Cloud storage

Last updated

Cloud storage is a model of computer data storage in which the digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company. These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment protected and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data.

Contents

Cloud storage services may be accessed through a colocated cloud computing service, a web service application programming interface (API) or by applications that utilize the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems.

History

Cloud computing is believed to have been invented by Joseph Carl Robnett Licklider in the 1960s with his work on ARPANET to connect people and data from anywhere at any time. [1]

In 1983, CompuServe offered its consumer users a small amount of disk space that could be used to store any files they chose to upload. [2]

In 1994, AT&T launched PersonaLink Services, an online platform for personal and business communication and entrepreneurship. The storage was one of the first to be all web-based, and referenced in their commercials as, "you can think of our electronic meeting place as the cloud." [3] Amazon Web Services introduced their cloud storage service AWS S3 in 2006, and has gained widespread recognition and adoption as the storage supplier to popular services such as SmugMug, Dropbox, and Pinterest. In 2005, Box announced an online file sharing and personal cloud content management service for businesses. [4]

Architecture

A high level architecture of cloud storage. Cloud storage architecture.png
A high level architecture of cloud storage.

Cloud storage is based on highly virtualized infrastructure and is like broader cloud computing in terms of accessible interfaces, near-instant elasticity and scalability, multi-tenancy, and metered resources. Cloud storage services can be utilized from an off-premises service (Amazon S3) or deployed on-premises (ViON Capacity Services). [5]

Cloud storage typically refers to a hosted object storage service, but the term has broadened to include other types of data storage that are now available as a service, like block storage.

Object storage services like Amazon S3, Oracle Cloud Storage and Microsoft Azure Storage, object storage software like Openstack Swift, object storage systems like EMC Atmos, EMC ECS and Hitachi Content Platform, and distributed storage research projects like OceanStore [6] and VISION Cloud [7] are all examples of storage that can be hosted and deployed with cloud storage characteristics.

Cloud storage is: [6]

Advantages

Potential concerns

Data security

Outsourcing data storage increases the attack surface area. [16]

  1. When data has been distributed it is stored at more locations increasing the risk of unauthorized physical access to the data. For example, in cloud based architecture, data is replicated and moved frequently so the risk of unauthorized data recovery increases dramatically. Such as in the case of disposal of old equipment, reuse of drives, reallocation of storage space. The manner that data is replicated depends on the service level a customer chooses and on the service provided. When encryption is in place it can ensure confidentiality. Crypto-shredding can be used when disposing of data (on a disk).
  2. The number of people with access to the data who could be compromised (e.g., bribed, or coerced) increases dramatically. A single company might have a small team of administrators, network engineers, and technicians, but a cloud storage company will have many customers and thousands of servers, therefore a much larger team of technical staff with physical and electronic access to almost all of the data at the entire facility or perhaps the entire company. [17] Decryption keys that are kept by the service user, as opposed to the service provider, limit the access to data by service provider employees. As for sharing multiple data in the cloud with multiple users, a large number of keys has to be distributed to users via secure channels for decryption, also it has to be securely stored and managed by the users in their devices. Storing these keys requires rather expensive secure storage. To overcome that, key-aggregate cryptosystem [18] can be used.
  3. It increases the number of networks over which the data travels. Instead of just a local area network (LAN) or storage area network (SAN), data stored on a cloud requires a WAN (wide area network) to connect them both.
  4. By sharing storage and networks with many other users/customers it is possible for other customers to access your data. Sometimes because of erroneous actions, faulty equipment, a bug and sometimes because of criminal intent. This risk applies to all types of storage and not only cloud storage. The risk of having data read during transmission can be mitigated through encryption technology. Encryption in transit protects data as it is being transmitted to and from the cloud service. [19] Encryption at rest protects data that is stored at the service provider. Encrypting data in an on-premises cloud service on-ramp system can provide both kinds of encryption protection.

