SOC 3) Report Report on the Amazon Web Services System Relevant to Security, Availability, and Confidentiality for the Period April 1, 2019 - September 30, 2019

Total Page:16

File Type:pdf, Size:1020Kb

SOC 3) Report Report on the Amazon Web Services System Relevant to Security, Availability, and Confidentiality for the Period April 1, 2019 - September 30, 2019 System and Organization Controls 3 (SOC 3) Report Report on the Amazon Web Services System Relevant to Security, Availability, and Confidentiality For the Period April 1, 2019 - September 30, 2019 ©2019 Amazon.com, Inc. or its affiliates ©2019 Amazon.com, Inc. or its affiliates 2 ©2019 Amazon.com, Inc. or its affiliates 3 Amazon Web Services 410 Terry Avenue North Seattle, WA 98109-5210 Management’s Report of its Assertions on the Effectiveness of Its Controls Over the Amazon Web Services System Based on the Trust Services Criteria for Security, Availability, and Confidentiality We, as management of, Amazon Web Services, Inc. are responsible for: • Identifying the AWS Web Services System (System) and describing the boundaries of the System, which are presented in Attachment A • Identifying our principal service commitments and system requirements • Identifying the risks that would threaten the achievement of its principal service commitments and service requirements that are the objectives of our system, which are presented in Attachment B • identifying, designing, implementing, operating, and monitoring effective controls over the System to mitigate risks that threaten the achievement of the principal service commitments and system requirement • Selecting the trust services categories that are the basis of our assertion We assert that the controls over the system were effective throughout the period April 1, 2019 to September 30, 2019 to provide reasonable assurance that the principle service commitments and system requirements were achieved based on the criteria relevant to security, availability and confidentiality set forth in the AICPA’s TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality and Privacy. Very truly yours, Amazon Web Services Management ©2019 Amazon.com, Inc. or its affiliates 4 Attachment A – Amazon Web Services System AWS Background Since 2006, Amazon Web Services (AWS) has provided flexible, scalable and secure IT infrastructure to businesses of all sizes around the world. With AWS, customers can deploy solutions on a cloud computing environment that provides compute power, storage, and other application services over the Internet as their business needs demand. AWS affords businesses the flexibility to employ the operating systems, application programs, and databases of their choice. The scope covered in this report consists of the following services (the service name is followed by the services’ namespace1 in parenthesis): • AWS Amplify Console (amplify) • AWS IoT Events (iotevents) • API Gateway (apigateway) • AWS IoT Greengrass (greengrass) • Amazon AppStream 2.0 (appstream) • AWS Key Management Service (kms) • AWS AppSync (appsync) • Amazon Kinesis Data Analytics • Amazon Athena (athena) (kinesisanalytics) • AWS Auto Scaling (autoscaling) • Amazon Kinesis Data Firehose • AWS Backup (backup) (firehose) • AWS Batch (batch) • Amazon Kinesis Data Streams (kinesis) • AWS Certificate Manager (acm) • Amazon Kinesis Video Streams • Amazon Cloud Directory (kinesisvideo) (clouddirectory) • AWS Lambda (lambda) • AWS CloudFormation (cloudformation) • Amazon Lex (runtime.lex, • Amazon CloudFront (cloudfront) models.lex) • AWS CloudHSM (cloudhsm) • AWS License Manager (license- • AWS CloudTrail (cloudtrail) manager) • Amazon CloudWatch (cloudwatch, • Amazon Macie (macie) events, logs) • AWS Managed Services • CloudWatch SDK Metrics for Enterprise • Amazon Managed Streaming for Kafka Support (sdkmetrics) (Amazon MSK) (kafka) • AWS CodeBuild (codebuild) • Amazon