National Data Store 2 Secure Storage Cloud with efficient and easy data access
|
|
- Marylou Kelley
- 5 years ago
- Views:
Transcription
1 National Data Store 2 Secure Storage Cloud with efficient and easy data access Michał Jankowski, Maciej Brzeźniak Supercomputing Dept. of PSNC, Authors: NDS2 team at PSNC and partners full list of credits at the end of presentation Project funded by: NCBiR for under KMD2 project (no. NR /2011) FullPolishnameof theproject: System bezpiecznego przechowywania i współdzielenia danych oraz składowania kopii zapasowych i archiwalnych w Krajowym Magazynie Danych Project partners 10 Polish universities and supercomputing centres:
2 NDS2: Presentationplan Requirements: Secure, reliable and efficient data storage with easy and transparent interface Problem: Requirements are contradictory Our solution: Client side on-the fly encryption Key echange hierarchy for data sharing Demonstration: Software client screenshots End-user devices Discussion
3 NDS2: usecasesand requirements 3
4 NDS2: usecases 1. Individual user(scientist, researcher, student): Individual account on the remote storage Data to be available, persistent and safe Easyand efficientaccessto data fromvariousoss Transparent safety and security mechanisms Shareand publishthedata Data storage and access DATA REMOTE STORAGE Data sharing and publication DATA SECURED and REPLICATED DATA
5 NDS2: usecases 2. Institution, workgroup (digital library, scientific project) Use local, possibly existing accounts The data must be available, persistent and safe Local working space with simple and efficient access through typical LAN protocols(cifs, NFS) Local space should be extended by a remote space remotespaceisa backup of local,localiscacheof remote, etc. Local storage and access Remote backup and retrieval DATA CIFS/samba LOCAL STORAGE SFTP REMOTE STORAGE DATA SECURED and REPLICATED DATA
6 NDS2: problem definition 6
7 NDS2:secure, efficient and easy to use To provide in the same time: Data safety and security Efficiency of data storage and access Transparency of safety and security mechanisms Sharing support Support for data publication These are contradictory!
8 NDS1 and PLATON Archiving Services NDS project( ): User National Data Store Distributed, replicated storage Server side Virtual Filesystem in user space (Linux) Standard access protocols Metadata DB Users DB DB Node Accounting & limits DB Access Methods Servers (SSH, HTTPs, WebDAV...) VFS for data and meta-data NDS system logic Replica access methods servers (NFS, GridFTP) Replication Storage Node Access Node Storage Node Automatic replication FS with data migration (HSM) HSM system (NFS) NAS appliance PLATON ( ) PLATON Archiving Service Production deployment of NDS foracademicsin Poland connected to NREN 10 sites in Poland Tapes: 12+ PB in 5 sites Disks: 2+ PB in 10 sites
9 NDS2 a secure and extended NDS NDS and PLATON experience: Replication, data persistency etc. OK! Encryption (privacy) and integrity control needed! Manual implementation too complicated Existing tools not good enough System shoud better integrate with user s system (Win, Linux, mobiles ) and institution/ workgroup environment NDS2( ): National Data Store 2: End-to-end encryption& integrity control Easy and efficient data exchange Virtualdisksfor Windows, Linux Appliance for institutions Portable GUI client for individuals Mobile clients
10 NDS2 cryptography: encryption, integrity control and keys management 10
11 NDS2 cryptography: algorithms Overall concept: Data encrypted with AES-256 CTR AES - Strong and high performance algorithm for bulk data, resistant to brute force attacks Hardware supported: Intel Westmere and ARMv8 Performance: 1-2,5 GB/s on modern workstations CTR mode enables parallelism Integrity controlled using SHA-512: Resistant to collisions and attacks Calculated: User-side (per 64kB logical block) in order to enable users to detect manipulations or corruption on data or their digest System-side (per file) for replica integrity control