Longevity

Companies are not permanent and the services and products they provide can change. Outsourcing data storage to another company needs careful investigation and nothing is ever certain. Contracts set in stone can be worthless when a company ceases to exist or its circumstances change. Companies can: [20] [21] [22]

  1. Go bankrupt.
  2. Expand and change their focus.
  3. Be purchased by other larger companies.
  4. Be purchased by a company headquartered in or move to a country that negates compliance with export restrictions and thus necessitates a move.
  5. Suffer an irrecoverable disaster.

Accessibility

Other concerns

Options

There are several options available to avoid such issues. One option is to use a private cloud instead of a public cloud (there are as well providers that offer private cloud storage). Another option is to ingest data in encrypted format where the key is hold within your on premise infrastructure. Access is often by use of cloud storage gateways that are on premise. Such gateways have options not only to encrypt and compress the data prior of transfer but as well mirror the storage across multiple cloud storage providers and remove the risk of a single providers shutdown. Gateways offer as well the option to cache data on a most recently used algorithm on premise. Along with data analytics data is cached and fetched on a most valuable form instead of recently used only form.

See also

Related Research Articles

Client–server model Distributed application structure in computing

Client–server model is a distributed application structure that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs, which share their resources with clients. A client does not share any of its resources, but it requests content or service from a server. Clients, therefore, initiate communication sessions with servers, which await incoming requests. Examples of computer applications that use the client-server model are email, network printing, and the World Wide Web.

In telecommunication, provisioning involves the process of preparing and equipping a network to allow it to provide new services to its users. In National Security/Emergency Preparedness telecommunications services, "provisioning" equates to "initiation" and includes altering the state of an existing priority service or capability.

IBM Db2 Family Relational model database server

Db2 is a family of data management products, including database servers, developed by IBM. They initially supported the relational model, but were extended to support object-relational features and non-relational structures like JSON and XML. The brand name was originally styled as DB/2, then DB2 until 2017 and finally changed to its present form.

A file hosting service, cloud storage service, online file storage provider, or cyberlocker is an internet hosting service specifically designed to host user files. It allows users to upload files that could be accessed over the internet after a user name and password or other authentication is provided. Typically, the services allow HTTP access, and sometimes FTP access. Related services are content-displaying hosting services, virtual storage, and remote backup.

A remote, online, or managed backup service, sometimes marketed as cloud backup or backup-as-a-service, is a service that provides users with a system for the backup, storage, and recovery of computer files. Online backup providers are companies that provide this type of service to end users. Such backup services are considered a form of cloud computing.

Software as a service is a software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted. It is sometimes referred to as "on-demand software", and was formerly referred to as "software plus services" by Microsoft.

Edge computing distributed computing

Edge computing is a distributed computing paradigm that brings computation and data storage closer to the location where it is needed, to improve response times and save bandwidth.

This is a comparison of online backup services.

Cloud computing Form of Internet-based computing that provides shared computer processing resources and data to computers and other devices on demand

Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.

Eucalyptus is a paid and open-source computer software for building Amazon Web Services (AWS)-compatible private and hybrid cloud computing environments, originally developed by the company Eucalyptus Systems. Eucalyptus is an acronym for Elastic Utility Computing Architecture for Linking Your Programs To Useful Systems. Eucalyptus enables pooling compute, storage, and network resources that can be dynamically scaled up or down as application workloads change. Mårten Mickos was the CEO of Eucalyptus. In September 2014, Eucalyptus was acquired by Hewlett-Packard and then maintained by DXC Technology. After DXC stopped developing the product in late 2017, AppScale Systems forked the code and started supporting Eucalyptus customers.

Cloud computing security or, more simply, cloud security refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security.

Cloud computing architecture overview about the cloud computing architecture

Cloud computing architecture refers to the components and subcomponents required for cloud computing. These components typically consist of a front end platform, back end platforms, a cloud based delivery, and a network. Combined, these components make up cloud computing architecture.