MQ (mq) • AWS CodeCommit (codecommit) • Amazon Neptune (neptune-db) • AWS CodeDeploy (codedeploy) • AWS OpsWorks (opsworks) • AWS CodePipeline (codepipeline) • AWS OpsWorks for Chef Automate or • Amazon Cognito (cognito-idp, AWS OpsWorks for Puppet Enterprise cognito-identity, cognito-sync) (opsworks-cm) • Amazon Comprehend (comprehend) • AWS Organizations (organizations) • Amazon Comprehend Medical • Amazon Personalize (personalize) (comprehendmedical) • Amazon Pinpoint (mobiletargeting) • AWS Config (config) • Amazon Polly (polly) 1 When customers create IAM policies or work with Amazon Resource Names (ARNs), customers identify an AWS service using a namespace. For example, the namespace for Amazon S3 is s3, and the namespace for Amazon EC2 is ec2. Customers use namespaces when identifying actions and resources across AWS. ©2019 Amazon.com, Inc. or its affiliates 5 • Amazon Connect (connect) • Amazon QuickSight (quicksight) • AWS Control Tower (controltower) • Amazon Redshift (redshift) • AWS Database Migration Service (dms) • Amazon Rekognition (rekognition) • AWS DataSync (datasync) • Amazon Relational Database Service • AWS Direct Connect (directconnect) (rds) • AWS Directory Service (ds) – [Excludes • AWS Resource Groups (resource- Simple Active Directory] groups) • Amazon DocumentDB (with MongoDB • AWS RoboMaker (robomaker) compatibility) • Amazon Route 53 (route53) • Amazon DynamoDB (dynamodb) • Amazon SageMaker (sagemaker) • AWS Elastic Beanstalk • AWS Secrets Manager (elasticbeanstalk) (secretsmanager) • Amazon Elastic Block Store (ec2) • AWS Security Hub (securityhub) • Amazon Elastic Compute Cloud (ec2) • AWS Server Migration Service (sms) • Amazon Elastic Container Registry (ecr) • AWS Serverless Application Repository • Amazon Elastic Container Service (ecs) – (serverlessrepo) [both Fargate and EC2 launch types] • AWS Service Catalog (servicecatalog) • Amazon Elastic Container Service for • AWS Shield (shield, DDoSProtection) Kubernetes (eks) • Amazon Simple Email Service (ses) • Amazon Elastic File System • Amazon Simple Notification Service (sns) (elasticfilesystem) • Amazon Simple Queue Service (sqs) • Amazon Elasticsearch Service (es) • Amazon Simple Storage Service (s3) • Elastic Load Balancing • Amazon Simple Workflow Service (swf) (elasticloadbalancing) • Amazon SimpleDB (sdb) • Amazon ElastiCache (elasticache) • AWS Snowball (snowball) • AWS Elemental MediaConnect • AWS Snowball Edge (mediaconnect) • AWS Snowmobile • Amazon EMR (elasticmapreduce) • AWS Step Functions (states) • AWS Firewall Manager (fms) • AWS Storage Gateway • Amazon Forecast (amazonforecast) (storagegateway) • Amazon FreeRTOS (freertos) • AWS Systems Manager (ssm) • Amazon FSx (fsx) • Amazon Transcribe (transcribe) • Amazon Glacier (glacier) • AWS Transfer for SFTP (transfer) • AWS Global Accelerator • Amazon Translate (translate) (globalaccelerator) • Amazon Virtual Private Cloud (Amazon • AWS Glue (glue) VPC) (ec2) • AWS GuardDuty (guardduty) • AWS WAF (waf) • AWS Identity and Access Management (iam) • Amazon WorkDocs (workdocs) • VM Import/Export • Amazon WorkLink (worklink) • Amazon Inspector (inspector) • Amazon WorkMail (workmail) • AWS IoT Core (iot) • Amazon WorkSpaces (workspaces) • AWS IoT Device Management (iot) • AWS X-Ray (xray) ©2019 Amazon.com, Inc. or its affiliates 6 The scope of locations covered in this report includes the supporting data centers located in the US East (Northern Virginia), US East (Ohio), US West (Oregon), US West (Northern California), GovCloud (US West), GovCloud (US East), Canada (Montreal), Europe (Ireland), Europe (Frankfurt), Europe (London), Europe (Paris), Europe (Stockholm), Middle East (Bahrain), Asia Pacific (Singapore), Asia Pacific (Sydney), Asia Pacific (Tokyo), Asia Pacific (Osaka)2, Asia Pacific (Seoul), Asia Pacific (Mumbai), Asia Pacific (Hong Kong), and South America (São Paulo) Regions, as