Welcome!

Weblogic Authors: Yeshim Deniz, Elizabeth White, Michael Meiner, Michael Bushong, Avi Rosenthal

Related Topics: Containers Expo Blog, @CloudExpo

Containers Expo Blog: Article

Cloud Optimized Storage Solutions (COSS) Explored

Part 2 - How is Content Stored in the Cloud?

Content Manipulation

A third dynamic to COSS storage is the nature of content manipulation. When looking at compliance-driven cloud storage models later in this paper, the impore of data manipulation becomes a crucial tipping point in determining the validity of a cloud storage model as it pertains to enterprise fitment.  Nonetheless, it is important to understand the types of content manipulation that could conceivably be put into place by COSS, namely: deduplication, encryption, compression, and optimzation.

Deduplication has been the media darling of data storage of late due to its ability to “reclaim” storage space on the primary storage target while maintaining data integrity and portability. This technology can readily be found in such products as EMC’s Avamar, NetApp’s FAS Deduplication, and Data Domain’s DDX series as well as other smaller product sets.  As an overview, de-duplication is a process that runs against file data looking at commonality factors (repeated binary strings, as it were) and strips redundant strings from the source files, replacing them with pointers.  By virtue of this process, the original data, while still the “same” from any observable point, is technically “changed” and a second iteration of that data becomes operational. Consequently, any level of data hydration reverts the second iteration to the first, again, effectively changing the source data.

Another factor of deduplication is the insertion of the deduplication process in the data stream.  There are currently two different approaches to processing data for deduplication: inband and out-of-band.  Inband data deduplication processing dictates that data must be processed via appliance (or other type of technology) prior to being stored on the target.   Out-of-band deduplication (also known as data at rest) processes the data after it arrives at its designated storage space, thus keeping the file or object in place, reducing file/object placement issues (if no policy is enacted at the time).

Encryption is another method of content manipulation that can be present within the COSS based on security and/or compliance metrics.  Typically encryption is either processed inband or out-of-band based on architectural design and encompasses various levels of security.  For the purpose of this paper, RSA’s AES encryption algorithm will be used as an exemplar of encryption methodologies.  AES uses two different factors to encrypt:  key sizes (variable) and algorithms. For key sizes, 128 or 256 bit modes are common but 192 bit keys could be used.  In terms of algorithm usage, any number of block cipher modes could be used :  Cipher-block chaining (CBC), Cipher feedback (CFB), et al.  In the end, these methods of encryption can adversely affect other storage-level processes like compression and deduplication because they prevent direct access to the byte layer of the file or object.

Encryption, like deduplication, can be done inband or out-of-band.  EMC’s PowerPath software, for example, utilizes hooks to the RSA AES key manager to encrypt data from the host to storage over any path as a method of host-based inband storage.  Cisco’s SSM module encrypts data from within the fabric, again, as another method of inband encryption.  Out-of-band encryption could be accomplished by any level of appliance that operates on files/objects committed to storage already .

Compression is a third method of data storage manipulation again aimed at reclaiming “space” on a storage target.  Compression is “the process of encoding information using fewer bits (or other information-bearing units) than an unencoded representation would use through use of specific encoding schemes. ”Similarly to deduplication, a change is affected on the underlying data object such that the relative bit size on disk is reduced and this operation can take place both inband and out-of-band. Products like EMC’s RecoverPoint utilize compression during the process of replication to allow for better bandwidth utilization.

Optimization is a level of data manipulation that is COSS-bound, meaning that it is explicitly initiated and run by the COSS in order to maintain the underlying filesystem and indexes.  A symptom of the storage system that might require optimization would be filesystem fragmentation and the consequent optimization would be defragmentation to better optimize data layout for quicker reads/writes. Other optimizations that  could be present are dirty page flushing, cache committs and flushing, as well as other system-level processes based on the operating system layer.

As noted, content storage on COSS can be as simplistic or as complicated as the architecture demands it to be.  Multiple protocols exist within the array to not only store data effectively but also to optimize and secure the data in such a fashion as dictated by the service provider or customer.  With this level of data engagement, how then can performance of the underlying COSS system be tailored from an SLA standpoint?

Disclaimer

The opinions expressed here are my personal opinions. Content published here is not read or approved in advance by EMC and does not necessarily reflect the views and opinions of EMC.

More Stories By Dave Graham

Dave Graham is a Technical Consultant with EMC Corporation where he focused on designing/architecting private cloud solutions for commercial customers.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Disruption, Innovation, Artificial Intelligence and Machine Learning, Leadership and Management hear these words all day every day... lofty goals but how do we make it real? Add to that, that simply put, people don't like change. But what if we could implement and utilize these enterprise tools in a fast and "Non-Disruptive" way, enabling us to glean insights about our business, identify and reduce exposure, risk and liability, and secure business continuity?
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
DXWorldEXPO LLC announced today that Telecom Reseller has been named "Media Sponsor" of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. Telecom Reseller reports on Unified Communications, UCaaS, BPaaS for enterprise and SMBs. They report extensively on both customer premises based solutions such as IP-PBX as well as cloud based and hosted platforms.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22nd international CloudEXPO | first international DXWorldEXPO and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time t...
DXWorldEXPO LLC announced today that "IoT Now" was named media sponsor of CloudEXPO | DXWorldEXPO 2018 New York, which will take place on November 11-13, 2018 in New York City, NY. IoT Now explores the evolving opportunities and challenges facing CSPs, and it passes on some lessons learned from those who have taken the first steps in next-gen IoT services.
SYS-CON Events announced today that Silicon India has been named “Media Sponsor” of SYS-CON's 21st International Cloud Expo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Published in Silicon Valley, Silicon India magazine is the premiere platform for CIOs to discuss their innovative enterprise solutions and allows IT vendors to learn about new solutions that can help grow their business.
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
"IBM is really all in on blockchain. We take a look at sort of the history of blockchain ledger technologies. It started out with bitcoin, Ethereum, and IBM evaluated these particular blockchain technologies and found they were anonymous and permissionless and that many companies were looking for permissioned blockchain," stated René Bostic, Technical VP of the IBM Cloud Unit in North America, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Conventi...