0% found this document useful (0 votes)
20 views

4 Cloud Computing.pptx

Uploaded by

ashwinjw
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

4 Cloud Computing.pptx

Uploaded by

ashwinjw
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 34

CLOUD COMPUTING

S5 BCA
MODULE 4
⦿ Data Storage and Security
◼ Data storage- Introduction to Enterprise Data
Storage
◼ Data Storage Management
◼ File Systems
◼ Cloud Data Stores
◼ Cloud Computing and Security – Risks in Cloud
Computing
◼ Types of Risks
◼ Risk Management Process
CLOUD COMPUTING SECURITY
⦿ Security in cloud computing is a major concern. Data in cloud
should be stored in encrypted form. To restrict client from
accessing the shared data directly, proxy and brokerage services
should be employed.
⦿ Security Planning
⦿ Before deploying a particular resource to cloud, one should need
to analyze several aspects of the resource such as:
⦿ Select resource that needs to move to the cloud and analyze its
sensitivity to risk.
⦿ Consider cloud service models such as IaaS,
PaaS, and SaaS. These models require customer to be
responsible for security at different levels of service.
⦿ Consider the cloud type to be used such as public, private,
community or hybrid.
⦿ Understand the cloud service provider's system about data
storage and its transfer into and out of the cloud.
⦿ The risk in cloud deployment mainly depends upon the service
models and cloud types.
TYPES OF CLOUD COMPUTING
SECURITY CONTROLS
⦿ There are 4 types of cloud computing security
controls i.e.
◼ Deterrent Controls : Deterrent controls are designed to
block nefarious attacks on a cloud system. These come in
handy when there are insider attackers.
◼ Preventive Controls : Preventive controls make the
system resilient to attacks by eliminating vulnerabilities
in it.
◼ Detective Controls : It identifies and reacts to security
threats and control. Some examples of detective control
software are Intrusion detection software and network
security monitoring tools.
◼ Corrective Controls : In the event of a security attack
these controls are activated. They limit the damage
caused by the attack.
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
⦿ A particular service model defines the
boundary between the responsibilities of
service provider and customer. Cloud
Security Alliance (CSA) stack model defines
the boundaries between each service model
and shows how different functional units
relate to each other. The following diagram
shows the CSA stack model:
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
CLOUD SECURITY ALLIANCE
(CSA) STACK MODEL
⦿ IaaS is the most basic level of service with PaaS and
SaaS next two above levels of services.
⦿ Moving upwards, each of the service inherits
capabilities and security concerns of the model
beneath.
⦿ IaaS provides the infrastructure, PaaS provides
platform development environment, and SaaS
provides operating environment.
⦿ IaaS has the least level of integrated functionalities
and integrated security while SaaS has the most.
⦿ This model describes the security boundaries at
which cloud service provider's responsibilities end
and the customer's responsibilities begin.
⦿ Any security mechanism below the security boundary
must be built into the system and should be
maintained by the customer.
UNDERSTANDING DATA SECURITY
⦿ Since all the data is transferred using Internet, data security is
of major concern in the cloud. Here are key mechanisms for
protecting data.
⦿ Access Control
⦿ Auditing
⦿ Authentication
⦿ Authorization
⦿ All of the service models should incorporate security mechanism
operating in all above-mentioned areas.
⦿ Isolated Access to Data
⦿ Since data stored in cloud can be accessed from anywhere, we
must have a mechanism to isolate data and protect it from
client’s direct access.
⦿ Brokered Cloud Storage Access is an approach for isolating
storage in the cloud. In this approach, two services are created:
⦿ A broker with full access to storage but no access to client.
⦿ A proxy with no access to storage but access to both client and
broker.
WORKING OF BROKERED CLOUD
STORAGE ACCESS SYSTEM
⦿ When the client issues request to access data:
⦿ The client data request goes to the external
service interface of proxy.
⦿ The proxy forwards the request to the broker.
⦿ The broker requests the data from cloud storage
system.
⦿ The cloud storage system returns the data to the
broker.