well as the AWS Edge locations in: • Canberra, Australia • Hyderabad, India • Dubai, United Arab Emirates • Melbourne, Australia • Mumbai, India • Fujairah, United Arab Emirates • Perth, Australia • New Delhi, India • Arizona, United States • Sydney, Australia • Dublin, Ireland • California, United States • Vienna, Austria • Tel Aviv, Israel • Colorado, United States • Rio de Janeiro, Brazil • Milan, Italy • Florida, United States • São Paulo, Brazil • Palermo, Italy • Georgia, United States • Montréal, Canada • Osaka, Japan • Illinois, United States • Toronto, Canada • Tokyo, Japan • Indiana, United States • Vancouver, Canada • Seoul, Korea • Massachusetts, United States • Prague, Czech Republic • Kuala Lumpur, Malaysia • Minnesota, United States • Hong Kong, China • Amsterdam, Netherlands • Nevada, United States • Copenhagen, Denmark • Oslo, Norway • New Jersey, United States • London, England • Manila, Philippines • New York, United States • Manchester, England • Warsaw, Poland • Ohio, United States • Helsinki, Finland • Lisbon, Portugal • Oregon, United States • Marseille, France • Singapore • Pennsylvania, United States • Paris, France • Cape Town, South Africa • Texas, United States • Berlin, Germany • Johannesburg, South Africa • Utah, United States • Frankfurt, Germany • Madrid, Spain • Virginia, United States • Munich, Germany • Stockholm, Sweden • Washington, United States • Bengaluru, India • Zurich, Switzerland • Chennai, India • Taipei, Taiwan Infrastructure AWS operates the cloud infrastructure that customers may use to provision computing resources such as processing and storage. The AWS infrastructure includes the facilities, network, and hardware as well as some operational software (e.g., host operating system, virtualization software, etc.) that support the provisioning and use of these resources. The AWS infrastructure is designed and managed in accordance with security compliance standards and AWS best practices. 2 The Asia Pacific (Osaka) Region is a Local Region, which comprises an isolated, fault-tolerant infrastructure design consisting
Recommended publications
  • Building Resilience for the Long Run
    Building Resilience for the Long Run How Travel & Hospitality companies can stay agile during business disruption COPYRIGHT 2020, AMAZON WEB SERVICES, INC. OR ITS AFFILIATES 1 About AWS Travel and Hospitality WS Travel and Hospitality is the global industry practice for Amazon Web Services (AWS), with a charter to support customers as they accelerate cloud adoption. Companies around the world, across every segment of the travel and hospitality industry - and of every size - run on AWS. This includes industry leaders like Airbnb, Avis Budget Group, Best Western, Choice Hotels, DoorDash, Dunkin’ Brands, Expedia Group, Korean Air, McDonald’s, Ryanair, SiteMinder, Sysco, Toast, United Airlines, and Wyndham Hotels. These companies and many others are transforming their business by leveraging technology to enhance customer experiences and increase operational efficiency. For more information about AWS Travel and Hospitality, please visit aws.com/travel. Keep up-to-date with executive insights and industry viewpoints at the AWS Travel and Hospitality Blog. Click here to be contacted by an AWS representative. COPYRIGHT 2020, AMAZON WEB SERVICES, INC. OR ITS AFFILIATES AWS.COM/TRAVEL 2 Foreword It has been said that challenges should not paralyze you but help discover who you are. We have seen time and again that immense challenges can bring about incredible innovation. That is especially true today. Around the globe, travel and hospitality companies are taking advantage of the flexibility of the AWS Cloud to innovate quickly and meet their needs during these trying times. Faced with disruption – whether a localized weather event or a pandemic that spans continents – travel and hospitality companies respond and rebuild.
