Multi-Tenant Provisioning System For Cloud Based Backup Services

Multi-tenant provisioning system for cloud based backup services

The Problem
Backup and storage vendors find many of their users backing up their systems to cloud using their proprietary backup software, but the issue was that each of those users had to register and provision systems on the cloud provider themselves. This was a huge risk with the backup vendor to rely on the user’s knowledge of the cloud systems and its usage in addition to the added risk of having a disbursed bill for the different services. The users get two to three different bills from the cloud provider as well as the backup provider at the end of each cycle. The solution was to have a multi tenant auto provisioning system where users come in and register one time and the backup provider maintains a multi tenant provisioning and recovery system for all their users.

Why Multi Tenancy?
Multi tenancy increases efficiency if it can be scaled. In a cloud environment it’s a reality and the scaling is taken care of by the cloud provider. In a cloud management system where the tenants are users of an automated provisioning system, the scaling is on the management of the cloud resources provisioned by the users. One can deploy SOA based architecture using Windows workflow foundation solution using a web console. This will enable the user to provision, de-provision and manage their resources online and be able to secure their resources using firewall settings on the provisioning console. The provisioning system sets a workflow in place for each of its activities and the final result of the workflow is communicated to the user through an email or a web update. The activities in the workflow are governed by the type of resources being provisioned like a system or an IP or an additional volume. The workflows trace back and de-provision the resources in case of a crash or issue at any level in the workflow. As the users scale web services, load balancing was used to balance the request load using DNS round robin. Strict security is maintained at all levels of the architecture with SSL requests to all ports and certificates used for inter port communication. Resource usage is billed to each user based on the runtime and volume usage.

What is difficult in the multi tenant mode?
The workflows are the difficult part in a multi tenant provisioning system. Getting the proper workflows designed and deployed is critical to these applications. The time taken for each activity in the workflow has to be estimated and proper wait or loop mechanism implemented for cases where provisioning a resource takes extra time. Workflows are stateless and once the request is sent from the web layer to the business layer where the workflow resides, the response to the web layer will be sent from any of the activities in the workflow. A send mail activity caters to sending the provisioned resource information back to the user.

The cost advantage
The management service provider gets the advantage of provisioning the cheapest resource from the available pool for any cloud provider but this can be scaled to other cloud providers in a seamless manner. The user in turn has the advantage of having a single portal to manage all their resources. Time taken to provision systems and security are lessened with the predictive and scheduled workflows. The cost advantage the provider receives will be passed on to their customers as they scale.

By Anup Pal, Vice President, Global Solutions and Support & VinodKumar Panicker, Manager, Product Development Services of Symphony Services

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…