SlideShare a Scribd company logo
1 of 22
Storage As A
Service (StAAS)
Contents
1. Introduction
2. Why StAAS?
3. Types of Storage
4. Object Storage
5. How to create our own Object Storage?
6. Algorithm: Linux
7. Block Storage
8. Benefits of StAAS
9. Future Applications
10.Conclusion
11.References
1. StAAS
● One of the most amazing services of cloud computing service for
providing Cyber Storage or Online Remote Storage.
● This remains independent of the Client system and the platform
it uses.
● This is a business model where large companies rent space in
their storage infrastructure to a smaller company or individual.
2. Why StAAS?
● A good alternative for a small or midsize business that lacks the
capital budget and/or personnel to implement and maintain
their own storage infrastructure.
● This is also a way to mitigate risks in disaster recovery, provide
long-term retention of records and enhance both business
continuity and availability.
● Gives the assurance of the following things that are of utmost
importance:
1. Security : You would want to make sure that the data is in a
secure environment, more secure than you can do yourself.
2. Cost Effectiveness : The service provider must be able to do the
handling job at a lower cost than you.
3. Service Developer : The data that you are about to share goes to
a trusted source and who takes reliability and gives assurance of
the data as and when required.
3. Types of Storage
There are 2 types of Remote Storage generally provided by Cloud
Storage:
1. Object Storage
2. Block Storage
4. Object Storage
● This is the kind of storage where client only can store its data
like Doc, PDF, text, etc.
● You cannot change filesystem if the provided storage and also
you cannot create any partitions.
● Type of data storage typically used in SAN(Storage Area
Network) environments where dta is stored in volumes, also
referred to as blocks.
● Each block acts as an individual hard drive and is configured by
the storage administrator.
Examples of Object Storage
Amazon : Simple Storage Service (S3)
Google : Google Drive
Dropbox : Free Storage
Openstack : Swift
5. How to Create our own Object Storage
Service?
Case 1: You are going to share Storage from (/) partition Linux.
Case 2: Storage sharing with CISF/SMB.
6. Algorithm: Linux
Server Side:
1. Select a drive for storage
2. Format it (explain formatting)
3. Create a folder
4. Mount drive into that folder
5. Configure export files
6. NFS install and start
7. Security checks
1. Select a device for storage: Here we would select one device in
which all the documents and files would be stored. This is like a
target destination for our future works.
2. Format the drive: Formatting refers to the removal of the
referral links in a disc space. The links to the space locations are
all removed.
3. Create a folder: This folder is created so as to mark the file that we
are going to transfer. All the documents that we want to transfer will
be kept in this file and this can be directly read from the server/client
side.
4. Mount drive into that Folder: Now, we mount a drive into the
folder which we have specified.
5. Configure export files: gedit/etc/exports
In this file, we have to specify the address from where the data is
sent, the access permissions where * represents all and the various
permissions associated.
/root/Desktop/hi *(rw,no_root_squash)
This file moderates the amount of access that is to be given and the
various protocols associated with file sharing.
6. NFS install and Start: Network File is a server-client protocol for
sharing files between computers on the same network.
You can then directly access any of the files on that remote file
system. The server and client do not have to use the same operating
system. The client system just needs to be running an NFS client
compatible with the NFS server.
systemctl restart nfs
After this, by inconfig, check the IP of the server and that will be used
at a later stage.
7. Security Checks: Sometimes, the firewall may block the data from
being exchanged. In that case, we do need to stop the firewall
settings for a brief time so as to allow the data to flow from one way
to another. We do this by:
Also, sometimes enforce is active. Check enforce by getenforce. If it
is active, then setenforce 0. This will make the system permissive of
the data transfer.
How to access storage from client side?
Client Side
1. Mount folder using sever IP: The client has to just allow the
information to come to itself.
mount IP:/root/Desktop/hi /mydrive
Mount the folder to a particular IP:from where to where.
7. Block Storage
● Breaks a file into individual blocks of data and then stores the
blocks as a single piece of data.
● A storage system can do this without having a file folder
structure because each block of data has a unique address.
● This allows the storage system to spread the individual blocks of
data wherever in the storage system it finds the most efficient.
● The storage system software pulls the necessary blocks back
together to assemble the file whenever it is accessed.
8. Benefits of StAAS
● Cost: Time and Money.
● Invisibility: Physical Office Space.
● Security: No Unauthorized
Access.
● Automation: Backing Up needs no effort.
● Accessibility: Various devices can be used.
● Syncing: All devices updated at
once.
● Sharing: Easy sharing options
of file.
● Collaboration: Multiple people can work
9. Future Applications
● Business are becoming more data-driven. Its the new normal.
Captured data from a variety of sources has intrinsic value to
the whole organization. Your own data might have more value
when it’s combined with other public data sources using an
analytic or cognitive cloud service.
● 47% of marketing departments will have 60% or more of their
applications on a cloud platform in two years. This speaks a lot.
10. Conclusion
So, if you have a storage appliance already running in an environment and feel safe that your data is
secure, then you better think twice about it. If in case, you have branched offices geographically
separated and operate on the data provided by your data storage appliance, then imagine, if your
main office gets struck with floods. Your data will vanish and the remote office guys cannot access
the data and thus your business continuity will fall into jeopardy.
But now imagine, if you synchronized your data storage appliance with cloud storage? Then all your
enterprise data will be safe in the cloud and can be accessed by any of your authorized employee
from anywhere in the world and will definitely ensure business continuity.
11. References
● https://storageservers.wordpress.com/2015/08/10/advantages-of-storage-as-a-service/
● https://blogs.it.ox.ac.uk/staas/sample-page/
● Cloud Computing: LinuxWorld
● https://www.ibm.com/blogs/cloud-computing/2016/08/hybrid-cloud-storage-past-
present-future/
● https://www.networkcomputing.com/storage/future-data-storage-flash-and-hybrid-
cloud/396697859
Thank You!

