Kurma: Efficient and Secure Multi-Cloud Storage Gateways For

Total Page:16

File Type:pdf, Size:1020Kb

Kurma: Efficient and Secure Multi-Cloud Storage Gateways For Kurma: Efficient and Secure Multi-Cloud Storage Gateways for Network-Attached Storage A Dissertation Presented by Ming Chen to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University Technical Report FSL-17-01 April 2017 Abstract Cloud computing is becoming increasingly popular as utility computing is being gradually real- ized. Still, many organizations cannot enjoy the high accessibility, availability, flexibility, scalabil- ity, and cost-effectiveness of cloud systems because of security concerns and legacy infrastructure. A promising solution to this problem is the hybrid cloud model, which combines public clouds with private clouds and Network-Attached Storage (NAS). Many researchers tried to secure and optimize public clouds, but few studied the unique security and performance problems of such hybrid solutions. This thesis explores hybrid cloud storage solutions that have the advantages of both public and private clouds. We focus on preserving the strong security and good performance of on- premises storage, while using public clouds for convenience, data availability, and economic data sharing. We propose Kurma, an efficient and secure gateway (middleware) system that bridges traditional NAS and cloud storage. Kurma allows legacy NAS-based programs to seamlessly and securely access cloud storage. Kurma optimizes performance by supporting and improving on the latest NFSv4.1 protocol, which contains new performance-enhancing features including compound procedures and delegations. Kurma also caches hot data in order to serve popular I/O requests from the faster, on-premises network. On-premises Kurma gateways act as sources of trust, and overcome the security concerns caused by the opaque and multi-tenant nature of cloud storage. Kurma protects data from untrusted clouds with end-to-end integrity and confidentiality, and efficiently detects replay attacks while al- lowing data sharing among geo-distributed gateways. Kurma uses multiple clouds as backends for higher availability, and splits data among clouds using secret sharing for higher confidential- ity. Kurma can also efficiently detect stale data caused by replay attacks or due to the eventual consistency nature of clouds. We have thoroughly benchmarked the in-kernel NFSv4.1 implementation and improved its performance by up to 11×. Taking advantage of NFSv4.1 compound procedures, we have designed and implemented a vectorized file-system API and library (called vNFS) that can further boost NFS performance by up to two orders of magnitude. Assuming a public cloud supporting NFSv4, we have designed and implemented an early Kurma prototype (called SeMiNAS) with a performance penalty of less than 18%, while still protecting integrity and confidentiality of files. Based on SeMiNAS, we developed Kurma which uses real public clouds including AWS S3, Azure Blob Store, Google Cloud Storage, and Rackspace Cloud Files. Kurma reliably stores files in multiple clouds with replication, erasure coding, or secret sharing to tolerate cloud failures. To share files among clients in geo-distributed offices, Kurma maintains a unified file-system names- pace across geo-distributed gateways. Kurma keeps file-system metadata on-premises and encrypts data blocks before writing them to clouds. In spite of the eventual consistency of clouds, Kurma ensures data freshness using an efficient scheme that combines versioning and timestamping. Our evaluation showed that Kurma’s performance is around 52–91% that of a local NFS server while providing geo-replication, confidentiality, integrity, and high availability. Our thesis is that cloud storage can be made efficient and highly secure for traditional NAS- based systems utilizing hybrid cloud solutions such as Kurma. ii Contents List of Figures vii List of Tables viii Acknowledgments x 1 Introduction 1 2 Benchmarking Network File System 5 2.1 NFS Introduction . .5 2.2 Benchmarking Methodology . .6 2.2.1 Experimental Setup . .6 2.2.2 Benchmarks and Workloads . .7 2.3 Benchmarking Data-Intensive Workloads . .8 2.3.1 Random Read . .8 2.3.2 Sequential Read . 