    [Show full text]
  • Amazon Polly: Use Cases
    A I M 3 0 3 Stop guessing: Use AI to understand customer conversations Dirk Fröhner Boaz Ziniman Senior Solutions Architect Principal Technical Evangelist Amazon Web Services Amazon Web Services © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • Introduction Amazon Web Services (AWS) AI/ML offering • Introduction Amazon Connect • Architecture of the labs • Work on the labs • Wrap-up Related breakouts • AIM211 - AI document processing for business automation • AIM212 - ML in retail: Solutions that add intelligence to your business • AIM222 - Monetizing text-to-speech AI • AIM302 - Create a Q&A bot with Amazon Lex and Amazon Alexa © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Natural language processing (NLP) • Automatic speech recognition (ASR) • Natural language understanding (NLU) • Text to speech • Translation @ziniman @ziniman Use cases for NLP Voice of customer Knowledge management Education applications Customer service/ Semantic search Accessibility call centers Enterprise Captioning workflows Information bots digital assistant Personalization Localization The Amazon ML stack: Broadest & deepest set of capabilities Vision Speech Language Chatbots Forecasting Recommendations A I s e r v i c e s A m a z o n A m a z o n T r a n s l a t e A m a z o n A m a z o n A m a z o n A m a z o n A m a z o n C o m p r e h e n d A m a z o n A m a z o n A m a z o n Rekognition Rekognition T e x t r a c t P o l l y T r a n s c r i b e & A m a z o n L e x F o r e c a s t Personalize i m a
    [Show full text]
  • BEST PRACTICE GUIDE for CLOUD and AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction
    BEST PRACTICE GUIDE FOR CLOUD AND AS-A-SERVICE PROCUREMENTS Executive Summary 1 Introduction Specific Models and Understanding Cloud Procurement Service Models Data EXECUTIVE SUMMARY Breach Notification Personnel Security While private companies rapidly move systems and Vendors share blame, too. Lots of cloud providers are new to Encryption applications to the cloud, public agencies still struggle to adopt public sector business, having grown up selling to consumers Audits Operations hosted services that could save money and provide better value. and private firms. These companies don’t always understand Hybrid Cloud Environments legitimate demands that make government contracting Preparation for Migrating Yet states and localities have much to gain from the different from selling to other markets. Failure to accommodate Workloads to the Cloud technology industry’s “as-a-service” revolution. Many unique government requirements can be a deal-breaker for jurisdictions face huge legacy system replacement challenges. agencies charged with protecting the public’s interests. Conclusion They’re also under pressure to provide new classes of digital services. The cloud can offer a better path toward All too often, government and industry aren’t on the same page Workgroup Members modernization — there’s no hardware to buy, you’re always when it comes to cloud services. They may not even speak the and Contributors on the latest version of the software and system capacity same language. can be adjusted almost instantly based on your needs. Appendix 1 Bridging the Gap Model Terms and Conditions Templates So why is government lagging behind? The fact is that These pressures led us to release the first version of this guide Software-as-a-Service governments often struggle to buy cloud-based services because two years ago.
    [Show full text]
  • (AWS) Security Workshop - Pre-Read Material
    Amazon Web Services (AWS) Security Workshop - Pre-read material It is highly recommended to go through the pre-read before attending the AWS Security workshop. Shared Responsibility Model Security and Compliance is a shared responsibility between AWS and the customer. This shared model can help relieve the customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall. Customers should carefully consider the services they choose as their responsibilities vary depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations. The nature of this shared responsibility also provides the flexibility and customer control that permits the deployment. As shown in the chart below, this differentiation of responsibility is commonly referred to as Security “of” the Cloud versus Security “in” the Cloud. AWS responsibility “Security of the Cloud” - AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud. This infrastructure is composed of the hardware, software, networking, and facilities that run AWS Cloud services. Customer responsibility “Security in the Cloud” – Customer responsibility will be determined by the AWS Cloud services that a customer selects. This determines the amount of configuration work the customer must perform as part of their security responsibilities.
    [Show full text]
  • Commvault on AWS Comprehensive Cloud Data Management for Hybrid IT Table of Contents
    Commvault on AWS Comprehensive Cloud Data Management for Hybrid IT Table of Contents The Data Management Challenge 3 Commvault and Amazon Web Services 4 Benefits 7 Case Study: Dow Jones 8 Getting Started 9 2 The Data Management Challenge Today, more data is being generated than ever before. Keeping up with the rapid pace of data growth presents a series of challenges. Enterprise organizations are collecting petabytes of customer and application data that must be backed up and accessible to meet compliance requirements. Increased regulation around data retention policies make it more difficult to manage backup and archive storage, as critical data may be required to be kept for years and maybe difficult to find. Further complicating matters, point solutions often overlap and leave gaps where data is unprotected and require additional staff to manage them. These issues lead to increased costs, yet many IT departments are facing budget cuts and cannot expand upon their capital to meet increased performance demands. Today’s hybrid IT organizations realize cloud can help solve many data storage issues. With cloud storage comes the need for a comprehensive data management platform to manage data both on-premises and in the cloud. Savvy organizations streamline IT operations and reduce cloud waste with flexible orchestration to automate resource provisioning, policies and routine tasks. This eBook will demonstrate how Commvault and Amazon Web Services (AWS) deliver a cost-effective data management solution that addresses all of these challenges with a single, scalable solution. 3 Commvault and Amazon Web Services Unlike most backup and recovery solutions, Commvault offers a single data platform solution for all backup and recovery needs; as opposed to having to several point solutions for each use case (i.e.
