product Development Services of Symphony Services

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…