10 2.3.3 Random Write . 12 2.3.4 Sequential Write . 14 2.4 Benchmarking Metadata-Intensive Workloads . 14 2.4.1 Read Small Files . 14 2.4.2 File Creation . 16 2.4.3 Directory Listing . 19 2.5 Benchmarking NFSv4 Delegations . 20 2.5.1 Granting a Delegation . 20 2.5.2 Delegation Performance: Locked Reads . 21 2.5.3 Delegation Recall Impact . 23 2.6 Benchmarking Macro-Workloads . 24 2.6.1 The File Server Workload . 24 2.6.2 The Web Server Workload . 25 2.6.3 The Mail Server Workload . 27 2.7 Related Work of NFS Performance Benchmarking . 28 2.8 Benchmarking Conclusions . 29 2.8.1 Limitations . 30 iii 3 vNFS: Maximizing NFS Performance with Compounds and Vectorized I/O 31 3.1 vNFS Introduction and Background . 31 3.2 vNFS Design Overview . 33 3.2.1 Design Goals . 34 3.2.2 Design Choices . 34 3.2.2.1 Overt vs. covert coalescing . 34 3.2.2.2 Vectorized vs. start/end-based API . 35 3.2.2.3 User-space vs. in-kernel implementation . 35 3.2.3 Architecture . 35 3.3 vNFS API . 36 3.3.1 vread/vwrite ............................... 36 3.3.2 vopen/vclose ............................... 38 3.3.3 vgetattrs/vsetattrs ......................... 38 3.3.4 vsscopy/vcopy .............................. 38 3.3.5 vmkdir ................................... 39 3.3.6 vlistdir .................................. 39 3.3.7 vsymlink/vreadlink/vhardlink ................... 39 3.3.8 vremove ................................... 39 3.3.9 vrename ................................... 40 3.4 vNFS Implementation . 40 3.4.1 RPC size limit . 40 3.4.2 Protocol extensions . 41 3.4.3 Path compression . 41 3.4.4 Client-side caching . 41 3.5 vNFS Evaluation . 42 3.5.1 Experimental Testbed Setup . 42 3.5.2 Micro-workloads . 42 3.5.2.1 Small vs. big files . 42 3.5.2.2 Compounding degree . 44 3.5.2.3 Caching . 45 3.5.3 Macro-workloads . 46 3.5.3.1 GNU Coreutils . 46 3.5.3.2 tar ................................ 48 3.5.3.3 Filebench . 49 3.5.3.4 HTTP/2 server . 51 3.6 Related Work of vNFS . 51 3.6.1 Improving NFS performance . 51 3.6.2 I/O compounding . 52 3.6.3 Vectorized APIs . 52 3.7 vNFS Conclusions . 53 4 SeMiNAS: A Secure Middleware for Cloud-Backed Network-Attached Storage 54 4.1 SeMiNAS Introduction . 54 4.2 SeMiNAS Background and Motivation . 55 4.2.1 A revisit of cryptographic file systems. 56 iv 4.2.2 An NFS vs. a key-value object back-end. 56 4.3 SeMiNAS Design . 57 4.3.1 Threat Model . 57 4.3.2 Design Goals . 58 4.3.3 Architecture . 58 4.3.4 Integrity and Confidentiality . 59 4.3.4.1 Key Management . 60 4.3.4.2 File-System Namespace Protection . 60 4.3.4.3 Security Metadata Management . 61 4.3.5 NFSv4-Based Performance Optimizations . 61 4.3.5.1 NFS Data-Integrity eXtension . 61 4.3.5.2 Compound Procedures . 62 4.3.6 Caching . 63 4.4 SeMiNAS Implementation . 63 4.4.1 NFS-Ganesha . 64 4.4.2 Authenticated Encryption . 64 4.4.3 Caching . 65 4.4.4 Lines of Code . 65 4.5 SeMiNAS Evaluation . 65 4.5.1 Experimental Setup . 65 4.5.2 Micro-Workloads . 67 4.5.2.1 Read-Write Ratio Workload . 67 4.5.2.2 File-Creation Workload . 67 4.5.2.3 File-Deletion Workload . 68 4.5.3 Macro-Workloads . 69 4.5.3.1 Network File-System Server Workload . 69 4.5.3.2 Web-Proxy Workload . 70 4.5.3.3 Mail-Server Workload . 71 4.6 Related Work of SeMiNAS . 72 4.6.1 Secure Distributed Storage Systems . 72 4.6.2 Cloud NAS . 72 4.6.3 Cloud storage gateways . 73 4.7 SeMiNAS Conclusions . 73 4.7.1 Limitations . 73 5 Kurma: Multi-Cloud Secure Gateways 74 5.1 Kurma Introduction . 74 5.2 Kurma Background . ..