⦿ The broker returns the data to proxy.
⦿ Finally the proxy sends the data to the client.
BROKERED CLOUD STORAGE
ACCESS SYSTEM
RISK MANAGEMENT
⦿ Risk management is the process of identifying,
assessing, and controlling threats to an organisation's
system security, capital and resources.
⦿ Effective risk management means attempting to
control future outcomes proactively rather than
reactively.
⦿ In the context of cloud computing, risk management
plans are curated to deal with the risks or threats
associated with the cloud security.
⦿ Every business and organisation faces the risk of
unexpected, harmful events that can cost the
organisation capital or cause it to permanently close.
⦿ Risk management allows organisations to prevent and
mitigate any threats, service disruptions, attacks or
compromises by quantifying the risks below the
threshold of acceptable level of risks.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Cloud computing provides various advantages, such as improved
collaboration, excellent accessibility, Mobility, Storage capacity,
etc. But there are also security risks in cloud computing.
⦿ Some most common Security Risks of Cloud Computing are given
below-
⦿ Data Loss
◼ Data loss is the most common cloud security risks of cloud computing.
It is also known as data leakage. Data loss is the process in which data
is being deleted, corrupted, and unreadable by a user, software, or
application. In a cloud computing environment, data loss occurs when
our sensitive data is somebody else's hands, one or more data
elements can not be utilized by the data owner, hard disk is not
working properly, and software is not updated.
⦿ Hacked Interfaces and Insecure APIs
◼ Cloud computing is completely depends on Internet, so it is
compulsory to protect interfaces and APIs that are used by external
users. APIs are the easiest way to communicate with most of the cloud
services. In cloud computing, few services are available in the public
domain. These services can be accessed by third parties, so there may
be a chance that these services easily harmed and hacked by hackers.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Data Breach
◼ Data Breach is the process in which the confidential data
is viewed, accessed, or stolen by the third party without
any authorization, so organization's data is hacked by the
hackers.
⦿ Vendor lock-in
◼ Vendor lock-in is the of the biggest security risks in cloud
computing. Organizations may face problems when
transferring their services from one vendor to another. As
different vendors provide different platforms, that can
cause difficulty moving one cloud to another.
⦿ Increased complexity strains IT staff
◼ Migrating, integrating, and operating the cloud services is
complex for the IT staff. IT staff must require the extra
capability and skills to manage, integrate, and maintain
the data to the cloud.
TYPES OF SECURITY RISKS OF CLOUD
COMPUTING
⦿ Spectre & Meltdown
◼ Spectre & Meltdown allows programs to view and steal data which is
currently processed on computer. It can run on personal computers,
mobile devices, and in the cloud. It can store the password, your
personal information such as images, emails, and business documents
in the memory of other running programs.
⦿ Denial of Service (DoS) attacks
◼ Denial of service (DoS) attacks occur when the system receives too
much traffic to buffer the server. Mostly, DoS attackers target web
servers of large organizations such as banking sectors, media
companies, and government organizations. To recover the lost data,
DoS attackers charge a great deal of time and money to handle the
data.
⦿ Account hijacking
◼ Account hijacking is a serious security risk in cloud computing. It is the
process in which individual user's or organization's cloud account (bank
account, e-mail account, and social media account) is stolen by
hackers. The hackers use the stolen account to perform unauthorized
activities.
PROCESS OF RISK MANAGEMENT
⦿ Risk management is a cyclically executed process
comprised of a set of activities for overseeing and
controlling risks. Risk management follows a series
of 5 steps to manage risk, it drives organisations to
formulate a better strategy to tackle upcoming risks.
These steps are referred to as Risk Management
Process and are as follows:
⦿ Identify the risk
⦿ Analyze the risk
⦿ Evaluate the risk
⦿ Treat the risk
⦿ Monitor or Review the risk

