RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

Unified Storage For The Cloud Means Higher-Level Interfaces

cloud computing security

Unified Storage for the Cloud Means Higher-Level Interfaces

In common use, the term “unified storage” means providing block-level and file-level access to the same storage system with a single management and control interface. Traditionally, block-level access is via fiber channel or iSCSI, and file-level access is via NFS or CIFS protocol.

Recently, storage vendors are also adding _object_-level storage where the objects are entities with metadata like type, access control policies. Objects are read and written by applications using REST HTTP or SOAP and used directly at the application level. The most popular API is Amazon’s S3 (Simple Storage Service). With the higher-abstraction level of objects, the underlying implementation (e.g., number of parts, tiered storage, etc.) is hidden even more than with block- and file-level interfaces. EMC, Hitachi Data Systems, and NetApp among others provide unified storage systems.

Cloud Storage

Cloud storage is bringing some different requirements for a unified storage system. Most notably, not only is the data in the cloud, but the applications and compute resources are in the cloud. Instead of pulling data from the cloud, processing the data, and pushing back to cloud, the paradigm is to have compute resources in the cloud read and write data directly, local to the cloud. The data is never moved out of the cloud unless absolutely needed.

This type of usage pushes the need for even higher-level interfaces to data like SQL, Map-Reduce, and ETL. Unified storage for the cloud needs to do more than provide multi-protocol access to data that can be managed with one system. In addition to access, there must be the ability to process the data, e.g., running an SQL query. Then applications can easily use the functionality of the cloud storage/compute system instead of using the cloud as a dumb storage system and pulling and pushing the data between the cloud storage system and compute resources.

Unified storage for block- and file- level is still required and important because of the need to integrate with compute nodes that have a block-level or file-level interface. And also, there is the cloud data bootstrap problem of how do you initially get the data in the cloud that can be efficiently done by block-level transfer.

The power of a unified cloud storage system is in the network effect of having a single management interface that allows managing users, multiple tenants, storage and resource quotas, security, access management with ACLs (access control lists) for sharing, and other functions. With the single management interface, the system administrator can effectively control the backend storage system used in a wide variety of users using a small slice of different functionality (e.g., object storage only) or users using a wide scope of data access and processing.

By Gary Ogasawara

Gary Ogasawara is the VP Engineering at Gemini Mobile Technologies. He has worked on large scale mail systems for service providers and other high-performance, high-volume software systems. Gemini’s Cloudian™ product is an S3-compatible storage software package.

Read additional information on Cloud Computing News on CloudTweaks 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.

SYNDICATED NEWS SOURCES

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…