Recommended publications
  • Building a Cloud-Enabled File Storage Infrastructure
    F5 White Paper Building a Cloud-Enabled File Storage Infrastructure A cloud-enabled infrastructure can help your organization seamlessly integrate cloud storage and maximize cost savings, while also offering significant benefits to your traditional file storage environments. by Renny Shen Product Marketing Manager White Paper Building a Cloud-Enabled File Storage Infrastructure Contents Introduction 3 What Makes a Cloud? 3 Types of Cloud Storage 4 What Makes Cloud Storage Different? 4 Accessing Files Remotely over the Network 5 Accessing Files on Object-Based Storage 5 Unique Cost Structure 6 Where Clouds Make Sense 7 Fitting the Cloud into a Tiered Storage Framework 7 Expanding the Parameters for Tiering with the Cloud 8 Defining Cloud-Enabled 9 Integrating Different Types of Storage 10 Non-Disruptive File Migration 11 Automated Storage Tiering 11 Benefits of a Cloud-Enabled Infrastructure 12 Reduced Storage Costs 12 Reduced Backup Times and Costs 13 Reduced Operational Costs 13 The F5 Cloud Storage Model 13 Creating a Private Cloud 15 Conclusion 18 2 White Paper Building a Cloud-Enabled File Storage Infrastructure Introduction Cloud storage offers enterprise organizations the opportunity to bring constantly rising file storage costs and management burden under control. By moving appropriate types of files to the cloud, organizations can reduce not only the amount of storage capacity that they need to purchase, but also the operational overhead involved in managing it. In addition, the cloud enables storage capacity to be increased on demand, while charging organizations only for the amount of storage that is actually utilized. Cloud storage will bring many changes to the way enterprises manage storage.
    [Show full text]
  • Deliverable No. 5.3 Techniques to Build the Cloud Infrastructure Available to the Community
    Deliverable No. 5.3 Techniques to build the cloud infrastructure available to the community Grant Agreement No.: 600841 Deliverable No.: D5.3 Deliverable Name: Techniques to build the cloud infrastructure available to the community Contractual Submission Date: 31/03/2015 Actual Submission Date: 31/03/2015 Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Grant Agreement no. 600841 D5.3 – Techniques to build the cloud infrastructure available to the community COVER AND CONTROL PAGE OF DOCUMENT Project Acronym: CHIC Project Full Name: Computational Horizons In Cancer (CHIC): Developing Meta- and Hyper-Multiscale Models and Repositories for In Silico Oncology Deliverable No.: D5.3 Document name: Techniques to build the cloud infrastructure available to the community Nature (R, P, D, O)1 R Dissemination Level (PU, PP, PU RE, CO)2 Version: 1.0 Actual Submission Date: 31/03/2015 Editor: Manolis Tsiknakis Institution: FORTH E-Mail: [email protected] ABSTRACT: This deliverable reports on the technologies, techniques and configuration needed to install, configure, maintain and run a private cloud infrastructure for productive usage. KEYWORD LIST: Cloud infrastructure, OpenStack, Eucalyptus, CloudStack, VMware vSphere, virtualization, computation, storage, security, architecture. The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under grant agreement no 600841. The author is solely responsible for its content, it does not represent the opinion of the European Community and the Community is not responsible for any use that might be made of data appearing therein.