12 NDS2 cryptography: keysmanagement Proper key granulation is the clue! Separatekey for eachfile vsone key for the whole system Key hierarchies for easy and efficient sharing Separate key per file but: Exchange keys on directory or user group level The exchange is transparently done while managing dir access or group Small-scale sharing keys hierarchy Large-scale sharing keys hierarchy
13 NDS2 cryptography: moredetails More details: NDS2 paper submitted to TNC2013
14 NDS2 cryptographicclients: Features& concept: Implementation, 14
15 File system likeclients easy! Windows users CryptoFS 4Windows FS-like access (.net CallbackFS) Encryption & digests (.net crypto API) SFTP client (Rebex SFT library) Linux users CryptoFS 4Linux SSHFS extension FS-like access (FUSE/SSHS) Encryption & digests (OpenSSL) SFTP client (Built-into SSHFS) Workgroups Appliance LAN access through CIFS (Samba server) FS-like access (CryptoFS 4 Linux) Admin. interface (php+ perl) Local disk storage WAN (SFTP) NDS filesystem (extended with versioning, ACLs) SECURED and REPLICATED DATA
16 Dedicatedclients -evenmorefromnds2! Any platform Java GUI, CLI and API Browser-like access Drag & dropp Encryption & digests (Bouncy Castle) SFTP client (JSCH sftp) Metadata search Mobile platform mmm Android client Browser-like access Encryption & digests (Java API) SFTP client (Java API) Integration with Android shell WAN (SFTP) SECURED and REPLICATED DATA
17 NDS2 appliance concept LAN NDS2appliance Local disk space Users Data access & sharing (CIFS) SMB/CIFS server MGMT interface (web) Remote storage/ backup space Backup/ restore Data access + encryption WAN LDAP/ Active Directory server Appliance admin Private cloud Public cloud
18 NDS2: appliance implementation Physical appliance: Box for small groups/ instiutions Small and silent, green; fits below the desk! CPUs with AES-NI support Up to 2TB internal storage (2.5 HDDs) or green SSDs Cheap! up to 500EUR including storage Low power! Rack server for bigger institutions Rack server (1U, 19 ) with more disk capacity: CPUs with AES-NI Up 16 TB of RAW storage (4x 4TB HDD) Intermediate costs - ~2000EUR SC and SD cards for keys storage Virtual appliance: VM running on clients s hardware Hardware aid for keys protection Smart cards and SD cards for keys storage / backup SC and SD readers built into appliance Key backup/restore wizards / feature in appliance Virtual machine: Runnable on client virtualisation platform or workstation, no assumptions on hardware Need some local storage and CPU cores for encryption
19 NDS2 cryptographicclients: Demonstration 19
20 NDS2: Demonstration Here we show screenshots Full demonstration available at PSNC/PIONIER booth: Demonstration: Windows and Linux clients Android clients Appliance based on compact ASRock Vision HT box Location and time: PSNC boothbox nr. 14 During coffee breaks ontuesday15:30-16:00 and Wednesday 10:30-11:00 Please contact me at PSNC booth or by: You are welcome to try out our demo and discuss solution
21 NDS2: ndscryptofs4windows Login screen: Login name Login certificate containing a private key for authentication Server connection details Certificatecontaining4kB-long RSA key pair for data encryption Remote storage space visible and accessible as a local drive
22 NDS2: ndscryptofs4linux (1) Original directory content (user view) Encrypted directory content (server view)
23 NDS2: ndscryptofs4linux (2) Original file content (user view) Encrypted file content(server view)
24 NDS2: GUI(1) NDS2/SFTP Server connection details: Server name Server port Login screen: Login name Private RSA key for authentication Server connection details 4kB-long RSA keys pair for data encryption Needs localisation
25 NDS2: GUI (2) GUI client: supports Drag & Drop builds the upload jobs database if many files are dropped enables to monitor status of these jobs, pausing/resuming them etc. Metadata search XATTR, ACL support
26 NDS2: GUI (3) GUI client: Data are encrypted and integrity-controlled in the encrypted directory Remaining data are stored unencrypted Progress bars monitor upload/download status
27 NDS2: Android client
28 NDS2: Appliance (1) Appliance administration interface NDS2 (or SFTP server) connection configuration Network settings configuration Internal appliance disks/ RAIDs configuration
