Research Report

Total Page:16

File Type:pdf, Size:1020Kb

Load more

RZ 3783 (# Z1010-001) 10/21/2010 Computer Science 6 pages Research Report Dependable Storage in the Intercloud C. Cachin, R. Haas, M. Vukolić IBM Research – Zurich 8803 Rüschlikon Switzerland LIMITED DISTRIBUTION NOTICE This report will be distributed outside of IBM up to one year after the IBM publication date. Some reports are available at http://domino.watson.ibm.com/library/Cyberdig.nsf/home. Research Almaden • Austin • Beijing • Delhi • Haifa • T.J. Watson • Tokyo • Zurich Dependable Storage in the Intercloud∗ Christian Cachin Robert Haas Marko Vukolic´ IBM Research - Zurich IBM Research - Zurich IBM Research - Zurich [email protected] [email protected] [email protected] Abstract like multi-tenancy entail vulnerabilities. More specifi- cally, often cited problems include data confidentiality The cloud computing paradigm with its elastic pay- and integrity, but also reliability and consistency of the as-you-go model, “infinite” scalability and “always-on” contracted service (we collectively refer to these four di- availability arguably changes the landscape of services mensions as CIRC). and systems. However, so far, cloud proliferation has not We believe that a promising solution for improved lived up to expectations in the enterprise segment. Often cloud security and dependability lies in the Intercloud1, cited issues include confidentiality and integrity, but also the cloud of clouds, and goes beyond adding perfection reliability and consistency. to single, isolated clouds. In this paper, we first argue In this paper, we argue for the Intercloud as the sec- for the Intercloud as the second layer in the dependable ond layer in the cloud computing stack, with the goal of cloud computing stack for the next-generation cloud. building more dependable cloud services and systems. In The upcoming Intercloud and today’s single-provider the Intercloud layer, we foresee client-centric distributed clouds are two separate layers in the cloud computing protocols to complement more provider-centric, large- stack of tomorrow (Fig. 1) that complement each other. scale ones in the (Intra)cloud layer. These client-centric The Intercloud offers promising solutions for enhanced protocols orchestrate multiple clouds to boost depend- dependability. Secondly, we present the design of a ser- ability by leveraging inherent cloud heterogeneity and vice in the Intercloud, which exploits the unique features failure independence. of this model: An Interclud storage (ICStore) service that We also discuss the design of Intercloud storage, is currently under development and addresses the CIRC which we currently are implementing, as a primer for dimensions through a layered architecture (Sec. 3). dependable services in the Intercloud. Intercloud Stor- age precisely addresses and improves the CIRC attributes (confidentiality, integrity, reliability and consistency) of 2 Dependable Cloud Computing Stack today’s cloud storage services. In this section, we first overview the single-domain cloud layer and its dependability limitations and then argue for 1 Introduction looking at Intercloud for solutions. Cloud computing promises to the client an elastic pay- 2.1 Single-Domain Cloud and Limitations as-you-go model, “infinite” scalability and “always-on” availability, which renders it appealing for data and com- This layer encompasses most of the cloud computing putation outsourcing, both for consumers that want to systems to date, and consists of distributed protocols de- share their pictures with friends and for enterprises that signed to run in a single administrative domain, typically want to reduce their IT budgets. under the control of one service provider (e.g., Amazon 2 3 4 However, there are obvious dependability and security AWS , Google Apps , Nirvanix ). Distributed protocols concerns associated with outsourcing data and computa- used in this context are intended for wide-area systems, tion to a potentially untrusted third-party (cloud). Even 1http://www.google.com/search?q=intercloud if the cloud provider is itself trusted by the client, issues 2http://aws.amazon.com/ 3http://www.google.com/a/ ∗IBM Research Report RZ 3783, May 28, 2010. 4http://www.nirvanix.com/ 1 ity issues, we propose to look at the Intercloud. Client Dependability Confidentiality Intercloud Integrity 2.2 Intercloud Layer Reliability Consistency We advocate to leverage a multitude of cloud providers Scalability for addressing dependability issues and limitations of Single-domain cloud High availability isolated single-domain clouds. These multiple cloud providers form the Intercloud, which we expect to be- Cloud computing layer Focal goals come an increasingly relevant layer in the cloud comput- ing model at large, which resides on top of the single- Figure 1: Dependable cloud computing stack. domain cloud layer. The Intercloud layer offers a unique environment for building dependable services. Consider, for example, with scalability to a very large number of clients and high fault-tolerance as one of the key aspects of dependabil- availability as their most important goals [18]. ity. A fundamental assumption, on which virtually all The dependability and security of a single-domain fault-tolerant dependable systems rely, is the failure in- cloud, especially its integrity, confidentiality, and isola- dependence assumption. This assumption comes in dif- tion for data and computations in a multi-tenant model, ferent flavors, ranging from classical threshold failure as- are receiving increased attention (e.g., [5, 16]). However, sumptions to non-threshold failure models (e.g., [12]). In devising a dependable service while relying on offerings the first case, failure independence is reflected through of a single cloud provider P has its inherent limitations, the assumption that only the number of faulty processes since all trust in the system reduces to trusting P . Con- counts, i.e., up to t but not t + 1 or more processes may sider for example, encryption as the classical way for fail; in the second case, failure independence is assumed achieving data confidentiality. Encryption creates keys across different fault-prone sets. However, the cover- to be managed: but if a client solely relies on offerings age of this assumption in practice is sometimes small. of provider P , it would have to store encryption keys This remains a weak point of many dependable systems, through a service offered by provider P as well, which and results in the assumption often being criticized. In immediately defeats the benefits of encryption. On the this aspect, the Intercloud is without precedent: it comes other hand, we consider storing the encryption keys lo- with diversity in geographical locations, power supplies, cally at fault-prone clients to be an unacceptable solu- internal cloud architectures, separate administrative do- tion, since losing a key implies losing the encrypted data. mains and different proprietary middleware and applica- Moreover, when data and computation are outsourced to tion implementations. Best of all, this diversity comes to an untrusted cloud, integrity of data and computation can the client essentially for free, because the maintenance be guaranteed only to a certain extent [7]. of such diversified (yet semantically similar) services is Other limitations in relying on a single cloud not the responsibility of a client, but is in the hands provider’s services are related to data reliability and of the separate cloud providers. Since cloud-provided consistency. While clouds are designed to be highly resources are a commodity, their cost is absorbed by available, outages may and do occur at any individual many clients for different tasks. In contrast, maintain- provider (see, e.g., [1] for details). In addition, the net- ing enough diversity for a single task “in-house,” which work to a cloud provider remains a single point of fail- could include (but is not limited to) hardware and operat- ure, especially in the case of cloud providers that do not ing systems diversity, n-version programming and soft- geographically diversify their services. Moreover, net- ware maintenance, and administration know-how, is pro- work connections are particularly vulnerable when the hibitively expensive. Furthermore, trusting the ensemble client resides outside North America and Western Eu- of diversified clouds by distributing trust across differ- rope, where high-bandwidth connections might not be ent cloud domains is an appealing alternative to trusting readily available. Finally, eventual consistency offered (possibly critical) data to a single cloud provider. by many cloud providers, which comes as a byproduct Clearly, the Intercloud layer does not replace the of high availability goals [18], might not be sufficient for single-cloud layer, but greatly expands its scope. We ex- some applications. Single-cloud solutions may give an pect that dependable protocols in the Intercloud will be incentive for a client to locally cache data, in order to client-centric first, where client-side proxies orchestrate avoid consistency problems. But this complicates con- multiple clouds. This will be followed by more sophis- current access to the service or may completely defeat ticated services involving communication among differ- the very purpose of outsourcing data to the cloud. ent cloud services (this is not easily possible today due To cope with these and other single-cloud dependabil- to lack of standardization). We envisage that protocols 2 in the Intercloud add considerable value over the single cloud,
Recommended publications
  • Software As a Service

