Weblogic Authors: Yeshim Deniz, Elizabeth White, Michael Meiner, Michael Bushong, Avi Rosenthal

Related Topics: Containers Expo Blog, @CloudExpo

Containers Expo Blog: Article

Cloud Optimized Storage Solutions (COSS) Explored

Part 2 - How is Content Stored in the Cloud?

Content Manipulation

A third dynamic to COSS storage is the nature of content manipulation. When looking at compliance-driven cloud storage models later in this paper, the impore of data manipulation becomes a crucial tipping point in determining the validity of a cloud storage model as it pertains to enterprise fitment.  Nonetheless, it is important to understand the types of content manipulation that could conceivably be put into place by COSS, namely: deduplication, encryption, compression, and optimzation.

Deduplication has been the media darling of data storage of late due to its ability to “reclaim” storage space on the primary storage target while maintaining data integrity and portability. This technology can readily be found in such products as EMC’s Avamar, NetApp’s FAS Deduplication, and Data Domain’s DDX series as well as other smaller product sets.  As an overview, de-duplication is a process that runs against file data looking at commonality factors (repeated binary strings, as it were) and strips redundant strings from the source files, replacing them with pointers.  By virtue of this process, the original data, while still the “same” from any observable point, is technically “changed” and a second iteration of that data becomes operational. Consequently, any level of data hydration reverts the second iteration to the first, again, effectively changing the source data.

Another factor of deduplication is the insertion of the deduplication process in the data stream.  There are currently two different approaches to processing data for deduplication: inband and out-of-band.  Inband data deduplication processing dictates that data must be processed via appliance (or other type of technology) prior to being stored on the target.   Out-of-band deduplication (also known as data at rest) processes the data after it arrives at its designated storage space, thus keeping the file or object in place, reducing file/object placement issues (if no policy is enacted at the time).

Encryption is another method of content manipulation that can be present within the COSS based on security and/or compliance metrics.  Typically encryption is either processed inband or out-of-band based on architectural design and encompasses various levels of security.  For the purpose of this paper, RSA’s AES encryption algorithm will be used as an exemplar of encryption methodologies.  AES uses two different factors to encrypt:  key sizes (variable) and algorithms. For key sizes, 128 or 256 bit modes are common but 192 bit keys could be used.  In terms of algorithm usage, any number of block cipher modes could be used :  Cipher-block chaining (CBC), Cipher feedback (CFB), et al.  In the end, these methods of encryption can adversely affect other storage-level processes like compression and deduplication because they prevent direct access to the byte layer of the file or object.

Encryption, like deduplication, can be done inband or out-of-band.  EMC’s PowerPath software, for example, utilizes hooks to the RSA AES key manager to encrypt data from the host to storage over any path as a method of host-based inband storage.  Cisco’s SSM module encrypts data from within the fabric, again, as another method of inband encryption.  Out-of-band encryption could be accomplished by any level of appliance that operates on files/objects committed to storage already .

Compression is a third method of data storage manipulation again aimed at reclaiming “space” on a storage target.  Compression is “the process of encoding information using fewer bits (or other information-bearing units) than an unencoded representation would use through use of specific encoding schemes. ”Similarly to deduplication, a change is affected on the underlying data object such that the relative bit size on disk is reduced and this operation can take place both inband and out-of-band. Products like EMC’s RecoverPoint utilize compression during the process of replication to allow for better bandwidth utilization.

Optimization is a level of data manipulation that is COSS-bound, meaning that it is explicitly initiated and run by the COSS in order to maintain the underlying filesystem and indexes.  A symptom of the storage system that might require optimization would be filesystem fragmentation and the consequent optimization would be defragmentation to better optimize data layout for quicker reads/writes. Other optimizations that  could be present are dirty page flushing, cache committs and flushing, as well as other system-level processes based on the operating system layer.

As noted, content storage on COSS can be as simplistic or as complicated as the architecture demands it to be.  Multiple protocols exist within the array to not only store data effectively but also to optimize and secure the data in such a fashion as dictated by the service provider or customer.  With this level of data engagement, how then can performance of the underlying COSS system be tailored from an SLA standpoint?


The opinions expressed here are my personal opinions. Content published here is not read or approved in advance by EMC and does not necessarily reflect the views and opinions of EMC.

More Stories By Dave Graham

Dave Graham is a Technical Consultant with EMC Corporation where he focused on designing/architecting private cloud solutions for commercial customers.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.
DXWorldEXPO LLC announced today that "Miami Blockchain Event by FinTechEXPO" has announced that its Call for Papers is now open. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expe...
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
DXWorldEXPO | CloudEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
With tough new regulations coming to Europe on data privacy in May 2018, Calligo will explain why in reality the effect is global and transforms how you consider critical data. EU GDPR fundamentally rewrites the rules for cloud, Big Data and IoT. In his session at 21st Cloud Expo, Adam Ryan, Vice President and General Manager EMEA at Calligo, examined the regulations and provided insight on how it affects technology, challenges the established rules and will usher in new levels of diligence arou...
Dion Hinchcliffe is an internationally recognized digital expert, bestselling book author, frequent keynote speaker, analyst, futurist, and transformation expert based in Washington, DC. He is currently Chief Strategy Officer at the industry-leading digital strategy and online community solutions firm, 7Summits.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Cloud Expo | DXWorld Expo have announced the conference tracks for Cloud Expo 2018. Cloud Expo will be held June 5-7, 2018, at the Javits Center in New York City, and November 6-8, 2018, at the Santa Clara Convention Center, Santa Clara, CA. Digital Transformation (DX) is a major focus with the introduction of DX Expo within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive ov...