    [Show full text]
  • A Complete Survey on Software Architectural Styles and Patterns
    Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 70 ( 2015 ) 16 – 28 4th International Conference on Eco-friendly Computing and Communication Systems, ICECCS 2015 A Complete Survey on Software Architectural Styles and Patterns Anubha Sharmaa*,Manoj Kumarb, Sonali Agarwalc a,b,cIndian Institute of Information Technology,Allahabad 211012,India Abstract Software bought revolutionary change making entrepreneurs fortunate enough to make money in less time with least effort and correct output. SDLC (Software development life cycle) is responsible for software’s reliability, performance, scalability, functionality and maintainability. Although all phases of SDLC have their own importance but Software architecture serves as the foundation for other phases of SDLC. Just like sketch of a building helps constructor to correctly construct the building, software architecture helps software developer to develop the software properly. There are various styles available for software architecture. In this paper, clear picture of all important software architecture styles are presented along with recent advancement in software architecture and design phases. It could be helpful for a software developer to select an appropriate style according to his/her project’s requirement. An architectural style must be chosen correctly to get its all benefits in the system. All the architectural styles are compared on the basis of various quality attributes. This paper also specifies the application area, advantages and disadvantages of each architectural style. © 20152015 The The Authors. Authors. Published Published by byElsevier Elsevier B.V. B.V. This is an open access article under the CC BY-NC-ND license (Peerhttp://creativecommons.org/licenses/by-nc-nd/4.0/-review under responsibility of the Organizing).
    [Show full text]
  • Acronis Backup 12.5
    Acronis Backup 12.5 BEST PRACTICES Revision: 12/12/2019 Table of contents 1 Introduction ....................................................................................................................5 2 Acronis Backup components and architecture ..................................................................5 2.1 Resource usage calculator ......................................................................................................... 8 2.2 Licensing .................................................................................................................................... 9 2.2.1 Policy ................................................................................................................................................................ 9 2.2.2 License Server ................................................................................................................................................ 10 2.2.3 Using Standard and Advanced on one Management Server ..................................................................... 10 3 Single and isolated machines.......................................................................................... 11 3.1 Preparing for deployment .......................................................................................................11 3.1.1 Software requirements for single and isolated machines ......................................................................... 11 3.1.2 Hardware requirements and sizing .............................................................................................................
    [Show full text]
  • AWS Storage Gateway Fred Hutch - Partly Cloudy Conference
    AWS Storage Gateway Fred Hutch - Partly Cloudy Conference Jeff Bartley | Storage Solutions Architect | [email protected] October 25th, 2018 © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Enabling a spectrum of hybrid use cases Analytics | File Services | Production Tiering | Data Processing Data Distribution | Backup | DR | Archive | Migration Amazon Amazon Amazon Amazon Amazon Amazon AWS Amazon EMR Athena S3 Glacier EBS EC2 Lambda CloudFront AWS Storage Gateway Enterprise Data Centers Remote Offices Research Sites Small-Medium Businesses Multimedia content File servers Databases App. servers Devices Users Backup servers © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Storage Gateway Family Hybrid storage service enabling applications to seamlessly use AWS storage File Gateway Store and access objects in Amazon S3 from file-based applications