Cloud
12/23/2008
12:20 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Cloud Storage Is About Dispersion

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.To be successful, cloud storage must be more than just cheap disk at the end of the Internet -- it has to offer key services that leverage its unique connectivity. Companies like EMC with its Atmos product, ParaScale's cloud storage software, and Cleversafe's dsNets are starting to address real customer needs in cloud storage, making it more than just cheap, connected storage. The top three components that a cloud storage solution must offer are dispersed storage, balanced modularity, and optimized capacity utilization.

Dispersed storage is really the key component of cloud storage architecture. The ability to, via policy, have data replicated throughout a distributed storage infrastructure is critical. This allows a service provider to offer storage services based on the level of the users subscription or the popularity of the item.

An example of a subscription-level policy could be a photo sharing site where a "paid membership" would make sure you have copies of your photos on three or four cloud storage pods elsewhere in the world while a "free membership" will only have a copy of your photo's on a single cloud storage pod. The difference is how much are you willing to pay to make sure that your photos are available to you if the cloud storage pod with your photos suffers a failure. With the paid membership, you are covered no matter what.

Another example would be the hot new single that is available for download -- iinitial release will see thousands of download requests and then they will taper off over time. The last thing you want to do is slow down your customer's ability to purchase something, but at a dollar a song you don't want to waste your profits on excess storage. In a dispersed model you could, again through policy, put the song on 20 different cloud storage pods spread throughout the world. Then, as the interest dies down, contract its dispersion to one plus a DR.

A key component of dispersion is automation so that you can control how your data objects are dispersed without having to be manually involved in each object. Cloud storage has to deal with very large storage capacities and a very high number of storage objects being managed by very few administrators so the service can be offered to consumers or internal employees at very low costs. This is why the policy-driven nature of dispersed cloud storage becomes critical.

Automation of this dispersion based on policies is not only critical in keeping costs down; it is a key to survival. As cloud providers begin to deal with millions and billions of objects, managing them discreetly becomes nearly impossible. Policies are going to be required that will track files based on user or usage during the entire life cycle of the file.

In our next entry we will discuss the next key element: balanced modularity.

Join us for our upcoming Webcast on Cloud Storage.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6856
Published: 2014-10-02
The AHRAH (aka com.vet2pet.aid219426) application 219426 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6857
Published: 2014-10-02
The Car Wallpapers HD (aka com.arab4x4.gallery.app) application 1.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6858
Published: 2014-10-02
The Mostafa Shemeas (aka com.mostafa.shemeas.website) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6859
Published: 2014-10-02
The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6860
Published: 2014-10-02
The Trial Tracker (aka com.etcweb.android.trial_tracker) application 1.1.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.