Now, let us briefly understand each step of the risk


management process in cloud computing.
PROCESS OF RISK MANAGEMENT
⦿ Identify the risk - The inception of the risk management
process starts with the identification of the risks that may
negatively influence an organisation's strategy or
compromise cloud system security. Operational,
performance, security, and privacy requirements are
identified. The organisation should uncover, recognise and
describe risks that might affect the working environment.
Some risks in cloud computing include cloud vendor risks,
operational risks, legal risks, and attacker risks.
⦿ Analyze the risk - After the identification of the risk, the
scope of the risk is analyzed. The likelihood and the
consequences of the risks are determined. In cloud
computing, the likelihood is determined as the function of
the threats to the system, the vulnerabilities, and
consequences of these vulnerabilities being exploited. In
analysis phase, the organisation develops an understanding
of the nature of risk and its potential to affect
organisation goals and objectives.
PROCESS OF RISK MANAGEMENT
⦿ Evaluate the risk - The risks are further ranked based on the severity of
the impact they create on information security and the probability of
actualizing. The organisation then decides whether the risk is acceptable
or it is serious enough to call for treatment.
⦿ Treat the risk - In this step, the highest-ranked risks are treated to
eliminate or modified to achieve an acceptable level. Risk mitigation
strategies and preventive plans are set out to minimise the probability
of negative risks and enhance opportunities. The security controls are
implemented in the cloud system and are assessed by proper assessment
procedures to determine if security controls are effective to produce the
desired outcome.
⦿ Monitor or Review the risk - Monitor the security controls in the cloud
infrastructure on a regular basis including assessing control
effectiveness, documenting changes to the system and the working
environment. Part of the mitigation plan includes following up on risks
to continuously monitor and track new and existing risks.
⦿ The steps of risk management process should be executed concurrently,
by individuals or teams in well-defined organisational roles, as part of
the System Development Life Cycle (SDLC) process. Treating security as
an addition to the system, and implementing risk management process
in cloud computing independent to the SDLC is more difficult process
that can incur higher cost with a lower potential to mitigate risks.
ENTERPRISE DATA STORAGE
⦿ Enterprise data storage in cloud computing is a method for storing business data in
logical pools on the cloud. The data is accessed and uploaded through the internet,
and is typically stored across multiple servers and locations. A cloud service provider
usually owns and manages these servers and locations.
⦿ Here are some benefits of enterprise data storage in cloud computing:
⦿ Large storage capacity: Cloud storage offers a large amount of storage space.
⦿ Minimal costs: Cloud storage eliminates the need to purchase and manage your own
data storage infrastructure.
⦿ Flexibility: Cloud computing allows for increased mobility and scalability. You can
increase your cloud storage capacity without needing to update outdated hardware.
⦿ Data backup: Cloud storage offers greater accessibility to data backup. Cloud
backup, also known as online backup or remote backup, sends a copy of a file or
database to an off-site location for preservation.
⦿ High performance: Cloud storage offers high availability and performance.
⦿ Some examples of enterprise data storage solutions include:
◼ Hitachi Vantara - Offers a suite of enterprise storage solutions, including block, file, and
object storage.
◼ Nutanix - A leading enterprise in the cloud platform, known for hyper-converged
infrastructure.
◼ RackSpace - A cloud storage solution provider that caters to a number of different clients,
including small business owners and enterprise users.
TYPES OF CLOUD STORAGE
SYSTEMS
⦿ In Cloud Computing, Cloud storage is a virtual locker where we
can remotely stash any data. When we upload a file to a
cloud-based server like Google Drive, OneDrive, or iCloud that
file gets copied over the Internet into a data server that
is cloud-based actual physical space where companies store files
on multiple hard drives. Most companies have hundreds of the
these servers known as ‘server farms’ spanning across multiple
locations. So, if our data gets somehow lost we will not lose our
data because it will be backed up by another location. This is
known as redundancy which keeps our data safe from being lost.
⦿ Features of Cloud Storage System:
⦿ The key features of cloud computing are as follows.
⦿ It has a greater availability of resources.
⦿ Easy maintenance is one of the key benefits of using Cloud
computing.
⦿ Cloud computing has a Large Network Access.
⦿ It has an automatic system.
⦿ Security is one of the major components and using cloud
computing you can secure all over the networks.