More Related Content

What's hot (20)

Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Introduction to cloud computing
Introduction to cloud computingIntroduction to cloud computing
Introduction to cloud computing
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 
CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1CLOUD COMPUTING UNIT-1
CLOUD COMPUTING UNIT-1
 
Application of Cloud Computing
Application of Cloud ComputingApplication of Cloud Computing
Application of Cloud Computing
 
VTU 6th Sem Elective CSE - Module 3 cloud computing
VTU 6th Sem Elective CSE - Module 3 cloud computingVTU 6th Sem Elective CSE - Module 3 cloud computing
VTU 6th Sem Elective CSE - Module 3 cloud computing
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
Virtualization
Virtualization Virtualization
Virtualization
 
Top 10 cloud service providers
Top 10 cloud service providersTop 10 cloud service providers
Top 10 cloud service providers
 
What is Serverless Computing?
What is Serverless Computing?What is Serverless Computing?
What is Serverless Computing?
 
Cloud sim
Cloud simCloud sim
Cloud sim
 
Cloud Computing: Virtualization
Cloud Computing: VirtualizationCloud Computing: Virtualization
Cloud Computing: Virtualization
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
 

Similar to Storage As A Service (StAAS)

IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET Journal
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdfSamiksha880257
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...ssuserec8a711
 
Mca cloud-storage-report
Mca cloud-storage-reportMca cloud-storage-report
Mca cloud-storage-reportGRajendra
 
Alluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio, Inc.
 
on the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationon the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationJordi Moles Blanco
 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPIJSRD
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Tuan Yang
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingRutuja751147
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the CloudBuurst
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudAM Publications
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...Niraj Tolia
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd Iaetsd
 
Performance,cost and reliability through hybrid cloud storage
Performance,cost and reliability through hybrid cloud storagePerformance,cost and reliability through hybrid cloud storage
Performance,cost and reliability through hybrid cloud storageNetmagic Solutions Pvt. Ltd.
 