29 NDS2: Appliance (2) Appliance: end-user experience Data storedinnds2/sftp server Accessible through appliance and CIFS protocol Network share defined in appliance Access to data fromtheend-userworkstation remotestoragespaceaccessiblethroughcifs and NDS2 appliance
30 Discussion 30
31 NDS2: cryptographic filesystems &clients POSIX-like, local drive-like access: Natural interface for users Compatible with many applications Works on most popular OSs All versions of Windows Linux most distributions GUI clients: All NDS2 features Portable (Java, Android) Achieved High data security(persistency and privacy) Transparency and easy of use Efficiency(localspace, CPU) Possible improvements: Client-side caching Integration with sync & share applications (e.g. Dropbox)
32 NDS2: cryptographic appliance Network share interface Natural interface for regular users, workgroups etc. Compatible with many applications Different spaces: local/remote encrypted/unencrypted Achieved High data security(persistency and privacy) Transparency and easy of use Efficiency: lowoverhead on enduser resources Easy integration with existing customer infrastructure Possibility to offer the solution in various sizes and models (small-big appliance, virtual machine) Possible improvements: Intelligent caching HSM-like
33 National Data Store 2 crypto-clients - demonstration Thank you! Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:
34 National Data Store 2 crypto-clients - demonstration PSNC team: Maciej Brzeźniak, Gracjan Jankowski, MichałJankowski, Staszek Jankowski, Tomasz Jankowski Adam Zawada Sławomir Zdanowski Rafał Mikołajczak Credits: Partners: Tomasz Chmiel, Łukasz Kuczyński, Michał Major, Łukasz Redynk, Kamil Guryn, and others Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:
35 NDS2 crypto filesystems vs EncFS, Boxcryptor etc. Boxcryptor& EncFS similarities Boxcryptor(Win, ios, Android) supports EncFS data format Data in the cloud protected on-the-fly, local disk-like access Differences: Functionality: BC and EncFSstoredata inthelocalfilesystem, transfer to cloudout of scope EncFS+ SSHFS wouldrequirei/o to traversetwovfss, similarproblem for BC Security and sharing: Feature NDS2 Box cryptor/ EncFS File encryption algorithm / keytype Symmetric (AES 256 CTR) Symmetric (AES 256) Key usage Generated per-file Common for all files File name encryption Shared data encryption Symmetric(AES 256) keyderived from dir s asymmetric private key Per-directory asymmetric key,encrypted with private users key or group key Common for data and names Common key for every user no fine-grained keys management
36 National Data Store 2 crypto-clients - demonstration Backup slides Project funded by: NCBiR for under KMD2 project(no. NR /2011) Project partners 10 Polish universities and supercomputing centres:
37 Safe data sharing & publishing Secure sharing Sharing with other NDS2 users Very high level of security: symm. and asymm. Key handling combination (more elaboration elsewhere) Secure publishing and import/export from/to World Similar to get file link on Dropbox Works in both directions It s safer than with Dropbox Trust Safe key exchange Safe key exchange NO Trust Data access NO Trust Data access & storage Data access import/ export publication NDS2 sandbox
38 Requirements addressed in NDS and by PLATON Archiving Services Features Comments Data availability& persistency Replication, consistency checks Basic security Data sharing within a group Easy and efficient access Safery mechanisms transparent & scalable Transfer encryption, access control at rest, policies(media degaussing) Server-side Linux filesystems mechanisms for access control Access to data through number of protocols: SFTP, WebDAV, Web GUI, GridFTP First replica created by user using a convenientprotocol; then replicas created async. using GridFTP for efficiency in WAN
39 NDS2 Features End-to-end security: privacy & integrity Easy access, safety mechanisms transparency Rollback and versioning Easy, efficient and secure data exchange Mobile access Efficient & easy local storage & access + remote backup Comments AES-256 for data, RSA for key exchange, SHA digests Client-side cryptograpghy provided by easy to use clients: virtual filesystems, Java GUI Server-side versioning + support in clients Symm. and assym. key hierarchy, key exchange mechanisms Android application Appliance for institutions
40 NDS2 cryptography: encryption, integrity control and keys mgmt (2) Client-side encryption and integrity control: AES 256 CTRgenerated per file for data privacy Stored in the file header on the system side Protected with user s private RSA key => User takes care of only 1 pair of keys SHA-512 digests calculated per logical 64-byte block Stored with each block on the system side Protected by encryption using files symetric key => User application may access digest information using file s AES key
41 Clients for NDS2(3) Dropbox-like functionality Experimental data sync client 4 Windows: Based on CryptoFS4Win components MS Synchronisation Framework for synchronisation WAN (SFTP) SECURED and REPLICATED DATA
Update for TF-Storage. TF-Storage September 22nd, 2014
Update for TF-Storage TF-Storage meeting @Uppsala, September 22nd, 2014 National Data Storage 2 Short reminder what is this about: Security in Cloud? April 1, 2014 The Heartbleed bug Feb 26, 2014 Is catastrophic
More informationMaciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski HPC Department, PSNC, Poznan
BOX@PSNC Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski HPC Department, PSNC, Poznan BOX@PSNC - OVERVIEW Where we are and why Seafile - features, motivation Seafile operations and usage experience
More informationSynchronisation solutions,
Synchronisation solutions, NDS2 Cryptobox Kamil Guryn, BIAMAN, www.pb.edu.pl Maciej Brzeźniak, PSNC, www.psnc.pl & NDS2 project partners: Presentation agenda Background Features of good synchronisation
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More informationXtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL
XtreemStore A SCALABLE STORAGE MANAGEMENT SOFTWARE WITHOUT LIMITS YOUR DATA. YOUR CONTROL Software Produkt Portfolio New Products Product Family Scalable sync & share solution for secure data exchange
More informationFIRST EXPERIENCE WITH SEAFILE SYNC & SHARE SOLUTION
FIRST EXPERIENCE WITH SEAFILE SYNC & SHARE SOLUTION Maciej Brzeźniak, Stanisław Jankowski, Sławomir Zdanowski, Krzysztof Wadówka box.psnc.pl PSNC, Poznań, Poland AGENDA NRENs in sync & share business:
More informationDyadic Security Enterprise Key Management
Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system
More informationZadara Enterprise Storage in
Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents
More informationCyberStore DSS. Multi Award Winning. Broadberry. CyberStore DSS. Open-E DSS v7 based Storage Appliances. Powering these organisations
Multi Award Winning CyberStore DSS CyberStore DSS CyberStore DSS Storage Appliances: Open-E DSS v7 based Storage Appliances The CyberStore DSS range of iscsi SAN / NAS storage appliances include 1U-4U
More informationStorage and File Hierarchy
COS 318: Operating Systems Storage and File Hierarchy Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics Storage hierarchy File system
More informationCOS 318: Operating Systems
COS 318: Operating Systems File Systems: Abstractions and Protection Jaswinder Pal Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Topics What s behind
More informationA Simple Mass Storage System for the SRB Data Grid
A Simple Mass Storage System for the SRB Data Grid Michael Wan, Arcot Rajasekar, Reagan Moore, Phil Andrews San Diego Supercomputer Center SDSC/UCSD/NPACI Outline Motivations for implementing a Mass Storage
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationThe role of PIONIER network in long term preservation services for cultural heritage institutions in Poland
The role of PIONIER network in long term preservation services for cultural heritage institutions in Poland Marcin Werla (mwerla@man.poznan.pl) Poznań Supercomputing and Networking Center Poznań, POLAND
More informationManaging the Cisco APIC-EM and Applications
Managing Cisco APIC-EM Using the GUI, page 1 Cisco APIC-EM Application Separation, page 1 Information about Backing Up and Restoring the Cisco APIC-EM, page 4 Updating the Cisco APIC-EM Software, page
More informationXcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5
TECHNOLOGY BRIEF Xcellis Technical Overview: A deep dive into the latest hardware designed for StorNext 5 ABSTRACT Xcellis represents the culmination of over 15 years of file system and data management
More informationCloudTurbine Security White Paper
CloudTurbine provides unique opportunities for secure data streaming between computers over local and wide area networks. CloudTurbine leverages data security provided by file storage and networking layers
More informationEncrypted Local, NAS iscsi/fcoe Storage with ZFS
Encrypted Local, NAS iscsi/fcoe Storage with ZFS OpenSolaris ZFS Crypto Project Darren Moffat James Hughes Anthony Scarpino Sun Microsystems Inc. ZFS Elevator Pitch To create a reliable storage system
More informationDell EMC CIFS-ECS Tool
Dell EMC CIFS-ECS Tool Architecture Overview, Performance and Best Practices March 2018 A Dell EMC Technical Whitepaper Revisions Date May 2016 September 2016 Description Initial release Renaming of tool
More informationUNIVERSITY OF CYPRUS Computer Science Department
UNIVERSITY OF CYPRUS Computer Science Department ΕΠΛ 660 Information Retrieval and Search Engines A guide for connecting to LInC 1 -powered cloud-based Virtual Machines Lab instructor: Pavlos Antoniou
More informationBackup Solution. User Guide. Issue 01 Date
Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3
More informationIOPStor: Storage Made Easy. Key Business Features. Key Business Solutions. IOPStor IOP5BI50T Network Attached Storage (NAS) Page 1 of 5
IOPStor: Storage Made Easy Application data, virtual images, client files, email, the types of data central to running a successful business can seem endless. With IOPStor you finally have an advanced
More informationOutline. ASP 2012 Grid School
Distributed Storage Rob Quick Indiana University Slides courtesy of Derek Weitzel University of Nebraska Lincoln Outline Storage Patterns in Grid Applications Storage
More informationObject storage platform How it can help? Martin Lenk, Specialist Senior Systems Engineer Unstructured Data Solution, Dell EMC
Object storage platform How it can help? Martin Lenk, Specialist Senior Systems Engineer Unstructured Data Solution, Dell EMC Files vs. Object File Metadata: Name: Picture.jpg Path: /mnt/pictures Owner:
More informationFIPS Non-Proprietary Security Policy
Quantum Corporation Scalar Key Manager Software Version 2.0.1 FIPS 140-2 Non-Proprietary Security Policy Document Version 1.4 Last Update: 2010-11-03 8:43:00 AM 2010 Quantum Corporation. May be freely
More informationCompatibility and Support Information Nasuni Corporation Boston, MA
Information Nasuni Corporation Boston, MA Contents 1. Introduction... 1 2.... 1 2.1. Virtualization platforms... 1 3. Filers... 2 3.1. Filer properties... 2 3.2. Clients... 4 3.3. VSS... 7 3.4. Security...
More informationThe Balabit s Privileged Session Management 5 F5 Azure Reference Guide
The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity
More informationData Protection for Cisco HyperFlex with Veeam Availability Suite. Solution Overview Cisco Public
Data Protection for Cisco HyperFlex with Veeam Availability Suite 1 2017 2017 Cisco Cisco and/or and/or its affiliates. its affiliates. All rights All rights reserved. reserved. Highlights Is Cisco compatible
More informationAvailability for the modern datacentre Veeam Availability Suite v9.5
Availability for the modern datacentre Veeam Availability Suite v9.5 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50 64 Robin van der Steenhoven Territory
More informationGlusterFS and RHS for SysAdmins
GlusterFS and RHS for SysAdmins An In-Depth Look with Demos Sr. Software Maintenance Engineer Red Hat Global Support Services FISL 7 May 2014 Introduction Name: Company: Red Hat Department: Global Support
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationComparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance. By Akshay Thorat
Comparison of SSL/TLS libraries based on Algorithms/languages supported, Platform, Protocols and Performance By Akshay Thorat Table of Contents TLS - Why is it needed? Introduction- SSL/TLS evolution Libraries