    [Show full text]
  • Elliptic Curve Cryptography in Cloud Computing Security
    Elliptic curve cryptography in cloud computing security Manu Gopinathan ([email protected]) Øyvind Nygard ([email protected]) Kjetil Aune([email protected]) December 1st, 2015 1 Abstract Cloud computing is a technological advancement that has been growing swiftly during the last decade. In simple terms, cloud computing is a technology that enables shared, remote, on-demand and ubiquitous access to services through the Internet. It enables consumers to access applications and services that reside on remote servers, without having to allocate large amounts of storage space on their own computer and without the need for extensive compatibility configurations. Many such cloud applications provide services that are meant to handle sensitive user data and thus the protection of this data in terms of access and integrity is of major concern. Space- and time complexity of encryption algorithms can prove to be imperative when it comes to system performance. In this paper we will briefly present how elliptic curve cryptography (EEC) works, and then describe the advantages of it and how it can be used as an encryption solution to security related issues in cloud computing. 2 Introduction In this section we will briefly describe the notion of cloud computing to aid us in the discussion of ECC in cloud computing later. According to the National Institute of Standards and Technology (NIST), essential characteristics for a service based on the cloud computing model are [1]: 1. On-demand self-service: The consumer can provision service capabilities, such as server time and network storage, without actively interacting with the service provider. 2.
    [Show full text]
  • AWS Managed Services (AMS)
    AWS Managed Services (AMS) Application Developer's Guide AMS Advanced Operations Plan Version September 16, 2020 AWS Managed Services (AMS) Application Developer's Guide AMS Advanced Operations Plan AWS Managed Services (AMS) Application Developer's Guide: AMS Advanced Operations Plan Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS Managed Services (AMS) Application Developer's Guide AMS Advanced Operations Plan Table of Contents Application Onboarding to AMS Introduction ........................................................................................ 1 What is Application Onboarding? ................................................................................................. 1 What we do, what we do not do .................................................................................................. 1 AMS Amazon Machine Images (AMIs) ............................................................................................ 2 Security enhanced AMIs ...................................................................................................... 4 Key terms .................................................................................................................................
    [Show full text]
  • Performance at Scale with Amazon Elasticache
    Performance at Scale with Amazon ElastiCache July 2019 Notices Customers are responsible for making their own independent assessment of the information in this document. This document: (a) is for informational purposes only, (b) represents current AWS product offerings and practices, which are subject to change without notice, and (c) does not create any commitments or assurances from AWS and its affiliates, suppliers or licensors. AWS products or services are provided “as is” without warranties, representations, or conditions of any kind, whether express or implied. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. © 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved. Contents Introduction .......................................................................................................................... 1 ElastiCache Overview ......................................................................................................... 2 Alternatives to ElastiCache ................................................................................................. 2 Memcached vs. Redis ......................................................................................................... 3 ElastiCache for Memcached ............................................................................................... 5 Architecture with ElastiCache for Memcached ...............................................................
    [Show full text]
  • Performance Efficiency Pillar
    Performance Efficiency Pillar AWS Well-Architected Framework Performance Efficiency Pillar AWS Well-Architected Framework Performance Efficiency Pillar: AWS Well-Architected Framework Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. Performance Efficiency Pillar AWS Well-Architected Framework Table of Contents Abstract and Introduction ................................................................................................................... 1 Abstract .................................................................................................................................... 1 Introduction .............................................................................................................................. 1 Performance Efficiency ....................................................................................................................... 2 Design Principles ........................................................................................................................ 2 Definition .................................................................................................................................
    [Show full text]
  • Amazon Silk Developer Guide Amazon Silk Developer Guide
    Amazon Silk Developer Guide Amazon Silk Developer Guide Amazon Silk: Developer Guide Copyright © 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services, Inc.: Amazon, Amazon Web Services Design, AWS, Amazon CloudFront, AWS CloudTrail, AWS CodeDeploy, Amazon Cognito, Amazon DevPay, DynamoDB, ElastiCache, Amazon EC2, Amazon Elastic Compute Cloud, Amazon Glacier, Amazon Kinesis, Kindle, Kindle Fire, AWS Marketplace Design, Mechanical Turk, Amazon Redshift, Amazon Route 53, Amazon S3, Amazon VPC, and Amazon WorkDocs. In addition, Amazon.com graphics, logos, page headers, button icons, scripts, and service names are trademarks, or trade dress of Amazon in the U.S. and/or other countries. Amazon©s trademarks and trade dress may not be used in connection with any product or service that is not Amazon©s, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS documentation posted on the Alpha server is for internal testing and review purposes only. It is not intended for external customers. Amazon Silk Developer Guide Table of Contents What Is Amazon Silk? .................................................................................................................... 1 Split Browser Architecture ......................................................................................................
    [Show full text]
  • Amazon Documentdb Deep Dive
    DAT326 Amazon DocumentDB deep dive Joseph Idziorek Antra Grover Principal Product Manager Software Development Engineer Amazon Web Services Fulfillment By Amazon © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda What is the purpose of a document database? What customer problems does Amazon DocumentDB (with MongoDB compatibility) solve and how? Customer use case and learnings: Fulfillment by Amazon What did we deliver for customers this year? What’s next? © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Purpose-built databases Relational Key value Document In-memory Graph Search Time series Ledger Why document databases? Denormalized data Normalized data model model { 'name': 'Bat City Gelato', 'price': '$', 'rating': 5.0, 'review_count': 46, 'categories': ['gelato', 'ice cream'], 'location': { 'address': '6301 W Parmer Ln', 'city': 'Austin', 'country': 'US', 'state': 'TX', 'zip_code': '78729'} } Why document databases? GET https://api.yelp.com/v3/businesses/{id} { 'name': 'Bat City Gelato', 'price': '$', 'rating': 5.0, 'review_count': 46, 'categories': ['gelato', 'ice cream'], 'location': { 'address': '6301 W Parmer Ln', 'city': 'Austin', 'country': 'US', 'state': 'TX', 'zip_code': '78729'} } Why document databases? response = yelp_api.search_query(term='ice cream', location='austin, tx', sort_by='rating', limit=5) Why document databases? for i in response['businesses']: col.insert_one(i) db.businesses.aggregate([ { $group: { _id: "$price", ratingAvg: { $avg: "$rating"}} } ]) db.businesses.find({
    [Show full text]
  • Consistency in Cloud-Based Database Systems
    https://doi.org/10.31449/inf.v43i1.2650 Informatica 43 (2019) 313–319 313 Consistency in Cloud-based Database Systems Zohra Mahfoud USTHB University, Algeria E-mail: [email protected] Nadia Nouali-Taboudjemat CERIST Research Center, Algeria E-mail: [email protected] Keywords: cloud computing, consistency, distributed databases, relational databases, No-SQL, CAP Received: July 15, 2019 Cloud computing covers the large spectrum of services available on the internet. Cloud services use replication to ensure high availability. Within database replication, various copies of the same data item are stored in different sites, this situation requires managing the consistency of the multiple copies. In fact, the requirement for consistency level can be different according to application natures and other metrics; a delay of some minutes in visualizing latest posts in social networks can be tolerated, while some seconds can make a loss of a bid in an auction system. Wide variety of database management systems are used actually by cloud services, they support different levels of consistency to meet the diversity of needs. This paper draws a presentation of the main characteristics of cloud computing and data management systems and describes different consistency models. Then it discusses the most famous cloud-based database management systems from the point of view of their data and consistency models. Povzetek: Prispevek analizira podatkovna skladišča v oblakih predvsem s stališča konsistentnosti. 1 Introduction Cloud computing refers to the large spectrum of services cloud systems and describes the implemented models of available on the internet. These services manage big data and consistency. Section 6 concludes the paper.
    [Show full text]