The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

Is your data exponentially growing? Are you using orthodox storage systems like Storage Area Network (SAN) and Network Attached Storage (NAS)? Cloud computing with its numerous benefits and innovative capabilities now offers a novel way of working with data through ‘Object based storage model’. Due to the ever increasing pressure exerted by the industry on the interface to storage, the storage technology has progressed to the point that a change in the device interface is needed. Well, the answer perhaps lies with object based storage, an emerging standard aimed to address this problem. Let’s further elaborate about object based storage.

Objects can be categorized as either:history

  1. Files
  2. Blocks

While files provide user applications with a higher-level storage abstraction that enables secure data sharing across different operating system platforms, blocks offer fast, scalable access to shared data. Having said that, the third related aspect is the all-important metadata which is basically data providing information about one or more aspects of the data, such as means of creation, purpose, time and date of creation, location, and author of the data. In a nutshell, object-based storage separates metadata from object data, storing it all on one level, rather than as a hierarchy as with traditional file-based storage.

With this understanding, you might think that object based storage is beneficial for large companies only, but that is not the case. At the outset, Cleversafe has been labeled as the pioneer in object storage by leading analyst firms. The breaking news is the fact that this innovative technology is now being made available to small to mid-size companies trying to cope with growing data needs. The Bunker, with its managed service, in partnership with Cleversafe, is providing small and mid-sized businesses to take advantage of object storage, its scalability and inherent security, which encrypts data both in transit and at rest. The best part is that you only pay for what you use!

Phil-Bindley-CTOPhilip Bindley, CTO at The Bunker comments: “IT leaders are faced with increasing challenges for data storage; the amount of data is growing exponentially and storage is consuming an ever-greater share of available IT budget. The cost and flexibility of public cloud storage have offered some respite, but at the expense of security and compliance for many businesses. We believe our Object Storage managed service solves all of these challenges for businesses, particularly in providing secure robust cloud storage that addresses data sovereignty and compliance requirements.”

The notable effect of object based storage is separating or offloading the entire space utilized by blocks from storage applications. For instance, in a traditional file system architecture, block-based file systems can roughly be divided into two sections: a user component (files and directories) and a storage component (mapping data structure to physical storage), making it simpler to offload management to the storage device, which is the intended effect of object based storage.

An added benefit is the enhanced De-duplication capability – a process of comparing electronic records based on their characteristics, from which the legal e-Discovery industry can enormously benefit. In offloading metadata to the storage device, objects remove the dependency between the metadata and storage application, making data sharing between different storage applications viable.

What about security aspects of object based storage over the cloud?

Unlike block based storage, security is the single most distinguishable feature of object based storage. A few important security benefits provided by object based storage are:

  1. Cross platform data sharing and application level security (objects enable creation of multiple security domains whose access policies are individually determined by the storage applications)
  2. Increased capability of self-management within storage devices such as recovering from failures and regular backups.
  3. The security enforcement policy is set by the storage application, while object based storage devices provide only the mechanism

Invariably, object based storage was designed to exploit the increasing capabilities of storage devices, and replacing traditional block interfaces with objects is a major breakthrough.

By Syed Raza

Syed Raza

With over 20 years of combined experience in the fields Law, Management, and IT, Syed has impeccable reviewing and strong editing skills with a long track record of writing technical, legal, and management articles that make readers stop and think.. Being a serial entrepreneur and attorney, he provides consultancy and project management in e-Discovery issues in complex civil litigation. As, a trial attorney with significant experience in matters relating to patent infringement, defense and prosecution in the pharmaceutical industry, contracts disputes, real estate, criminal matters, and international human rights law. Syed provides guidance and counsel to attorneys and clients on all aspects of discovery, including information management, data preservation and collection, early case assessment, comprehensive managed review and production. He also holds a PhD (management sciences) and MBA degree as well.

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of


Top Viral Impact

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery

Cloud Infographic: Disaster Recovery  Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.


Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving