Migrating Enterprise Storage Applications to the Cloud
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Provable Ownership of Encrypted Files in De-Duplication Cloud Storage
1 Provable Ownership of Encrypted Files in De-duplication Cloud Storage Chao Yangy z, Jianfeng May and Jian Renz ySchool of CS, Xidian University Xi’an, Shaanxi, 710071. Email: fchaoyang, [email protected] zDepartment of ECE, Michigan State University East Lansing, MI 48824. Email: fchaoyang, [email protected] Abstract—The rapid adoption of cloud storage services has tells a client that it does not have to upload the file, it created an issue that many duplicated copies of files are stored in means that some other clients have the same file, which the remote storage servers, which not only wastes the communica- could be a sensitive information [5]. More seriously, Halevi tion bandwidth for duplicated file uploading, but also increases the cost of security data management. To solve this problem, et al. recently found some new attacks to the client-side client-side deduplication was introduced to avoid the client from deduplication system [6]. In these attacks, by learning just uploading files already existed in the remote servers. However, the a small piece of information about the file, namely its hash existing scheme was recently found to be vulnerable to security value, an attacker is able to get the entire file from the server. attacks in that by learning a small piece of information related These attacks are not just theoretical. Some similar attacks to the file, such as the hash value of the file, the attacker may be able to get full access of the entire file; and the confidentiality that were implemented against Dropbox were also discovered of the date may be vulnerable to “honest-but-curious” attacks. -
A Backup-As-A-Service (Baas) Software Solution
Universidade de Brasília Institute of Exact Sciences Department of Computer Science A Backup-as-a-Service (BaaS) Software Solution Heitor M. de Faria Dissertation presented as partial requirement for conclusion on the Professional Master in Applied Computing Advisor Prof. Dra. Priscila Solis Brasília 2018 Universidade de Brasília Institute of Exact Sciences Department of Computer Science A Backup-as-a-Service (BaaS) Software Solution Heitor M. de Faria Dissertation resented as partial requirement for conclusion do Professional Master in Applied Computing Prof. Dra. Priscila Solis (Advisor) CIC/UnB Prof. Dr. Jacir Bordim Dr. Georges Amvame-Nzê Universidade de Brasília Universidade de Brasília Prof. Dr. Marcelo Ladeira Coordinator of the Post-graduation Program in Applied Computing Brasília, July 1st, 2018 Abstract Backup is a replica of any data that can be used to restore its original form. However, the total amount of digital data created worldwide more than doubles every two years and is expected reach 44 trillions of gigabytes in 2020, bringing constant new challenges to backup processes. Enterprise backup is one of the oldest and most performed tasks by in- frastructure and operations professionals. Still, most backup systems have been designed and optimized for outdated environments and use cases. That fact, generates frustration over currently backup challenges and leads to a greater willingness to modernize and to consider new technologies. Traditional backup and archive solutions are no longer able to meet users current needs. The ideal modern currently backup and recovery software product should not only provide features to attend a traditional data center, but also allow the integration and exploration of the growing Cloud, including “backup client as a service” and “backup storage as a service”. -
Jungledocs Documentation Release V1.0.1
jungledocs Documentation Release v1.0.1 Sarah Scott Jul 24, 2017 Table Of Contents 1 What Is Jungle Disk? 1 1.1 Backup Solutions.............................................1 2 Setting Up Jungle Disk 3 2.1 System Requirements..........................................3 2.2 Installation................................................4 2.3 Administrator Setup...........................................7 3 Introduction to the Jungle Disk Client 13 3.1 Agent................................................... 13 3.2 Activity Monitor............................................. 18 3.3 Application Settings........................................... 20 3.4 Settings File............................................... 28 4 Backup Solutions 31 4.1 Network Drive.............................................. 31 4.2 Backup Vault............................................... 32 5 The Network Drive 33 5.1 Network Drive.............................................. 35 5.2 Local Drive Mapping........................................... 37 5.3 Previous Versions............................................ 39 6 Simple Backup 43 6.1 Simple Backup.............................................. 44 6.2 Backup Job................................................ 45 7 The Backup Vault 51 7.1 Backup Vault............................................... 54 7.2 Backup Job................................................ 54 7.3 Previous Versions............................................ 59 8 How Does The Backup Process Work? 61 8.1 Data De-Duplication.......................................... -
The Web ICT Systems for Business Networking Vito Morreale
ICT Systems for Business Networking Vito Morreale The Web ICT Systems for Business Networking Vito Morreale Note. The content of this document is mainly drawn from Wikipedia [www.wikipedia.org] and follows GNU Free Documentation License (GFDL), the license through which Wikipedia's articles are made available. The GNU Free Documentation License (GFDL) permits the redistribution, creation of derivative works, and commercial use of content provided its authors are attributed and this content remains available under the GFDL. Material on Wikipedia (and this document too) may thus be distributed multilingually to, or incorporated from, resources which also use this license. Table of contents 1 INTRODUCTION ................................................................................................................................................ 3 2 HOW THE WEB WORKS .................................................................................................................................. 4 2.1 PUBLISHING WEB PAGES ....................................................................................................................................... 4 2.2 SOCIOLOGICAL IMPLICATIONS ................................................................................................................................ 5 3 UNIFORM RESOURCE IDENTIFIER (URI) ................................................................................................. 5 4 HYPERTEXT TRANSFER PROTOCOL (HTTP) ........................................................................................ -
August 2009 Volume 34 Number 4
AUGUST 2009 VOLUME 34 NUMBER 4 OPINION Musings 2 Rik Farrow FILE SYSTEMS Cumulus: Filesystem Backup to the Cloud 7 Michael VR able, SteFan SaVage, and geoffrey M. VoelkeR THE USENIX MAGAZINE PROGRAMMinG Rethinking Browser Performance 14 leo MeyeRoVich Programming Video Cards for Database Applications 21 tiM kaldewey SECURITY Malware to Crimeware: How Far Have They Gone, and How Do We Catch Up? 35 daVid dittRich HARDWARE A Home-Built NTP Appliance 45 Rudi Van dRunen CoLUMns Practical Perl Tools: Scratch the Webapp Itch with CGI::Application, Part 1 56 daVid n. blank-edelMan Pete’s All Things Sun: T Servers—Why, and Why Not 61 PeteR baeR galVin iVoyeur: Who Invited the Salesmen? 67 daVe JoSePhSen /dev/random 71 RobeRt g. Ferrell BooK REVIEWS Book Reviews 74 elizabeth zwicky et al. USEniX NOTES USENIX Lifetime Achievement Award 78 STUG Award 79 USENIX Association Financial Report for 2008 79 ellie young Writing for ;login: 83 ConfERENCES NSDI ’09 Reports 84 Report on the 8th International Workshop on Peer-to-Peer Systems (IPTPS ’09) 97 Report on the First USENIX Workshop on Hot Topics in Parallelism (HotPar ’09) 99 Report on the 12th Workshop on Hot Topics in Operating Systems (HotOS XII) 109 The Advanced Computing Systems Association aug09covers.indd 1 7.13.09 9:21:47 AM Upcoming Events 22n d ACM Sy M p o S i u M o n op e r A t i n g Sy S t e ms 7t H uSENIX Sy M p o S i u M o n ne t w o r k e d Sy S t e ms prinCipleS (SoSp ’09) de S i g n A n d iM p l e M e n t A t i o n (nSDI ’10) Sponsored by ACM SIGOPS in cooperation with USENIX Sponsored -
Cal Anderson, OTARMA IT Risk Control Specialist
2019 CYBER PRESENTATION Cal Anderson, OTARMA IT Risk Control Specialist Cal Anderson Bio • 20 plus years of industry experience in Information Systems, Cyber Security & Risk Management • Specialize in performing Cyber Security, SOX IT, enterprise IT audits and enterprise IT risk assessments of Fortune 500, mid‐range and small scale IT environments. • Specialize in Data Governance, Data validation and flowcharting business processes from beginning to end. • Certified: CISA, CRISC, CWM, CSQL • Certified Notary Public for the state of Ohio Goal • Provide overview of IT Risk Control Specialist function • Provide overview of the IT Risk assessment process • Provide overview of IT Risk Control Specialist function conducting training and providing IT information to the OTARMA member bases. • Provide comprehensive Cyber Security educational content for managing cyber threats. 1 IT RISK CONTROL SPECIALIST FUNCTION High‐Level Tasks perform by the IT Risk Control Specialists: • Conduct IT Risk Assessment o Identification/PII Risks o Analyze risks and how it will affect the member • Risk Evaluation o Costs o Legal Requirements o Environmental Factors o Members handling of risks • Provide recommendations to address IT issues and deficiencies. • Consult with members to answer their questions and to educate/promote awareness. • Conduct IT training IT Risk Assessment Process Members Base Management o Visit Scheduling o Visit Confirmation Onsite IT Risk Assessment o Assessment o Activities Member Base Management Visit Scheduling o Call or email member -
Bsync: Sistema Extensible Para La Sincronizaci´Ony Copia De Seguridad De ficheros Para Su Uso En Organizaciones
