Cloud
12/23/2008
12:20 PM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage Is About Dispersion

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.

Cloud storage is destined to be one of the hottest markets next year. It is one of those technologies that is actually aided by a down economy. As IT budgets remain flat or decline, the need for storage capacity will accelerate. The ability to buy that storage as you need it instead of all at once will be interesting. Additionally, Web 2.0 and other Internet-enabled services are supposed to continue to thrive, and all these will need storage as well.To be successful, cloud storage must be more than just cheap disk at the end of the Internet -- it has to offer key services that leverage its unique connectivity. Companies like EMC with its Atmos product, ParaScale's cloud storage software, and Cleversafe's dsNets are starting to address real customer needs in cloud storage, making it more than just cheap, connected storage. The top three components that a cloud storage solution must offer are dispersed storage, balanced modularity, and optimized capacity utilization.

Dispersed storage is really the key component of cloud storage architecture. The ability to, via policy, have data replicated throughout a distributed storage infrastructure is critical. This allows a service provider to offer storage services based on the level of the users subscription or the popularity of the item.

An example of a subscription-level policy could be a photo sharing site where a "paid membership" would make sure you have copies of your photos on three or four cloud storage pods elsewhere in the world while a "free membership" will only have a copy of your photo's on a single cloud storage pod. The difference is how much are you willing to pay to make sure that your photos are available to you if the cloud storage pod with your photos suffers a failure. With the paid membership, you are covered no matter what.

Another example would be the hot new single that is available for download -- iinitial release will see thousands of download requests and then they will taper off over time. The last thing you want to do is slow down your customer's ability to purchase something, but at a dollar a song you don't want to waste your profits on excess storage. In a dispersed model you could, again through policy, put the song on 20 different cloud storage pods spread throughout the world. Then, as the interest dies down, contract its dispersion to one plus a DR.

A key component of dispersion is automation so that you can control how your data objects are dispersed without having to be manually involved in each object. Cloud storage has to deal with very large storage capacities and a very high number of storage objects being managed by very few administrators so the service can be offered to consumers or internal employees at very low costs. This is why the policy-driven nature of dispersed cloud storage becomes critical.

Automation of this dispersion based on policies is not only critical in keeping costs down; it is a key to survival. As cloud providers begin to deal with millions and billions of objects, managing them discreetly becomes nearly impossible. Policies are going to be required that will track files based on user or usage during the entire life cycle of the file.

In our next entry we will discuss the next key element: balanced modularity.

Join us for our upcoming Webcast on Cloud Storage.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.