Cloud
12/23/2008
12:20 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage Is About Dispersion

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.To be successful, cloud storage must be more than just cheap disk at the end of the Internet -- it has to offer key services that leverage its unique connectivity. Companies like EMC with its Atmos product, ParaScale's cloud storage software, and Cleversafe's dsNets are starting to address real customer needs in cloud storage, making it more than just cheap, connected storage. The top three components that a cloud storage solution must offer are dispersed storage, balanced modularity, and optimized capacity utilization.

Dispersed storage is really the key component of cloud storage architecture. The ability to, via policy, have data replicated throughout a distributed storage infrastructure is critical. This allows a service provider to offer storage services based on the level of the users subscription or the popularity of the item.

An example of a subscription-level policy could be a photo sharing site where a "paid membership" would make sure you have copies of your photos on three or four cloud storage pods elsewhere in the world while a "free membership" will only have a copy of your photo's on a single cloud storage pod. The difference is how much are you willing to pay to make sure that your photos are available to you if the cloud storage pod with your photos suffers a failure. With the paid membership, you are covered no matter what.

Another example would be the hot new single that is available for download -- iinitial release will see thousands of download requests and then they will taper off over time. The last thing you want to do is slow down your customer's ability to purchase something, but at a dollar a song you don't want to waste your profits on excess storage. In a dispersed model you could, again through policy, put the song on 20 different cloud storage pods spread throughout the world. Then, as the interest dies down, contract its dispersion to one plus a DR.

A key component of dispersion is automation so that you can control how your data objects are dispersed without having to be manually involved in each object. Cloud storage has to deal with very large storage capacities and a very high number of storage objects being managed by very few administrators so the service can be offered to consumers or internal employees at very low costs. This is why the policy-driven nature of dispersed cloud storage becomes critical.

Automation of this dispersion based on policies is not only critical in keeping costs down; it is a key to survival. As cloud providers begin to deal with millions and billions of objects, managing them discreetly becomes nearly impossible. Policies are going to be required that will track files based on user or usage during the entire life cycle of the file.

In our next entry we will discuss the next key element: balanced modularity.

Join us for our upcoming Webcast on Cloud Storage.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?