with local caching Volume Gateway Block storage on-premises backed by cloud storage with local caching, EBS snapshots, and clones Tape Gateway Drop-in replacement for physical tape infrastructure backed by cloud storage with local caching © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Storage Gateway Family Files Amazon S3 (NFS or SMB) AWS Storage Gateway Amazon EBS Volumes snapshots (iSCSI) HTTPS Gateway Service Amazon Glacier Tapes AWS Identity and Access (iSCSI VTL) AWS CloudTrail Management (IAM) Amazon AWS Key Management Service Customer Premises CloudWatch (AWS KMS) Gateway provides applications Native storage in AWS • Protocol conversion and device emulation • Objects in S3 (file) • Caching (read-through / write-back) • Snapshots in EBS (volume) • Optimized data transfer • Archives in Glacier (tape) © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
    [Show full text]
  • Hybrid Cloud Storage Products
    Build aHybridStorageCloud services and possible pitfalls. This guide can help you make thosedecisions. services make pitfalls.Thisguidecanhelpyou andpossible products, ontheavailable choicesandeducate themselves tomake require users data bothofthesemethodsstoring ofusingthecloudforstorage; common way couldbecomethemost Combining publiccloudservices andon-premisesstorage VIRTUALIZATION CLOUD APPLICATION DEVELOPMENT NETWORKING STORAGE ARCHITECTURE DATA CENTER MANAGEMENT BUSINEss INTELLIGENCE/APPLICATIONS DISASTER RECOVERY/COMPLIANCE SECURITY S MOD HYBRID CLOUD 4 PROS A HYBRID CLOUD 3 S HYBRID CLOUD 2 NoT EDITor’s 1 Guide An Essential TILL HASW TORAG N E D CO PRODU E N E AK S SP C TS OTS E L EDITor’S NOTE 1 Building the Bridge: Making Hybrid Clouds a Reality IT managers who want to take advantage of com- awareness and bandwidth issues are among the items Home petitive cloud pricing, and the promise of elasticity that will factor into the decision process. While pub- that comes with public clouds, will almost always be- lic cloud storage brings the potential for big savings, it Editor’s Note gin their journey to the cloud with a hybrid model. A also presents latency problems; private cloud storage hybrid cloud model is not only the most likely start- is limited to private data centers and it requires the IT Hybrid Cloud ing point for an organization, but it is also often the manager to guarantee scalability at a time when unprec- Storage Products framework they decide on as a lasting strategy. That’s edented volumes of unstructured data are produced. because it allows a combination of on-site cloud storage this Essential Guide to building a hybrid storage cloud Hybrid Cloud Pros and Cons and public cloud storage to accommodate varying needs offers sophisticated analysis, discusses hybrid cloud throughout an organization for data access and speed of storage models for various needs, and answers key Hybrid Cloud Model delivery.
    [Show full text]
  • Cloud Storage Using Amazon Storage Gateway with Drobo Iscsi SAN
    Drobo How-To Guide Cloud Storage Using Amazon Storage Gateway with Drobo iSCSI SAN The Amazon Web Services (AWS) Storage Gateway uses an on-premises virtual appliance to replicate a portion of your local Drobo iSCSI SAN (Drobo B1200i, left below, and Drobo B800i, right below) to cloud- based storage. This solution provides an option for redundant backup and disaster recovery in the cloud for critical data, particularly for users that may not have a secondary site with IT equipment. The AWS Storage Gateway is installed on a VMware host that is linked to an AWS account—providing an on-ramp to cloud storage. Volumes of up to 1TB in size (12 volumes per gateway maximum) are created and mounted by on-premises servers as iSCSI devices. Based on functionality available in the Beta version of AWS Storage Gateway, data written to your gateway-stored volumes is recorded on Drobo storage and asynchronously stored in Amazon S3 (Simple Storage Service) in the form of Amazon EBS (Elastic Block Store) snapshots. This guide provides the tested steps to sync data on Drobo iSCSI storage to the cloud for offsite backup using gateway-stored volumes. The information in this guide can be the foundation for leveraging other Amazon Web Services (AWS) for recovery in the cloud. For example, Amazon Route 53 service enables DNS updating so that users are pointed to the instance running in the cloud. It is also possible to create an Amazon EBS instance from an S3 backup, mount it with an Amazon EC2 instance, and restart the application completely from the cloud.