Perspecsys Inc. is a cloud computing security company that provides cloud data protection software. Perspecsys has offices in the Toronto area; Tysons Corner, Virginia; San Francisco, California; London, England; Paris, France; and Berlin, Germany.

Hazelcast in-memory data grid

In computing, Hazelcast IMDG is an open source in-memory data grid based on Java. It is also the name of the company developing the product. The Hazelcast company is funded by venture capital and headquartered in San Mateo.

A distributed file system for cloud is a file system that allows many clients to have access to data and supports operations on that data. Each data file may be partitioned into several parts called chunks. Each chunk may be stored on different remote machines, facilitating the parallel execution of applications. Typically, data is stored in files in a hierarchical tree, where the nodes represent directories. There are several ways to share files in a distributed architecture: each solution must be suitable for a certain type of application, depending on how complex the application is. Meanwhile, the security of the system must be ensured. Confidentiality, availability and integrity are the main keys for a secure system.

Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search, Gmail and YouTube. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. Registration requires a credit card or bank account details.

A personal cloud is a collection of digital content and services which are accessible from any device. The personal cloud is not a tangible entity. It is a place which gives users the ability to store, synchronize, stream and share content on a relative core, moving from one platform, screen and location to another. Created on connected services and applications, it reflects and sets consumers’ expectations for how next-generation computing services will work.

Cloud computing has become a social phenomenon used by most people every day. As with every important social phenomenon there are issues that limit its widespread adoption. In the present scenario, cloud computing is seen as a fast developing area that can instantly supply extensible services by using internet with the help of hardware and software virtualization. The biggest advantage of cloud computing is flexible lease and release of resources as per the requirement of the user. Other benefits encompass betterment in efficiency, compensating the costs in operations. It curtails down the high prices of hardware and software Although, there are numerous benefits of adopting the latest cloud technology still there are privacy issues involved in cloud computing because in the cloud at any time the data can outbreak the service provider and the information is deleted purposely. There are security issues of various kinds related with cloud computing falling into two broader categories: First, the issues related to the cloud security that the cloud providers face. Secondly, the issues related to the cloud security that the customers experience

Nirvana was virtual object storage software developed and maintained by General Atomics.

Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.