    Software As a Service

    Software as a Service Haojie Hang Ogheneovo Dibie Executive Summary • In this presentation, we go through the Software as a Service Methodology, examine its benefits and drawbacks and talk about two state-of-art SaaS systems– Amazon Web Service and Google App Engine • We also look into Service Oriented Architecture powering SaaS applications and its impact on modern web 2.0 applications • Finally, we examine hybrids of traditional and SaaS applications Overview • What is Software as a Service (SaaS) • Background o Brief history o Concept o Big picture o Related terms • Computing Today o SasS is everywhere o The SaaS Market • Benefits of SaaS • Drawbacks of SaaS o Robustness o Privacy o Security o Reliability • Service Oriented Architectures (SOA) o Guiding principles of SOA • Case studies o Amazon Web Services (AWS) o Google App Engine • Influence of SOA on Web 2.0 development o Zend Framework • Hybrids of Traditional and SaaS applications o Dropbox o Microsoft Office • Summary • References What is SaaS? • Definition: Software as a Service (SaaS), a.k.a. on- demand software, is a software delivery model in which software and its associated data are hosted centrally and accessed using a thin-client, usually a web browser over the internet. – Wikipedia • Simply put, SaaS is a method for delivering software that provides remote access to software as a web- based service. The software service can be purchased with a monthly fee and pay as you go. What is SaaS? • Where does the term SaaS come from? o The SAAS acronym allegedly first appeared
  • Hybrid Cloud Storage Products