More informationNetwork Storage Appliance
Enterprise File System HyperFS integrates high-performance SAN, NAS and data protection under one namespace. No Per Seat Client Cost Based on concurrent RAID performance, connectivity, bandwidth, drive
More informationDX-2104 / 2112 series NAS Affordable, Simple, and Reliable Enterprise-class NAS
DX-2104 / 2112 series NAS Affordable, Simple, and Reliable Enterprise-class NAS Dax DX2104/ 2112 NAS series aims to bring the enterprise-class features into SMB market at competitive price, helps organizations
More informationQsync. Cross-device File Sync for Optimal Teamwork. Share your life and work
Qsync Cross-device File Sync for Optimal Teamwork Share your life and work Agenda Users' common issues QNAP NAS specifications recommended by various types of users Usage scenarios and Qsync application
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationA User-level Secure Grid File System
A User-level Secure Grid File System Ming Zhao, Renato J. Figueiredo Advanced Computing and Information Systems (ACIS) Electrical and Computer Engineering University of Florida {ming, renato}@acis.ufl.edu
More informationSGI Overview. HPC User Forum Dearborn, Michigan September 17 th, 2012
SGI Overview HPC User Forum Dearborn, Michigan September 17 th, 2012 SGI Market Strategy HPC Commercial Scientific Modeling & Simulation Big Data Hadoop In-memory Analytics Archive Cloud Public Private
More informationjetnexus Virtual Load Balancer
jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and
More informationStorage for HPC, HPDA and Machine Learning (ML)
for HPC, HPDA and Machine Learning (ML) Frank Kraemer, IBM Systems Architect mailto:kraemerf@de.ibm.com IBM Data Management for Autonomous Driving (AD) significantly increase development efficiency by
More informationIME (Infinite Memory Engine) Extreme Application Acceleration & Highly Efficient I/O Provisioning
IME (Infinite Memory Engine) Extreme Application Acceleration & Highly Efficient I/O Provisioning September 22 nd 2015 Tommaso Cecchi 2 What is IME? This breakthrough, software defined storage application
More informationAlliance Key Manager A Solution Brief for Partners & Integrators
Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers
More informationConstruct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments
Construct a High Efficiency VM Disaster Recovery Solution Best choice for protecting virtual environments About NAKIVO Established in the USA since 2012 Provides data protection solutions for VMware, Hyper-V
More informationBackup and Restore Operations
Backup Data Type, page 1 Backup and Restore Repositories, page 2 On-Demand and Scheduled Backups, page 3 Cisco ISE Restore Operation, page 8 Export Authentication and Authorization Policy Configuration,
More informationInteroperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption
Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption December 2015 Executive Summary Thales payshield enterprise
More informationStorage and File System
COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationWhose Cloud Is It Anyway? Exploring Data Security, Ownership and Control
Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the
More informationDistributed Systems 16. Distributed File Systems II
Distributed Systems 16. Distributed File Systems II Paul Krzyzanowski pxk@cs.rutgers.edu 1 Review NFS RPC-based access AFS Long-term caching CODA Read/write replication & disconnected operation DFS AFS
More informationSnapServer Family (XSD & XSR)
SnapServer Family (XSD & XSR) Simple, expandable enterprise storage for high-performing resilient environments SnapServer family offers enterprise class unified block and file storage that is workload
More informationHitachi Data Ingestor
Hitachi Data Ingestor Cluster Getting Started Guide Product Version Getting Help Contents MK-90HDICOM001-02 2010-2016 Hitachi, Ltd. All rights reserved. No part of this publication may be reproduced or
More informationDISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?
DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided
More informationticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding
ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com
More informationLustre overview and roadmap to Exascale computing
HPC Advisory Council China Workshop Jinan China, October 26th 2011 Lustre overview and roadmap to Exascale computing Liang Zhen Whamcloud, Inc liang@whamcloud.com Agenda Lustre technology overview Lustre
More informationStorage Virtualization. Eric Yen Academia Sinica Grid Computing Centre (ASGC) Taiwan
Storage Virtualization Eric Yen Academia Sinica Grid Computing Centre (ASGC) Taiwan Storage Virtualization In computer science, storage virtualization uses virtualization to enable better functionality
More informationDiscover the all-new CacheMount
Discover the all-new CacheMount 1 2 3 4 5 Why CacheMount and what are its problem solving abilities Cache function makes the hybrid cloud more efficient The key of CacheMount: Cache Volume User manual
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationDesigning Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015
Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015 What Could It Cost You? Average of $0.58 a record According to the Verizon
More informationjetnexus Virtual Load Balancer
jetnexus Virtual Load Balancer Mitigate the Risk of Downtime and Optimise Application Delivery We were looking for a robust yet easy to use solution that would fit in with our virtualisation policy and
More informationVeritas NetBackup on Cisco UCS S3260 Storage Server
Veritas NetBackup on Cisco UCS S3260 Storage Server This document provides an introduction to the process for deploying the Veritas NetBackup master server and media server on the Cisco UCS S3260 Storage
More informationStratusLab Cloud Distribution Installation. Charles Loomis (CNRS/LAL) 3 July 2014
StratusLab Cloud Distribution Installation Charles Loomis (CNRS/LAL) 3 July 2014 StratusLab What is it? Complete IaaS cloud distribution Open source (Apache 2 license) Works well for production private
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationCOS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy
Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients
More informationCloud Computing and Hadoop Distributed File System. UCSB CS170, Spring 2018
Cloud Computing and Hadoop Distributed File System UCSB CS70, Spring 08 Cluster Computing Motivations Large-scale data processing on clusters Scan 000 TB on node @ 00 MB/s = days Scan on 000-node cluster
More informationIBM Storwize V7000 Unified
IBM Storwize V7000 Unified Pavel Müller IBM Systems and Technology Group Storwize V7000 Position Enterprise Block DS8000 For clients requiring: Advanced disaster recovery with 3-way mirroring and System
More informationGFS: The Google File System
GFS: The Google File System Brad Karp UCL Computer Science CS GZ03 / M030 24 th October 2014 Motivating Application: Google Crawl the whole web Store it all on one big disk Process users searches on one
More informationUpgrading the Cisco APIC-EM Deployment
Review the following sections in this chapter for information about upgrading to the latest Cisco APIC-EM version and verification. Using the GUI to Upgrade Cisco APIC-EM, page 1 Using the CLI to Upgrade
More informationCONFIGURING IBM STORWIZE. for Metadata Framework 6.3
CONFIGURING IBM STORWIZE for Metadata Framework 6.3 Publishing Information Software version 6.3.160 Document version 4 Publication date May 22, 2017 Copyright 2005-2017 Varonis Systems Inc. All rights
More informationSoftware-defined Storage: Fast, Safe and Efficient
Software-defined Storage: Fast, Safe and Efficient TRY NOW Thanks to Blockchain and Intel Intelligent Storage Acceleration Library Every piece of data is required to be stored somewhere. We all know about
More informationSONAS Best Practices and options for CIFS Scalability
COMMON INTERNET FILE SYSTEM (CIFS) FILE SERVING...2 MAXIMUM NUMBER OF ACTIVE CONCURRENT CIFS CONNECTIONS...2 SONAS SYSTEM CONFIGURATION...4 SONAS Best Practices and options for CIFS Scalability A guide
More informationSQL Server on Linux and Containers
http://aka.ms/bobwardms https://github.com/microsoft/sqllinuxlabs SQL Server on Linux and Containers A Brave New World Speaker Name Principal Architect Microsoft bobward@microsoft.com @bobwardms linkedin.com/in/bobwardms
More informationOS6 N2310 N4310 FWRN Build 870
[Release Date] Apr 13, 2017 [Applicable Hardware] N2310 N4310 [Software Upgrade/Downgrade Note] 1. N2310 & N4310 come from 2 difference upgrade file. 2. We recommend backup the RAID data before firmware
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security
RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution
More informationOnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems
OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in