STORAGE SYSTEMS IN THE CLOUD
⦿ There are 3 types of storage systems in the
Cloud as follows.
⦿ Block-Based Storage System
⦿ File-Based Storage System
⦿ Object-Based Storage System
BLOCK-BASED STORAGE SYSTEM
⦿ Block storage is often used for high-performance applications
like databases and virtual machine file systems.
⦿ Hard drives are block-based storage systems. Your operating
system like Windows or Linux actually sees a hard disk drive. So,
it sees a drive on which you can create a volume, and then you
can partition that volume and format them.
⦿ For example, If a system has 1000 GB of volume, then we can
partition it into 800 GB and 200 GB for local C and local D drives
respectively.
⦿ Remember with a block-based storage system, your computer
would see a drive, and then you can create volumes and
partitions.
⦿ Tools and Services:
◼ Amazon EBS (Elastic Block Store): Provides block storage volumes for
use with Amazon EC2 instances.
◼ Google Persistent Disks: Block storage for Google Compute Engine that
offers high durability and performance.
◼ Azure Disk Storage: High-performance, durable block storage for Azure
virtual machines.
FILE-BASED STORAGE SYSTEM
⦿ File storage provides shared file systems that can be accessed by
multiple clients simultaneously.
⦿ In this, you are actually connecting through a Network Interface Card
(NIC). You are going over a network, and then you can access the
network-attached storage server (NAS). NAS devices are file-based
storage systems.
⦿ This storage server is another computing device that has another disk in
it. It is already created a file system so that it’s already formatted its
partitions, and it will share its file systems over the network. Here, you
can actually map the drive to its network location.
⦿ In this, like the previous one, there is no need to partition and format
the volume by the user. It’s already done in file-based storage systems.
So, the operating system sees a file system that is mapped to a local
drive letter.
⦿ Tools and Services:
◼ Amazon EFS (Elastic File System): A scalable, fully-managed file storage service
for use with AWS services and on-premises resources.
◼ Google Cloud Filestore: Fully-managed file storage service optimized for use
with Google Cloud’s compute instances.
◼ Azure Files: A fully managed file share service in the cloud that can be
mounted simultaneously by cloud or on-premises deployments.
OBJECT-BASED STORAGE SYSTEM
⦿ Object storage is designed for handling large amounts of unstructured
data, such as media files, backups, and archives.
⦿ In this, a user uploads objects using a web browser and uploads an
object to a container i.e., Object Storage Container. This uses the HTTP
Protocols with the rest of the APIs (for example: GET, PUT, POST,
SELECT, DELETE).
⦿ For example, when you connect to any website, you need to download
some images, text, or anything that the website contains. For that, it is
a code HTTP GET request
⦿ Also, there is no hierarchy of objects in the container. Every file is on
the same level in an Object-Based storage system.
⦿ Tools and Services:
◼ Amazon S3 (Simple Storage Service): A scalable object storage service used for
storing large quantities of data, often used for backup, archiving, and content
distribution.
◼ Google Cloud Storage: Offers scalable object storage for unstructured data
with high availability and performance.
◼ Azure Blob Storage: Microsoft's object storage service designed for storing
massive amounts of unstructured data such as images, videos, and backup
files.
FILE SYSTEMS
⦿ In cloud computing, file systems provide storage solutions that
allow users and applications to store, manage, and access files over
a distributed network. These cloud-based file systems are often
fully managed and provide scalability, flexibility, and high
availability, making them ideal for enterprise workloads, shared file
access, data processing, and more.
⦿ Here are the main types of file systems used in cloud computing:
1. Amazon Elastic File System (EFS)
◼ Amazon EFS is a fully managed, scalable file storage service for use with
AWS cloud services and on-premises resources. It is designed for high
availability and durability and allows multiple EC2 instances to access
the same file system concurrently.
◼ Key Features:
Elastic: Automatically scales as you add or remove files.
NFS (Network File System) protocol-based access.
Supports highly parallelized workloads.
Suitable for content management, media processing, and data analytics.
Accessible from both AWS and on-premises via AWS Direct Connect or AWS VPN
FILE SYSTEMS
⦿ Google Cloud Filestore
◼ Google Cloud Filestore is a fully managed file storage service that offers
high performance and scalability for Google Cloud workloads. It provides
network-attached storage for Google Compute Engine and Kubernetes
Engine.
◼ Key Features:
NFS protocol-based access.
Offers both high-performance and standard tiers for different workloads.
Designed for high-throughput, low-latency workloads.
Integration with Google Cloud services like Compute Engine and GKE.