References

  1. "A History of Cloud Computing". ComputerWeekly.
  2. Louden, Bill (September 1983). "Increase Your 100's Storage with 128K from Compuserve". Portable 100. New England Publications Inc. 1 (1): 22. ISSN   0738-7016.
  3. Daniela Hernandez (May 23, 2014). "Tech Time Warp of the Week". Wired.
  4. "Box.net lets you store, share, work in the computing cloud". Silicon Valley Business Journal. December 16, 2009. Retrieved October 2, 2016.
  5. "On-premises private cloud storage description, characteristics, and options". Archived from the original on 2016-03-22. Retrieved 2012-12-10.
  6. 1 2 S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, Maintenance-Free Global Data Storage. IEEE Internet Computing , Vol 5, No 5, September/October 2001, pp 40–49. Archived 2012-03-29 at the Wayback Machine Archived 2011-06-23 at the Wayback Machine
  7. Kolodner, Elliot K.; Tal, Sivan; Kyriazis, Dimosthenis; Naor, Dalit; Allalouf, Miriam; Bonelli, Lucia; Brand, Per; Eckert, Albert; Elmroth, Erik; Gogouvitis, Spyridon V.; Harnik, Danny; Hernandez, Francisco; Jaeger, Michael C.; Bayuh Lakew, Ewnetu; Manuel Lopez, Jose; Lorenz, Mirko; Messina, Alberto; Shulman-Peleg, Alexandra; Talyansky, Roman; Voulodimos, Athanasios; Wolfsthal, Yaron (2011). "A Cloud Environment for Data-intensive Storage Services". 2011 IEEE Third International Conference on Cloud Computing Technology and Science: 357–366. CiteSeerX   10.1.1.302.151 . doi:10.1109/CloudCom.2011.55. ISBN   978-1-4673-0090-2.
  8. Vernik, Gil, et al. "Data On-boarding in Federated Storage Clouds." Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing. IEEE Computer Society, 2013.
  9. Kemme, Bettina, et al. "Consistency in Distributed Systems (Dagstuhl Seminar 13081)." (2013).
  10. 1 2 3 4 ZDNet, Nasuni Cloud Storage Gateway By Dan Kusnetzky, June 1, 2010,
  11. Gupta, P (20 October 2013). "The usage and adoption of cloud computing by small and medium businesses". International Journal of Information Management. 33 (5): 861–874. doi:10.1016/j.ijinfomgt.2013.07.001.
  12. "Ochs, R. (2012). The New Decision-Makers. CRN (June 22, 2012). Retrieved on December 10, 2012". Archived from the original on August 5, 2016. Retrieved December 10, 2012.
  13. "4 reasons why cloud and on-premises storage are different, but equally good for people data". 2013-09-09. Archived from the original on 2013-09-25. Retrieved 2013-09-09.
  14. O’Brien, J. A. & Marakas, G. M. (2011). Computer Software. Management Information Systems 10th ed. 145. McGraw-Hill/Irwin
  15. Wu C F, Wang Y S, Liu G N, Amies, A, 2012, Create solutions on IBM SmartCloud Enterprise: Transfer image assets between different accounts IBM developerWorks, June 6.
  16. "The Attack Surface Problem". Sans.edu. Retrieved 2013-07-08.
  17. Cyber%20 Intrusion%20 Mitigation%20 Strategies .pdf "US-CERT ICS-TIP-12-146-01 Targeted Cyber Intrusion and Detection Mitigation Strategies" Check |url= value (help)(PDF).[ permanent dead link ]
  18. Chu, Cheng-Kang; Chow, Sherman S.M.; Tzeng, Wen-Guey; Zhou, Jianying; Deng, Robert H. (2014-02-01). "Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage". IEEE Transactions on Parallel and Distributed Systems. 25 (2): 468–477. doi:10.1109/TPDS.2013.112. ISSN   1045-9219.
  19. Transfer files from one onedrive account to another.
  20. Butler, Brandon (2 June 2014). "Cloud's worst-case scenario: What to do if your provider goes belly up". Network World . Retrieved 20 June 2015.
  21. Gaudin, Sharon (12 January 2015). "Verizon gets 'black eye' in long cloud shutdown". ComputerWorld . Retrieved 20 June 2015.
  22. Butler, Brandon (1 November 2013). "Free cloud storage service MegaCloud goes dark". Network World. Retrieved 20 June 2015.
  23. "DoDD 5015.2 DOD Records Management Program, Section 5.1.3" (PDF).
  24. Mello, John P. "National Security Agency Pressed to Reveal Details on Google Deal". PCWorld. Retrieved 2013-07-08.
  25. Spring, Tom. "Google Ditches Microsoft's Windows Over Security Issues, Report Claims". PCWorld. Retrieved 2013-07-08.
  26. Subashini, S.; Kavitha, V. (2011-01-01). "A survey on security issues in service delivery models of cloud computing". Journal of Network and Computer Applications. 34 (1): 1–11. doi:10.1016/j.jnca.2010.07.006.
  27. Justin Pot (7 December 2011). "Codex Cloud: Upload Your Books & Read Them Online Along With Other People's Uploads". MakeUseOf. Archived from the original on 21 October 2016. Retrieved 12 December 2012.
  28. Nancy Messieh (18 October 2011). "Publishers beware: Is CodexCloud the Grooveshark for ebooks?". NextWeb.
  29. Jones, Hadley. "When Online File Storage Gets Legal: Regulatory Compliance". CloudWedge. Retrieved 2014-01-16.