The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

Is your data exponentially growing? Are you using orthodox storage systems like Storage Area Network (SAN) and Network Attached Storage (NAS)? Cloud computing with its numerous benefits and innovative capabilities now offers a novel way of working with data through ‘Object based storage model’. Due to the ever increasing pressure exerted by the industry on the interface to storage, the storage technology has progressed to the point that a change in the device interface is needed. Well, the answer perhaps lies with object based storage, an emerging standard aimed to address this problem. Let’s further elaborate about object based storage.

Objects can be categorized as either:history

  1. Files
  2. Blocks

While files provide user applications with a higher-level storage abstraction that enables secure data sharing across different operating system platforms, blocks offer fast, scalable access to shared data. Having said that, the third related aspect is the all-important metadata which is basically data providing information about one or more aspects of the data, such as means of creation, purpose, time and date of creation, location, and author of the data. In a nutshell, object-based storage separates metadata from object data, storing it all on one level, rather than as a hierarchy as with traditional file-based storage.

With this understanding, you might think that object based storage is beneficial for large companies only, but that is not the case. At the outset, Cleversafe has been labeled as the pioneer in object storage by leading analyst firms. The breaking news is the fact that this innovative technology is now being made available to small to mid-size companies trying to cope with growing data needs. The Bunker, with its managed service, in partnership with Cleversafe, is providing small and mid-sized businesses to take advantage of object storage, its scalability and inherent security, which encrypts data both in transit and at rest. The best part is that you only pay for what you use!

Phil-Bindley-CTOPhilip Bindley, CTO at The Bunker comments: “IT leaders are faced with increasing challenges for data storage; the amount of data is growing exponentially and storage is consuming an ever-greater share of available IT budget. The cost and flexibility of public cloud storage have offered some respite, but at the expense of security and compliance for many businesses. We believe our Object Storage managed service solves all of these challenges for businesses, particularly in providing secure robust cloud storage that addresses data sovereignty and compliance requirements.”

The notable effect of object based storage is separating or offloading the entire space utilized by blocks from storage applications. For instance, in a traditional file system architecture, block-based file systems can roughly be divided into two sections: a user component (files and directories) and a storage component (mapping data structure to physical storage), making it simpler to offload management to the storage device, which is the intended effect of object based storage.

An added benefit is the enhanced De-duplication capability – a process of comparing electronic records based on their characteristics, from which the legal e-Discovery industry can enormously benefit. In offloading metadata to the storage device, objects remove the dependency between the metadata and storage application, making data sharing between different storage applications viable.

What about security aspects of object based storage over the cloud?

Unlike block based storage, security is the single most distinguishable feature of object based storage. A few important security benefits provided by object based storage are:

  1. Cross platform data sharing and application level security (objects enable creation of multiple security domains whose access policies are individually determined by the storage applications)
  2. Increased capability of self-management within storage devices such as recovering from failures and regular backups.
  3. The security enforcement policy is set by the storage application, while object based storage devices provide only the mechanism

Invariably, object based storage was designed to exploit the increasing capabilities of storage devices, and replacing traditional block interfaces with objects is a major breakthrough.

By Syed Raza

Syed Raza

With over 20 years of combined experience in the fields Law, Management, and IT, Syed has impeccable reviewing and strong editing skills with a long track record of writing technical, legal, and management articles that make readers stop and think.. Being a serial entrepreneur and attorney, he provides consultancy and project management in e-Discovery issues in complex civil litigation. As, a trial attorney with significant experience in matters relating to patent infringement, defense and prosecution in the pharmaceutical industry, contracts disputes, real estate, criminal matters, and international human rights law. Syed provides guidance and counsel to attorneys and clients on all aspects of discovery, including information management, data preservation and collection, early case assessment, comprehensive managed review and production. He also holds a PhD (management sciences) and MBA degree as well.

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups Wednesday, October 29, 2014 @ 9:00 am/12:00pm ET. Backup and Restore of a SharePoint environment can be a complex endeavor as the product consists of multiple components running at various tiers, each with their own backup and restore requirements. In addition, SharePoint documents are stored as Binary Large Objects (BLOBs) in

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts Syed RazaWith over 20 years of combined experience in the fields

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts Syed RazaWith over 20 years of combined