    Hybrid Cloud Storage Products

    Build aHybridStorageCloud services and possible pitfalls. This guide can help you make thosedecisions. services make pitfalls.Thisguidecanhelpyou andpossible products, ontheavailable choicesandeducate themselves tomake require users data bothofthesemethodsstoring ofusingthecloudforstorage; common way couldbecomethemost Combining publiccloudservices andon-premisesstorage VIRTUALIZATION CLOUD APPLICATION DEVELOPMENT NETWORKING STORAGE ARCHITECTURE DATA CENTER MANAGEMENT BUSINEss INTELLIGENCE/APPLICATIONS DISASTER RECOVERY/COMPLIANCE SECURITY S MOD HYBRID CLOUD 4 PROS A HYBRID CLOUD 3 S HYBRID CLOUD 2 NoT EDITor’s 1 Guide An Essential TILL HASW TORAG N E D CO PRODU E N E AK S SP C TS OTS E L EDITor’S NOTE 1 Building the Bridge: Making Hybrid Clouds a Reality IT managers who want to take advantage of com- awareness and bandwidth issues are among the items Home petitive cloud pricing, and the promise of elasticity that will factor into the decision process. While pub- that comes with public clouds, will almost always be- lic cloud storage brings the potential for big savings, it Editor’s Note gin their journey to the cloud with a hybrid model. A also presents latency problems; private cloud storage hybrid cloud model is not only the most likely start- is limited to private data centers and it requires the IT Hybrid Cloud ing point for an organization, but it is also often the manager to guarantee scalability at a time when unprec- Storage Products framework they decide on as a lasting strategy. That’s edented volumes of unstructured data are produced. because it allows a combination of on-site cloud storage this Essential Guide to building a hybrid storage cloud Hybrid Cloud Pros and Cons and public cloud storage to accommodate varying needs offers sophisticated analysis, discusses hybrid cloud throughout an organization for data access and speed of storage models for various needs, and answers key Hybrid Cloud Model delivery.
  • Cloud Storage: Adoption, Practice and Deployment

    Cloud Storage: Adoption, Practice and Deployment

    Cloud Storage: Adoption, Practice and Deployment An Outlook Report from Storage Strategies NOW April 4, 2011 By Deni Connor, Patrick H. Corrigan and James E. Bagley Client Relations: Phylis Bockelman Storage Strategies NOW 8815 Mountain Path Circle Austin, Texas 78759 (512) 345-3850 SSG-NOW.COM Note: The information and recommendations made by Storage Strategies NOW, Inc. are based upon public information and sources and may also include personal opinions both of Storage Strategies NOW and others, all of which we believe are accurate and reliable. As market conditions change however and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. Storage Strategies NOW, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document. This report is purchased by Gluster for distribution only to its customers and prospects. Copyright 2011. All rights reserved. Storage Strategies NOW, Inc. 1 Sponsors ......................................................................................................................................................................................... 4 What is cloud storage? ....................................................................................................................................................................5
  • Cloud Providers Viability: How to Address It from an IT and Legal Perspective?

    Cloud Providers Viability: How to Address It from an IT and Legal Perspective?