More informationBackup and Restore Operations
Backup Data Type Backup Data Type, on page 1 Backup and Restore Repositories, on page 1 On-Demand and Scheduled Backups, on page 3 Cisco ISE Restore Operation, on page 8 Export Authentication and Authorization
More informationProviding an Enterprise File Share and Sync Solution for
Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)
More informationNexentaStor VVOL
NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationStorage Made Easy Enterprise File Share and Sync Fabric Architecture
Storage Made Easy Enterprise File Share and Sync Fabric Architecture Software Stack The SME platform is built using open Internet technologies. The base operating system uses a hardened version of CentOS
More informationTCC, so your business continues
TCC, so your business continues 1 Whitepaper Executive summary The TCC (Tuxis Cloud Concept) is a smart way to build hosting infrastructures for your private cloud and virtual datacenter. It natively integrates
More informationDell Active Fabric Manager for Microsoft Cloud Platform System 2.2(0.0)
Rev. A06 2017-04 Dell Active Fabric Manager for Microsoft Cloud Platform System 2.2(0.0) This document describes the new features, enhancements, and fixed issues for Active Fabric Manager for Microsoft
More informationData Management. Parallel Filesystems. Dr David Henty HPC Training and Support
Data Management Dr David Henty HPC Training and Support d.henty@epcc.ed.ac.uk +44 131 650 5960 Overview Lecture will cover Why is IO difficult Why is parallel IO even worse Lustre GPFS Performance on ARCHER
More informationTesting storage and metadata backends
Testing storage and metadata backends Hugo González Labrador, Arno Formella LIA2, University of Vigo CS3: Cloud Storage Services for Novel Applications and Workflows Zürich, January 2016 Outline Origin
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationCreating Trust in a Highly Mobile World
Creating Trust in a Highly Mobile World Technical White Paper Oct, 2014 MobileCrypt with Hardware Strength Security MobileCrypt s solution leverages an Android based mobile application and a Hardware Security
More informationCeph Intro & Architectural Overview. Abbas Bangash Intercloud Systems
Ceph Intro & Architectural Overview Abbas Bangash Intercloud Systems About Me Abbas Bangash Systems Team Lead, Intercloud Systems abangash@intercloudsys.com intercloudsys.com 2 CLOUD SERVICES COMPUTE NETWORK
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationCA485 Ray Walshe Google File System
Google File System Overview Google File System is scalable, distributed file system on inexpensive commodity hardware that provides: Fault Tolerance File system runs on hundreds or thousands of storage
More informationUsing EUDAT services to replicate, store, share, and find cultural heritage data
Using EUDAT services to replicate, store, share, and find cultural heritage data in PSNC and beyond Maciej Brzeźniak, Norbert Meyer, PSNC Damien Lecarpentier, CSC 3 October 203 DIGITAL PRESERVATION OF
More informationDistributed File Systems II
Distributed File Systems II To do q Very-large scale: Google FS, Hadoop FS, BigTable q Next time: Naming things GFS A radically new environment NFS, etc. Independence Small Scale Variety of workloads Cooperation
More information#1 Enterprise File Share, Sync, Backup and Mobile Access for Business
#1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return
More informationSUREedge DR Installation Guide for Windows Hyper-V
SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...
More informationStorage Made Easy. Mirantis
Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationExamTorrent. Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you
ExamTorrent http://www.examtorrent.com Best exam torrent, excellent test torrent, valid exam dumps are here waiting for you Exam : 400-251 Title : CCIE Security Written Exam (v5.0) Vendor : Cisco Version
More informationEffizientes Speichern von Cold-Data
Effizientes Speichern von Cold-Data Dr. Dirk Gebh Storage Sales Consultant Oracle Deutschland Program Agenda 1 2 3 4 5 Cold-Data OHSM Introduction Use Case Removing Cold Data from Primary Storage OHSM
More informationirods and Objectstorage UGM 2016, Chapel Hill / Othmar Weber, Bayer Business Services / v0.2
irods and Objectstorage UGM 2016, Chapel Hill 2016-06-08 / Othmar Weber, Bayer Business Services / v0.2 Agenda irods at Bayer Situation and call for action Object Storage PoC Pillow talks Page 2 Overview
More informationIntroduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike
Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations
More informationMicrosoft Windows Embedded Server Overview
Microsoft Windows Embedded Server Overview Comprehensive cloud platform Complete, built-in virtualization platform Industry-leading scalability and performance, so you can virtualize every application
More information