Cloud

12/23/2008
12:20 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage Is About Dispersion

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.To be successful, cloud storage must be more than just cheap disk at the end of the Internet -- it has to offer key services that leverage its unique connectivity. Companies like EMC with its Atmos product, ParaScale's cloud storage software, and Cleversafe's dsNets are starting to address real customer needs in cloud storage, making it more than just cheap, connected storage. The top three components that a cloud storage solution must offer are dispersed storage, balanced modularity, and optimized capacity utilization.

Dispersed storage is really the key component of cloud storage architecture. The ability to, via policy, have data replicated throughout a distributed storage infrastructure is critical. This allows a service provider to offer storage services based on the level of the users subscription or the popularity of the item.

An example of a subscription-level policy could be a photo sharing site where a "paid membership" would make sure you have copies of your photos on three or four cloud storage pods elsewhere in the world while a "free membership" will only have a copy of your photo's on a single cloud storage pod. The difference is how much are you willing to pay to make sure that your photos are available to you if the cloud storage pod with your photos suffers a failure. With the paid membership, you are covered no matter what.

Another example would be the hot new single that is available for download -- iinitial release will see thousands of download requests and then they will taper off over time. The last thing you want to do is slow down your customer's ability to purchase something, but at a dollar a song you don't want to waste your profits on excess storage. In a dispersed model you could, again through policy, put the song on 20 different cloud storage pods spread throughout the world. Then, as the interest dies down, contract its dispersion to one plus a DR.

A key component of dispersion is automation so that you can control how your data objects are dispersed without having to be manually involved in each object. Cloud storage has to deal with very large storage capacities and a very high number of storage objects being managed by very few administrators so the service can be offered to consumers or internal employees at very low costs. This is why the policy-driven nature of dispersed cloud storage becomes critical.

Automation of this dispersion based on policies is not only critical in keeping costs down; it is a key to survival. As cloud providers begin to deal with millions and billions of objects, managing them discreetly becomes nearly impossible. Policies are going to be required that will track files based on user or usage during the entire life cycle of the file.

In our next entry we will discuss the next key element: balanced modularity.

Join us for our upcoming Webcast on Cloud Storage.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Mobile Malware Incidents Hit 100% of Businesses
Dawn Kawamoto, Associate Editor, Dark Reading,  11/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.