Advantages Of SAMBA
Advantages Of SAMBAAdvantages Of SAMBA
Advantages Of SAMBAAngela Hays
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security9 series
 

Similar to Storage As A Service (StAAS) (20)

IRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFSIRJET- Distributed Decentralized Data Storage using IPFS
IRJET- Distributed Decentralized Data Storage using IPFS
 
final-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdffinal-unit-ii-cc-cloud computing-2022.pdf
final-unit-ii-cc-cloud computing-2022.pdf
 
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...Introduction to Enterprise Data Storage,  Direct Attached Storage, Storage Ar...
Introduction to Enterprise Data Storage, Direct Attached Storage, Storage Ar...
 
Mca cloud-storage-report
Mca cloud-storage-reportMca cloud-storage-report
Mca cloud-storage-report
 
Alluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory SpeedAlluxio: Unify Data at Memory Speed
Alluxio: Unify Data at Memory Speed
 
on the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualizationon the most suitable storage architecture for virtualization
on the most suitable storage architecture for virtualization
 
Secured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDPSecured Multi Cloud Storage Using CPDP
Secured Multi Cloud Storage Using CPDP
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
Mis cloud computing
Mis cloud computingMis cloud computing
Mis cloud computing
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
 
Introduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud ComputingIntroduction to Data Storage and Cloud Computing
Introduction to Data Storage and Cloud Computing
 
Consolidating File Servers into the Cloud
Consolidating File Servers into the CloudConsolidating File Servers into the Cloud
Consolidating File Servers into the Cloud
 
Dynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for CloudDynamic Resource Allocation and Data Security for Cloud
Dynamic Resource Allocation and Data Security for Cloud
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
(Speaker Notes Version) Architecting An Enterprise Storage Platform Using Obj...
 
Iaetsd time constrained self-destructing
Iaetsd time constrained self-destructingIaetsd time constrained self-destructing
Iaetsd time constrained self-destructing
 
Performance,cost and reliability through hybrid cloud storage
Performance,cost and reliability through hybrid cloud storagePerformance,cost and reliability through hybrid cloud storage
Performance,cost and reliability through hybrid cloud storage
 
Advantages Of SAMBA
Advantages Of SAMBAAdvantages Of SAMBA
Advantages Of SAMBA
 
Top 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance SecurityTop 6 Practices to Harden Docker Images to Enhance Security
Top 6 Practices to Harden Docker Images to Enhance Security
 
Auditing Cloud Data With Group
Auditing Cloud Data With GroupAuditing Cloud Data With Group
Auditing Cloud Data With Group
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Storage As A Service (StAAS)

