Cloud
12/23/2008
12:20 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage Is About Dispersion

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.To be successful, cloud storage must be more than just cheap disk at the end of the Internet -- it has to offer key services that leverage its unique connectivity. Companies like EMC with its Atmos product, ParaScale's cloud storage software, and Cleversafe's dsNets are starting to address real customer needs in cloud storage, making it more than just cheap, connected storage. The top three components that a cloud storage solution must offer are dispersed storage, balanced modularity, and optimized capacity utilization.

Dispersed storage is really the key component of cloud storage architecture. The ability to, via policy, have data replicated throughout a distributed storage infrastructure is critical. This allows a service provider to offer storage services based on the level of the users subscription or the popularity of the item.

An example of a subscription-level policy could be a photo sharing site where a "paid membership" would make sure you have copies of your photos on three or four cloud storage pods elsewhere in the world while a "free membership" will only have a copy of your photo's on a single cloud storage pod. The difference is how much are you willing to pay to make sure that your photos are available to you if the cloud storage pod with your photos suffers a failure. With the paid membership, you are covered no matter what.

Another example would be the hot new single that is available for download -- iinitial release will see thousands of download requests and then they will taper off over time. The last thing you want to do is slow down your customer's ability to purchase something, but at a dollar a song you don't want to waste your profits on excess storage. In a dispersed model you could, again through policy, put the song on 20 different cloud storage pods spread throughout the world. Then, as the interest dies down, contract its dispersion to one plus a DR.

A key component of dispersion is automation so that you can control how your data objects are dispersed without having to be manually involved in each object. Cloud storage has to deal with very large storage capacities and a very high number of storage objects being managed by very few administrators so the service can be offered to consumers or internal employees at very low costs. This is why the policy-driven nature of dispersed cloud storage becomes critical.

Automation of this dispersion based on policies is not only critical in keeping costs down; it is a key to survival. As cloud providers begin to deal with millions and billions of objects, managing them discreetly becomes nearly impossible. Policies are going to be required that will track files based on user or usage during the entire life cycle of the file.

In our next entry we will discuss the next key element: balanced modularity.

Join us for our upcoming Webcast on Cloud Storage.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.