    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Open Repository and Bibliography - Luxembourg Cloud Providers Viability: How to Address it from an IT and Legal Perspective? B Cesare Bartolini1( ), Donia El Kateb1, Yves Le Traon1, and David Hagen2 1 Interdisciplinary Centre for Security, Reliability and Trust (SnT), Universit´e du Luxembourg, Luxembourg, Luxembourg {cesare.bartolini,donia.elkateb,yves.letraon}@uni.lu 2 Commission de Surveillance du Secteur Financier (CSSF), Luxembourg, Luxembourg [email protected] Abstract. A major part of the commercial Internet is moving towards a cloud paradigm. This phenomenon has a drastic impact on the orga- nizational structures of enterprises and introduces new challenges that must be properly addressed to avoid major setbacks. One such challenge is that of cloud provider viability, that is, the reasonable certainty that the Cloud Service Provider (CSP) will not go out of business, either by filing for bankruptcy or by simply shutting down operations, thus leaving its customers stranded without an infrastructure and, depending on the type of cloud service used, even without their applications or data. This article attempts to address the issue of cloud provider viability, propos- ing some ways of mitigating the problem both from a technical and from a legal perspective. Keywords: Cloud computing · Provider bankruptcy · Law 1 Introduction In November 2013, an alarm rang. Nirvanix, a major provider of cloud storage services operating in California, closed down its business with very little antic- ipation to allow its customers to recover their cloud-stored assets. This sudden event wroke havoc in the cloud community, and revealed a significant weakness of the cloud-based business model: once an enterprise outsources services and data to a cloud provider, it is no longer in control of them, and can suffer from adverse conditions occurring to the cloud provider.
  • Research on Cloud Storage Architecture and Key Technologies

    Research on Cloud Storage Architecture and Key Technologies

    Research on Cloud Storage Architecture and Key Technologies Wenying Zeng1, 2 Yuelong Zhao1, Kairi Ou1 Wei Song1, 3 1: School of Computer Science and 1: School of Computer Science and Engineering, 1: School of Computer Science and Engineering, South China University of Technology, Engineering, South China University of Technology, Guangzhou 510640, P.R. China South China University of Technology, Guangzhou 510640, P.R. China 2: School of Computer Engineering Guangzhou 510640, P.R. China 3: School of Computer, Guangdong and Technology, Guangdong Institute [email protected] University of Technology, Guangzhou of Science and Technology, Zhuhai 510640, P.R. China 519090, P.R. China [email protected] [email protected] ABSTRACT mode, which organize and schedule service based on the Internet. This paper proposes a general architecture of cloud storage system, Cloud storage is one of the services which provide storage analyzes the functions of the components, and discusses the key resource and service based on the remote storage servers based on technologies, etc. Cloud storage is a novel storage service mode cloud compting. Cloud storage will be able to provide storage which the service providers supply storage capacities and data service at a lower cost and more reliability and security. storage services through the Internet to the clients; meanwhile, the Cloud storage system is a cooperation storage service system with clients needn’t know the details and lowered structures and multiple devices, many application domains, and many service mechanisms. The proposed architecture of cloud storage is forms. The development of cloud storage system is benefit from layered and cooperative, and the discussed key technologies the broadband network, Web 2.0, storage virtualization, storage involve deployment, storage virtualization, data organization, network, application storage integrated with servers and storage migration, security, etc.
  • David Beats Goliath in the Battle in the Clouds Nirvanix Winning Storage Cloud Customers Against EMC and Amazon

    GmbH Enterprise Servers, Storage and Business Continuity David Beats Goliath in the Battle in the Clouds Nirvanix winning storage cloud customers against EMC and Amazon Josh Krischer Introduction Currently, Cloud Computing is the most abused subject in the industry. There is no vendor presentation or event without mentioning Cloud Computing. Companies that two years ago emphasized SOA, today, without changing a single chip or line of code, are placing new “cloud ready” stickers on their products. So, what is Cloud Computing? A University of Berkley paper1 defines: “Cloud Computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. The services themselves have long been referred to as Software as a Service (SaaS). The datacenter hardware and software is what we will call a Cloud.” There are three major models of clouds: public clouds, private clouds and hybrid clouds. Public clouds offer their service over a public network and can be segmented as: o consumer use, such as social networks (e.g., Facebook, Twitter), o public applications (e.g., email provider, Google apps), and o public enterprise clouds (e.g., Amazon S3, Rackspace Hosting) Private clouds deliver services for organizations internally behind a VPN. Hybrid clouds combine the public and private clouds, e.g., an organization uses an internal cloud to access an ERP application, but an external provider for email services. The business model of the first two options of public clouds is simple, general access, no or low charges, and low SLA levels. The public enterprise cloud is a different story: It needs to 1 Above the Clouds: A Berkeley View of Cloud Computing.
  • Guia Metodologica Para La Adquisicion De La Tecnologia Cloud Computing En Las Pymes

    Guia Metodologica Para La Adquisicion De La Tecnologia Cloud Computing En Las Pymes