Escuela Polit´ecnicaSuperior Departamento de Inform´atica Proyecto de Fin de Carrera bsync: Sistema extensible para la sincronizaci´ony copia de seguridad de ficheros para su uso en organizaciones Javier Torres Ni~no Tutores Juan Miguel G´omezBerb´ıs Alejandro Rodr´ıguezGonz´alez 28 de Julio de 2011 2 Resumen En la actualidad existen muchos sistemas de sincronizaci´ony copia de segu- ridad de ficheros, pero la mayor´ıade ellos no comercializan el producto, optando por comercializar los servicios ofrecidos por medio de estos. Esto impide el uso de estas herramientas a entidades que necesiten que sus datos no salgan de su entorno, por lo que el objetivo de este Proyecto de Fin de Carrera es el dise~no y desarrollo de un sistema similar a estos otros productos. Se analizan las caracter´ısticasde los competidores, y se dise~naun programa que incluye en el n´ucleolas caracter´ısticasb´asicasy sea capaz de incluir to- das las caracter´ısticasadicionales mediante el uso de extensiones o plugins. Es precisamente esta extensibilidad la que caracteriza el sistema, permitiendo que un mismo producto pueda adaptarse a las necesidades de multitud de clientes, que pueden precisar, por ejemplo, de distintos sistemas de autenticaci´on(para integrar el sistema en la arquitectura existente) o utilizar la infraestructura para sincronizar m´asque ficheros. Palabras clave: sincronizaci´on,copia de seguridad, extensibilidad, plugins, sistemas distribuidos 3 4 Agradecimientos Es impensable dejar este proyecto sin unas breves l´ıneas en las que agradecer a todas las personas que me han soportado durante estos ´ultimoscinco a~nos,y especialmente los ´ultimosmeses. -
Cloud Providers
Basics of Cloud Computing – Lecture 2 Cloud Providers Satish Srirama Outline • Cloud computing services – recap • Amazon cloud services – Elastic Compute Cloud (EC2) – Storage services - Amazon S3 and EBS • Cloud managers • Eucalyptus 20/02/2018 Satish Srirama 2/40 Cloud Computing - Services • Software as a Service – SaaS Level of – A way to access applications Abstraction hosted on the web through your web browser SaaS • Platform as a Service – PaaS Facebook, Flikr, Myspace.com, – Provides a computing platform Google maps API, Gmail and a solution stack (e.g. LAMP) as a service PaaS • Infrastructure as a Service – Google App Engine, IaaS Force.com, Hadoop, Azure, – Use of commodity computers, Heroku, etc distributed across Internet, to IaaS perform parallel processing, distributed storage, indexing and Amazon EC2, Rackspace, mining of data GoGrid, SciCloud, etc. – Virtualization 20/02/2018 Satish Srirama 3/40 Cloud Infrastructure • Provisioning of computing resources – CPU, Memory, Processing – Basically an “Operating System” on demand • Usually billed on a per-hour usage model • Players in this space – Amazon EC2, Rackspace, GoGrid, Eucalyptus/Openstack based SciCloud • Management providers: RightScale, HybridFox, ElasticFox, Amazon Management Console 20/02/2018 Satish Srirama 4/40 Cloud Storage • Provisioning of data storage – Either file/object based or Database like functionality • Billed on bandwidth and storage consumed • Players in the space – Amazon S3, Amazon EBS – Amazon’s SimpleDB, Google’s BigTable, Apache Cassandra • Management -
Migrating Enterprise Storage Applications to the Cloud
UC San Diego UC San Diego Electronic Theses and Dissertations Title Migrating enterprise storage applications to the cloud Permalink https://escholarship.org/uc/item/0dv3d3p5 Author Vrable, Michael Daniel Publication Date 2011 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Migrating Enterprise Storage Applications to the Cloud A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Michael Daniel Vrable Committee in charge: Professor Stefan Savage, Co-Chair Professor Geoffrey M. Voelker, Co-Chair Professor Bill Lin Professor Paul Siegel Professor Amin Vahdat 2011 Copyright Michael Daniel Vrable, 2011 All rights reserved. The dissertation of Michael Daniel Vrable is approved, and it is acceptable in quality and form for publication on micro- film and electronically: Co-Chair Co-Chair University of California, San Diego 2011 iii DEDICATION To my family, for all the support I’ve received. iv EPIGRAPH If I have seen further it is only by standing on the shoulders of giants. —Sir Isaac Newton v TABLE OF CONTENTS Signature Page . iii Dedication . iv Epigraph . .v Table of Contents . vi List of Figures . ix List of Tables . .x Acknowledgements . xi Vita ......................................... xiii Abstract of the Dissertation . xv Chapter 1 Introduction . .1 1.1 Cloud Computing Applications . .3 1.2 Contributions . .5 1.3 Organization . .6 Chapter 2 Background . .7 2.1 Cloud Providers . .7 2.1.1 Cloud Storage . .8 2.1.2 Cloud Computation . 12 2.2 Enterprise Storage Applications . 13 2.2.1 File System Backup . -
The Rackspace Cloud - Vorstellung Eines Infrastructure-As-A-Service Anbieters