  • 2. Contents 1. Introduction 2. Why StAAS? 3. Types of Storage 4. Object Storage 5. How to create our own Object Storage? 6. Algorithm: Linux 7. Block Storage 8. Benefits of StAAS 9. Future Applications 10.Conclusion 11.References
  • 3. 1. StAAS ● One of the most amazing services of cloud computing service for providing Cyber Storage or Online Remote Storage. ● This remains independent of the Client system and the platform it uses. ● This is a business model where large companies rent space in their storage infrastructure to a smaller company or individual.
  • 4. 2. Why StAAS? ● A good alternative for a small or midsize business that lacks the capital budget and/or personnel to implement and maintain their own storage infrastructure. ● This is also a way to mitigate risks in disaster recovery, provide long-term retention of records and enhance both business continuity and availability.
  • 5. ● Gives the assurance of the following things that are of utmost importance: 1. Security : You would want to make sure that the data is in a secure environment, more secure than you can do yourself. 2. Cost Effectiveness : The service provider must be able to do the handling job at a lower cost than you. 3. Service Developer : The data that you are about to share goes to a trusted source and who takes reliability and gives assurance of the data as and when required.
  • 6. 3. Types of Storage There are 2 types of Remote Storage generally provided by Cloud Storage: 1. Object Storage 2. Block Storage
  • 7. 4. Object Storage ● This is the kind of storage where client only can store its data like Doc, PDF, text, etc. ● You cannot change filesystem if the provided storage and also you cannot create any partitions. ● Type of data storage typically used in SAN(Storage Area Network) environments where dta is stored in volumes, also referred to as blocks. ● Each block acts as an individual hard drive and is configured by the storage administrator.
  • 8. Examples of Object Storage Amazon : Simple Storage Service (S3) Google : Google Drive Dropbox : Free Storage Openstack : Swift
  • 9. 5. How to Create our own Object Storage Service? Case 1: You are going to share Storage from (/) partition Linux. Case 2: Storage sharing with CISF/SMB.
  • 10. 6. Algorithm: Linux Server Side: 1. Select a drive for storage 2. Format it (explain formatting) 3. Create a folder 4. Mount drive into that folder 5. Configure export files 6. NFS install and start 7. Security checks
  • 11. 1. Select a device for storage: Here we would select one device in which all the documents and files would be stored. This is like a target destination for our future works. 2. Format the drive: Formatting refers to the removal of the referral links in a disc space. The links to the space locations are all removed.
  • 12. 3. Create a folder: This folder is created so as to mark the file that we are going to transfer. All the documents that we want to transfer will be kept in this file and this can be directly read from the server/client side. 4. Mount drive into that Folder: Now, we mount a drive into the folder which we have specified.
  • 13. 5. Configure export files: gedit/etc/exports In this file, we have to specify the address from where the data is sent, the access permissions where * represents all and the various permissions associated. /root/Desktop/hi *(rw,no_root_squash) This file moderates the amount of access that is to be given and the various protocols associated with file sharing.
  • 14. 6. NFS install and Start: Network File is a server-client protocol for sharing files between computers on the same network. You can then directly access any of the files on that remote file system. The server and client do not have to use the same operating system. The client system just needs to be running an NFS client compatible with the NFS server. systemctl restart nfs After this, by inconfig, check the IP of the server and that will be used at a later stage.
  • 15. 7. Security Checks: Sometimes, the firewall may block the data from being exchanged. In that case, we do need to stop the firewall settings for a brief time so as to allow the data to flow from one way to another. We do this by: Also, sometimes enforce is active. Check enforce by getenforce. If it is active, then setenforce 0. This will make the system permissive of the data transfer.
  • 16. How to access storage from client side? Client Side 1. Mount folder using sever IP: The client has to just allow the information to come to itself. mount IP:/root/Desktop/hi /mydrive Mount the folder to a particular IP:from where to where.
  • 17. 7. Block Storage ● Breaks a file into individual blocks of data and then stores the blocks as a single piece of data. ● A storage system can do this without having a file folder structure because each block of data has a unique address. ● This allows the storage system to spread the individual blocks of data wherever in the storage system it finds the most efficient. ● The storage system software pulls the necessary blocks back together to assemble the file whenever it is accessed.
  • 18. 8. Benefits of StAAS ● Cost: Time and Money. ● Invisibility: Physical Office Space. ● Security: No Unauthorized Access. ● Automation: Backing Up needs no effort. ● Accessibility: Various devices can be used. ● Syncing: All devices updated at once. ● Sharing: Easy sharing options of file. ● Collaboration: Multiple people can work
  • 19. 9. Future Applications ● Business are becoming more data-driven. Its the new normal. Captured data from a variety of sources has intrinsic value to the whole organization. Your own data might have more value when it’s combined with other public data sources using an analytic or cognitive cloud service. ● 47% of marketing departments will have 60% or more of their applications on a cloud platform in two years. This speaks a lot.
  • 20. 10. Conclusion So, if you have a storage appliance already running in an environment and feel safe that your data is secure, then you better think twice about it. If in case, you have branched offices geographically separated and operate on the data provided by your data storage appliance, then imagine, if your main office gets struck with floods. Your data will vanish and the remote office guys cannot access the data and thus your business continuity will fall into jeopardy. But now imagine, if you synchronized your data storage appliance with cloud storage? Then all your enterprise data will be safe in the cloud and can be accessed by any of your authorized employee from anywhere in the world and will definitely ensure business continuity.
  • 21. 11. References ● https://storageservers.wordpress.com/2015/08/10/advantages-of-storage-as-a-service/ ● https://blogs.it.ox.ac.uk/staas/sample-page/ ● Cloud Computing: LinuxWorld ● https://www.ibm.com/blogs/cloud-computing/2016/08/hybrid-cloud-storage-past- present-future/ ● https://www.networkcomputing.com/storage/future-data-storage-flash-and-hybrid- cloud/396697859