    GUIA METODOLOGICA PARA LA ADQUISICION DE LA TECNOLOGIA CLOUD COMPUTING EN LAS PYMES JORGE DIAZ MARTINEZ BELKIS GUELL MUÑOZ KEVIN IBAÑEZ PINZON CORPORACIÓN UNIVERSITARIA DE LA COSTA CUC ESPECIALIZACIÓN DE AUDITORÍA EN SISTEMAS DE INFORMACIÓN BARRANQUILLA 2011 1 GUIA METODOLOGICA PARA LA ADQUISICION DE LA TECNOLOGIA CLOUD COMPUTING EN LAS PYMES JORGE DIAZ MARTINEZ BELKIS GUELL MUÑOZ KEVIN IBAÑEZ PINZON Trabajo de grado presentado como requisito para optar al título de Especialista en Auditoría de Sistemas de Información Director: Ing. VICTOR MANUEL MONTAÑO ARDILA CORPORACIÓN UNIVERSITARIA DE LA COSTA CUC ESPECIALIZACIÓN DE AUDITORÍA DE SISTEMAS DE INFORMACIÓN BARRANQUILLA 2011 2 PAGINA DE ACEPTACION Nota de aceptación ______________________________ ______________________________ ______________________________ ______________________________ ______________________________ Jurado ______________________________ Jurado Barranquilla, Octubre de 2011 3 RESUMEN En la actualidad los recursos tecnológicos hacen parte de las empresas y de los hogares, ya que se ha convertido en la mejor clave para llevar a cabo muchas tareas. Las pequeñas y medianas empresas también llamadas PYMES para realizar una gran parte de sus actividades diarias como producción y comercialización, hasta comunicaciones internas y externas y cualquier otra faceta; necesitan de la tecnología. A partir de lo anterior, una de las tecnologías más llamativas por las PYMES es la utilización de Cloud Computing el cual consiste en un modelo inspirado en la idea de disponer de infraestructuras tecnológicas de modo que los recursos informáticos sean compartidos dinámicamente, se encuentren virtualizados y resulten accesibles como un servicio. Teniendo en cuenta todos esos beneficios, el propósito de la presente investigación consiste en realizar una guía metodológica que sirva como base al momento en que las PYMES deseen adquirir esta tecnología.
  • Storage Explained: Cloud Storage Defined

    Storage Explained: Cloud Storage Defined

    « Tech Report Storage Explained: Cloud storage defined By Carol Sliwa, Features Writer At its most basic, the term "cloud storage" describes data storage that is made available as a service via a network. But that definition is so broad that it can encompass everything from Internet-based services that store a consumer's email and digital photographs to a major corporation's backup data. This learning guide will supply readers with a cloud storage case study, explain the difference between cloud storage and cloud service, and provide a look at the future of cloud storage. Sponsored by: «Tech Report: Cloud Storage Defined Cloud storage criteria There could be hundreds of cloud storage offerings or just a handful, depending on how broadly or narrowly one defines the term. Either way, the numbers are expected to grow this year, as cloud storage continues its skyward trajectory. "The problem with cloud storage is it's so much in its infancy that the term is wide open to interpreta - tion," said George Crump, founder of Storage Switzerland LLC, a Fort Worth, Texas-based consulting firm. In the interest of clarification, industry analysts who deal with corporate IT professionals have been refining the definition of cloud storage to incorporate the following characteristics: -- Massively scalable -- Not tied to a specific geographic location -- Based on commodity components -- Billed on a usage basis, as in 15 cents per gigabyte -- Application agnostic Software as a Service (SaaS) offerings, such as Salesforce.com and Google Apps, would not qualify as cloud storage, even though they do afford users the ability to store data.
  • Falconstor Transcends Both Physical and Virtual Boundaries with New Vmware Initiative

    Falconstor Transcends Both Physical and Virtual Boundaries with New Vmware Initiative

    FalconStor Transcends both Physical and Virtual Boundaries with new VMware Initiative VMware ESX Server and its latest vSphere software release have become instrumental in helping organizations tame server hardware costs within data centers while improving the ROI associated with existing and new projects. But this isn’t to say that virtualization doesn’t come with any pain points–and managing virtual storage infrastructures is one of the biggest. So to help combat these challenges, FalconStor Software today announced at VMworld 2009 a comprehensive VMware Initiative that will help organizations bridge their physical and virtual infrastructures and provide continuous availability in multi-vendor storage environments. Many of the emerging pain points within virtual storage infrastructure concern the enablement of high availability in VMware environments. Despite VMware’s virtualization capabilities, many of VMware’s high availability features depend on a highly available storage infrastructure that VMware does not directly address. Backup pains are exasperated in growing virtual environments as physical and virtual server infrastructures often demand different backup techniques. As a result, they are managed separately with little commonality in their data protection or disaster recovery approaches. However this is not a long-term strategy as standardized, common interface to the storage infrastructure is becoming a necessity in order to effectively deploy server virtualization. Further, these standardized interfaces need to encompass remote and branch offices (ROBOs) as well as small and medium businesses (SMBs), as they are the ones that can least afford to make significant storage investments. In light of these emerging enterprise, ROBO and SMB requirements, FalconStor today introduced a new VMware Initiative that focuses in on four areas.
  • The Treacherous 12 Cloud Computing Top Threats in 2016