The Rackspace Cloud - Vorstellung eines Infrastructure-As-A-Service Anbieters Benjamin Simroth Fakult¨at fur¨ Informatik Hochschule Mannheim Paul-Wittsack-Straße 10 68163 Mannheim [email protected] Zusammenfassung The Rackspace Cloud ist ein Infrastructure-As- A-Service Anbieter, welcher virtuelle Server auf Basis von XEN zur Verfugung¨ stellt. In dieser Ausarbeitung wird das Preis und Leistungs- spektrum von Cloud Servern vorgestellt, sowie die M¨oglichkeiten die vom Anbieter zur Verfugung¨ gestellte Schnittstelle zu nutzen um durch ex- terne Tools die Cloudserver zu deployen und zu uberwachen.¨ In der Industrie ist Cloud Computing als Schlagwort fur¨ Kostenreduzierung be- kannt. In dieser Ausarbeitung sollen die M¨oglichkeiten und Grenzen der Ausla- gerung seiner bestehenden oder der Aufbau einer neuen Infrastruktur in einer Cloud aus dem Hause Rackspace aufgezeigt werden. 1 Das Unternehmen Das Unternehmen wurde 1998 in San Antonioin Texas gegrundet.¨ Im Jahr 2005 hat das Unternehmen unter dem Firmennamen Mosso mit Hostingl¨osungen das Produktsortiment um das Hosten von Cloud Servern erweitert. Im Jahr 2009 bennent sich Mosso in The Rackspace Cloud um und unterh¨alt neun Rechen- zentren in Amerika, England und Hong Kong, bedient uber¨ 51.000 Kunden und besch¨aftigt knapp 1.800 Mitarbeiter weltweit. Das Unternehmen ist vorallem durch seinen sehr guten Support (Fanatical Support) bekannt geworden, welcher nicht nur auf dem Papier h¨alt was er verspricht. Dieser ist im Preis der Produk- te mit inbegriffen und rund um die Uhr uber¨ ein Ticketsystem, den Livechat, das Telefon sowie per E-Mail erreichtbar. Beim Support wird nicht zwischen ver- schiedenen Kundengruppen unterschieden, sondern es werden alle Kunden gleich behandelt. -
Sistemi ICT Per Il Business Networking
Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking The Web Docente: Vito Morreale ([email protected]) 2 April 2006 1 The Web The World Wide Web ("WWW" or simply the "Web") is a global information space which people can read and write via computers connected to the Internet Not a synonym of the Internet: the Web is actually a service that operates over the Internet The Web Internet 2 April 2006 ICT Systems for Business Networking 2 1 The Web The World Wide Web is the combination of four basic ideas: Hypertext: moving from one part of a document to another or from one document to another through internal connections among these documents (called "hyperlinks") Resource identifiers: locating a particular resource (computer, document or other resource) on the network through a unique identifier Client-server model of computing: client software or a client computer makes requests of server software or a server computer that provides the client with resources or services (e.g data or files) Markup language: characters or codes embedded in text indicate to a computer how to print or display the text (e.g. in italics or bold type or font) 2 April 2006 ICT Systems for Business Networking 3 Web browser and server On the Web, a web browser (client) retrieves information resources (e.g. web pages and other files) from web servers using their network addresses and displays them, typically on a computer monitor, using a markup language that determines the details of the display One can then follow hyperlinks in each page to other resources on the Web of information whose location is provided by these hyperlinks The act of following hyperlinks is often called "browsing" the Web Web pages are arranged in collections of related material ("websites“) Web Server Web Browser 2 April 2006 ICT Systems for Business Networking 4 2 Main Web standards At its core, the Web is made up of three standards: the Uniform Resource Identifier (URI): a universal system for referencing resources on the Web (e.g. -
UG TN-200 200T1(V1).Pdf
TRENDnet User’s Guide Cover Page TRENDnet User’s Guide Table of Contents Contents RAID .................................................................................................................... 37 S.M.A.R.T............................................................................................................. 43 Product Overview ............................................................................. 2 Scan Disk ............................................................................................................. 45 Package Contents .......................................................................................................... 2 Volume Information ........................................................................................... 46 Features ......................................................................................................................... 2 Network .................................................................................................................. 46 Product Hardware Features ........................................................................................... 3 Network Settings ................................................................................................ 46 Application Diagram ...................................................................................................... 5 LLTD/DDNS .......................................................................................................... 48 Installing Hard Drive(s) .................................................................................................