    [Show full text]
  • Cloud Storage Gateway
    Cloud Storage Gateway Overview Cloud Storage Gateway Overview Overview Product overview Cloud Storage Gateway (CSG) is a gateway that can be deployed in your IDC and on your Alibaba Cloud products. It uses Alibaba Cloud Object Storage Service (OSS) buckets as backend storage devices and provides on- and off-cloud applications with standard file services through the Network File System (NFS) and Common Internet File System (CIFS) protocol and block storage services through the Internet Small Computer Systems Interface (iSCSI) protocol. CSG supports two types of gateways: • File gateway File gateway uses OSS buckets as backend storage devices and maps the object directory structure of OSS buckets to the file system of Network Attached Storage (NAS). The CSG client can read and write all objects in an OSS bucket through the standard NFS and CIFS protocols. In addition, CSG provides higher bandwidth and lower latency, especially for the read/write performance of small files, and improves the compatibilities with the Portable Operating System Interface (POSIX) and third-party backup software. This type of gateway applies to enterprises with high performance and enterprise compatibility requirements. • Block gateway Block gateway creates storage volumes in OSS buckets and support block-level access through the iSCSI protocol. Local applications can access the volumes as the iSCSI targets. Block gateway provides the write-through and cache modes. In write-through mode, the data in block volumes is sliced and synchronized to the cloud. This mode applies to users who use high-speed links such as leased lines. In cache mode, ephemeral disks can be created for read/write acceleration and for asynchronization of data to the cloud.
    [Show full text]
  • Technical Report
    Technology Analysis Report Cloud Storage Gateways Kiran Srinivasan, ATG, CTO Office Shwetha Krishnan, ATG, CTO Office Monika Doshi, SPT, CTO Office Chris Busick, V-series product group Sonali Sahu, V-series product group Kaladhar Voruganti, ATG, CTO Office TABLE OF CONTENTS 1 Style examples (HEADING LEVEL 1, Arial bold 13 pt blue) Error! Bookmark not defined. 1.1 subsection (heading level 2, arial bold 11 pt black) Error! Bookmark not defined. 1.2 subsection (heading level 2) Error! Bookmark not defined. 1.3 subsection (heading level 2) Error! Bookmark not defined. 1.4 subsection (heading level 2) Error! Bookmark not defined. 2 Template use Error! Bookmark not defined. 2.1 Applying paragraph styles Error! Bookmark not defined. 2.2 Adding Graphics Error! Bookmark not defined. 2.3 Adding New Tables Error! Bookmark not defined. 2.4 styling Unformatted Tables Error! Bookmark not defined. 3 Appendices Error! Bookmark not defined. 3.1 Appendix title Error! Bookmark not defined. 3.2 Appendix title Error! Bookmark not defined. 4 References Error! Bookmark not defined. 5 Styles lists Error! Bookmark not defined. LIST OF TABLES Table 1) Example NetApp table with caption. ............................................... Error! Bookmark not defined. Table 2) Single-use styles............................................................................. Error! Bookmark not defined. Table 3) Authoring styles. ............................................................................. Error! Bookmark not defined. LIST OF FIGURES Figure 1) Insert name
    [Show full text]
  • NASPO Valuepoint Contract for Cloud Services
    NASPO ValuePoint Contract for Cloud Services ORDERING GUIDE 2/10/2020 Vendor Summary Strategic Communications is a national provider of Cloud services and solutions to State, Local and Educational (SLED) customers. Strategic is an Advanced Amazon Web Services (AWS) consulting partner specializing in Cloud Management and Migration Services. In addition to AWS, Strategic offers several other Cloud tools and services to maximize Cloud ROI and simplify hybrid IT management, such as Microsoft Azure, Cisco collaboration and security, Barracuda, Veeam, Zadara (storage as a service). Our Cloud Services team assists in every capacity from general IT network sustainment activities to the migration and management of entire Virtual Private Cloud (VPC) environments. Why do business with Strategic? • Full team of certified Cloud experts providing Cloud consulting services including Architecting, DevOps, Migrations and Security. • Currently support Cloud initiatives for Federal and SLED customers including USMC, DISA, Peace Corps, USPTO, Dept. of Veterans Affairs, Montgomery Co, MD and Oakland Co, MI. • Experience in developing secure Cloud environments for sensitive data including CJIS, PCI, HIPAA, FedRamp and FISMA. • Nationally certified Woman Business Enterprise (WBE) and Minority Business Enterprise (MBE). Vendor Contact Chris Mills Sales Director Direct: 502-657-3437 Email: [email protected] Strategic Communications, LLC 844-243-2053 [email protected] NASPO ValuePoint Contract Details Contract #: AR2490 Items to be Purchased: Cloud Solutions and Services Term of Contract: 9/30/2016 - 9/15/2026 Agencies Authorized to Purchase: All State, Local and Education (SLED) including: State Government Departments, Institutions, Agencies, Political Subdivisions (ex. Colleges, school districts, counties, cities, etc.), and, as applicable, nonprofit organizations, agencies of the federal government, or any other entity authorized by the laws of the State to participate in State Cooperative Contracts.