    The Treacherous 12 Cloud Computing Top Threats in 2016

    Top Threats Working Group The Treacherous 12 Cloud Computing Top Threats in 2016 February 2016 CLOUD SECURITY ALLIANCE The Treacherous 12 - Cloud Computing Top Threats in 2016 The permanent and official location for Cloud Security Alliance Top Threats research is https://cloudsecurityalliance.org/group/top-threats/ © 2016 Cloud Security Alliance – All Rights Reserved All rights reserved. You may download, store, display on your computer, view, print, and link to The Treacherous 12 - Cloud Computing Top Threats in 2016 athttps://cloudsecurityalliance.org/download/the-treacherous-twelve- cloud-computing-top-threats-in-2016/, subject to the following: (a) the Report may be used solely for your personal, informational, non-commercial use; (b) the Report may not be modified or altered in any way; (c) the Report may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the Report as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to The Treacherous 12 - Cloud Computing Top Threats in 2016. © 2016, Cloud Security Alliance. All right reserved. 1 CLOUD SECURITY ALLIANCE The Treacherous 12 - Cloud Computing Top Threats in 2016 Contents Acknowledgments................................................................................................................................ 4 Executive Summary.............................................................................................................................
  • Compensation Using Facts Controller

    Compensation Using Facts Controller

    ISSN: 2277–3061 (online) International Journal of Computers & Technology Volume 2 No. 3, June, 2012 Cloud Computing: An Internet Based Computing Hardeep Singh1 Student Abstract— Present paper focuses on the overview of Cloud 2007 saw increased activity, with Google, IBM, and a Computing. Cloud Computing is an Internet-based number of universities embarking on a large scale cloud computing; where resources, software and information are computing research project, around the time the term provided to computers on-demand, like a public utility; is started gaining popularity in the mainstream press. It was emerging as a platform for sharing resources like a hot topic by mid-2008 and numerous cloud computing infrastructure, software and various applications. This events had been scheduled. paper does a literature survey on some of the prominent In August 2008, Gartner Research observed that applications of Cloud Computing, and how they meet the "organizations are switching from company-owned requirements of reliability, availability of data, scalability of software and hardware systems and overall customer hardware and software assets to per-use service-based satisfaction. models" and that the "projected shift to cloud computing will result in dramatic growth in IT products in some I. INTRODUCTION areas and in significant reductions in other areas." As a metaphor for the Internet, "the cloud" is a Imagine yourself in the world where the users of the familiar cliché, but when combined with "computing", computer of today’s internet world don’t have to run, the meaning gets bigger and fuzzier. Some analysts and install or store their application or data on their own vendors define cloud computing narrowly as an updated computers, imagine the world where every piece of your version of utility computing: basically virtual servers information or data would reside on the Cloud (Internet).
  • Cloud Storage: Adoption, Practice and Deployment

    Cloud Storage: Adoption, Practice and Deployment

    Cloud Storage: Adoption, Practice and Deployment An Outlook Report from Storage Strategies NOW April 4, 2011 By Deni Connor, Patrick H. Corrigan and James E. Bagley Client Relations: Phylis Bockelman Storage Strategies NOW 8815 Mountain Path Circle Austin, Texas 78759 (512) 345-3850 SSG-NOW.COM Note: The information and recommendations made by Storage Strategies NOW, Inc. are based upon public information and sources and may also include personal opinions both of Storage Strategies NOW and others, all of which we believe are accurate and reliable. As market conditions change however and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. Storage Strategies NOW, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendations presented herein, nor for any inadvertent errors which may appear in this document. This report is purchased by VaultLogix for distribution only to its customers and prospects. Copyright 2011. All rights reserved. Storage Strategies NOW, Inc. 1 Sponsors ......................................................................................................................................................................................... 4 What is cloud storage? ....................................................................................................................................................................5