The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

Is your data exponentially growing? Are you using orthodox storage systems like Storage Area Network (SAN) and Network Attached Storage (NAS)? Cloud computing with its numerous benefits and innovative capabilities now offers a novel way of working with data through ‘Object based storage model’. Due to the ever increasing pressure exerted by the industry on the interface to storage, the storage technology has progressed to the point that a change in the device interface is needed. Well, the answer perhaps lies with object based storage, an emerging standard aimed to address this problem. Let’s further elaborate about object based storage.

Objects can be categorized as either:history

  1. Files
  2. Blocks

While files provide user applications with a higher-level storage abstraction that enables secure data sharing across different operating system platforms, blocks offer fast, scalable access to shared data. Having said that, the third related aspect is the all-important metadata which is basically data providing information about one or more aspects of the data, such as means of creation, purpose, time and date of creation, location, and author of the data. In a nutshell, object-based storage separates metadata from object data, storing it all on one level, rather than as a hierarchy as with traditional file-based storage.

With this understanding, you might think that object based storage is beneficial for large companies only, but that is not the case. At the outset, Cleversafe has been labeled as the pioneer in object storage by leading analyst firms. The breaking news is the fact that this innovative technology is now being made available to small to mid-size companies trying to cope with growing data needs. The Bunker, with its managed service, in partnership with Cleversafe, is providing small and mid-sized businesses to take advantage of object storage, its scalability and inherent security, which encrypts data both in transit and at rest. The best part is that you only pay for what you use!

Phil-Bindley-CTOPhilip Bindley, CTO at The Bunker comments: “IT leaders are faced with increasing challenges for data storage; the amount of data is growing exponentially and storage is consuming an ever-greater share of available IT budget. The cost and flexibility of public cloud storage have offered some respite, but at the expense of security and compliance for many businesses. We believe our Object Storage managed service solves all of these challenges for businesses, particularly in providing secure robust cloud storage that addresses data sovereignty and compliance requirements.”

The notable effect of object based storage is separating or offloading the entire space utilized by blocks from storage applications. For instance, in a traditional file system architecture, block-based file systems can roughly be divided into two sections: a user component (files and directories) and a storage component (mapping data structure to physical storage), making it simpler to offload management to the storage device, which is the intended effect of object based storage.

An added benefit is the enhanced De-duplication capability – a process of comparing electronic records based on their characteristics, from which the legal e-Discovery industry can enormously benefit. In offloading metadata to the storage device, objects remove the dependency between the metadata and storage application, making data sharing between different storage applications viable.

What about security aspects of object based storage over the cloud?

Unlike block based storage, security is the single most distinguishable feature of object based storage. A few important security benefits provided by object based storage are:

  1. Cross platform data sharing and application level security (objects enable creation of multiple security domains whose access policies are individually determined by the storage applications)
  2. Increased capability of self-management within storage devices such as recovering from failures and regular backups.
  3. The security enforcement policy is set by the storage application, while object based storage devices provide only the mechanism

Invariably, object based storage was designed to exploit the increasing capabilities of storage devices, and replacing traditional block interfaces with objects is a major breakthrough.

By Syed Raza

Sorry, comments are closed for this post.

Comics
Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…