    [Show full text]
  • What Are the Benefits of Cloud Computing?
    What is Cloud Computing? Cloud computing is essentially infrastructure as a service. Using resources from distributed servers/computers, cloud computing frees you from the configuration of local servers. The cloud is another movement towards making computing a service that can be adjusted based on the needs of a business. For example, for a business in retail that might need to utilize a large number of servers during the holiday seasons, but not nearly as many after the holiday seasons, cloud computing is helpful by allowing the business to aggregate server usage based on their needs. Cloud computing has been gaining momentum, particularly in the SaaS environment. Organizations are quickly realizing the value in cutting costs through monthly subscriptions to software, rather than outright purchasing it and having it become obsolete. When newer versions of software become available, companies need to repurchase and sometimes increase the amount of infrastructure needed to support the new software. With cloud- hosted services, it is possible to utilize enterprise-level software through subscription, without worrying about the cost of infrastructure or upgrading to the latest version of software.. What are the benefits of Cloud Computing? Cloud Computing is helpful in multiple ways. The primary benefits are that: 1) Time to market is significantly reduced. 2) Overall cost savings in maintenance costs from having business-owned servers to maintain. Cloud computing services also generally have a much higher guarentee for up- time that a smaller company running its own servers usually cannot match. 3) Organizations can cut software licensing and administrative costs through utilizing online services in the cloud, such as SharePoint, Exchange Server, and Office Communications Server.
    [Show full text]
  • QNAP QTS 4.4.1 FILE/BLOCK CLOUD GATEWAY the FAST LANE CONNECTING ON-PREMISES and CLOUD DATA STORAGE Digital Transformation
    QTS 4.4.1 Cloud Storage Digital Transformation Gateway Outline 1 Demand And Problem of Hybrid Cloud Solution 2 QNAP’s Cloud Storage Gateway 3 File-based Cloud Gateway – HybridMount 4 Block-based Cloud Gateway – VJBOD Cloud 5 Use Scenario 6 Recommended NAS Models Hot data storage trends More hot data is accessed from the cloud • 80%+ organizations has hybrid-cloud environment and • Most businesses use multiple clouds More data is stored on the cloud • Backup, remote backup to the cloud • Cloud computing services The demand for cloud data backup Low latency access Integrate multiple 1 • Near-LAN access speeds 2 clouds • Use the same • Access different clouds using applications and standard the same mothod protocols Efficient Management Cost Saving 3 • Centrally manage multi clouds 4 • Centrally manage access • Reduce cloud storage used permission settings • Minimize network usage Benefits of cloud storage gateway Support more access protocols Near-LAN access speed Featuring protocol conversion, the Keep the frequently-accessed data in NAS Cloud Gateway allows you to access the cache space, allowing you to enjoy low-latency cloud storage using standard SMB, FTP, NFS, access to cached cloud files with near-LAN AFP, iSCSI protocols. Windows, MAC, Linux speeds via the Internet. users can all easily access the cloud. Cloud usage efficiency Minimize network usage cost Cloud Storage Gateway fully integrates with When many users need to access the same public cloud storage to centrally store data file, they can access the cached file instead of generated from multiple locations with the each downloading a copy, greatly reducing flexibility and convenience of cloud storage network usage charges.
    [Show full text]