⦿ 3. Azure Files
◼ Azure Files is a fully managed cloud file system service from Microsoft
Azure that provides shared file storage that can be accessed via the
standard SMB (Server Message Block) and NFS protocols. It allows you to
mount the file shares on cloud and on-premises systems.
◼ Key Features:
Supports both SMB and NFS protocols for wide compatibility.
Integrates with Azure Virtual Machines (VMs), Azure Kubernetes Service (AKS), and
other Azure services.
Offers Azure File Sync for caching data on Windows servers to ensure fast access.
Supports scenarios like lift-and-shift file system workloads to the cloud.
FILE SYSTEMS
⦿ Azure NetApp Files
◼ Azure NetApp Files is an enterprise-grade file storage service that
offers high performance and scalability for complex workloads. It
supports NFS and SMB protocols, making it ideal for both Linux and
Windows workloads.
◼ Key Features:
NFS and SMB protocol support for broad compatibility.
Highly performant file storage for applications requiring low-latency and high IOPS.
Fully integrated with Azure and its ecosystem.
Automated backup and disaster recovery options.
⦿ Google Cloud Persistent Disks with NFS
◼ While Google Cloud Persistent Disks are block storage, you can
configure them with NFS to use as a shared file system. It is particularly
useful for workloads where shared storage is needed across multiple
Google Compute Engine instances.
◼ Key Features:
Easily attachable and detachable storage volumes.
Can be shared between multiple virtual machines using NFS.
High durability and scalability with automatic replication.
Useful for legacy applications requiring NFS-based file storage.
FILE SYSTEMS
⦿ IBM Cloud File Storage provides fully managed, scalable,
and high-performance file storage for IBM Cloud virtual
servers. It offers shared file storage over NFS, which is
suited for workloads requiring high throughput.
◼ Key Features:
NFS-based shared storage.
Allows file access by multiple virtual servers simultaneously.
Tiered performance options based on throughput and IOPS requirements.
Supports snapshots and backups.
⦿ Oracle Cloud File Storage Service
◼ Oracle Cloud File Storage is a scalable, fully managed file
storage service that supports the NFS protocol. It provides
consistent performance, scalability, and integrated security for
enterprise workloads.
◼ Key Features:
NFS protocol for wide compatibility with existing applications.
High availability and automatic scaling.
Integrated with Oracle Cloud services.
Optimized for Oracle applications and databases.
FILE SYSTEMS
⦿ Red Hat Gluster Storage
◼ Red Hat Gluster Storage is a software-defined file storage solution that
is particularly well-suited for cloud environments. It can be deployed on
various cloud providers and enables the creation of distributed, scalable
file storage.
◼ Key Features:
Software-defined, distributed file system for scalability.
Open-source and compatible with various cloud environments.
Suitable for on-premises, hybrid, and multi-cloud deployments.
NFS and SMB protocol support.
⦿ Alibaba Cloud Network Attached Storage (NAS)
◼ Alibaba Cloud NAS is a distributed file system that provides scalable,
high-performance, and fully-managed file storage for applications and
services hosted in Alibaba Cloud.
◼ Key Features:
Supports NFS and SMB protocols.
Scalable, shared file system for multiple instances.
Easy integration with Alibaba Cloud ECS (Elastic Compute Service) and other
Alibaba Cloud services.
High availability and data redundancy.
FILE SYSTEMS
⦿ Ghost Files (in File Systems) - "Ghost files" typically
refer to files that are "invisible" or inaccessible to the
user but still exist on the storage medium. These
files may be:
◼ Orphaned Files: Files that remain on disk after a program
or system crash, or after an improper uninstall, without
being fully deleted or accounted for by the file system.
◼ Deleted Files: Files that the user has deleted, but the
data remains on the disk because only the reference to
the file is removed from the file system's index (until the
data is overwritten).
◼ Hidden Files: Files that are marked as hidden by the
operating system (with attributes like "hidden" in Windows
or prepending a dot in Linux).
◼ Cache or Temporary Files: Files created by applications
for temporary use that are not visible or easily accessible
to the user.
CLOUD DATA STORES
⦿ Cloud data stores refer to various types of cloud-based storage services designed
to store, manage, and access data in the cloud. These services cater to different
data models, performance needs, and workloads, ranging from simple object
storage to complex database solutions. Here are the main types of cloud data
stores:
1. Object Storage - Object storage is designed for storing large amounts of
unstructured data such as files, media, and backups. It provides high scalability,
durability, and availability, making it suitable for archiving and content distribution.
⦿ Examples:
◼ Amazon S3 (Simple Storage Service): Provides scalable object storage for unstructured
data and offers features like versioning, lifecycle policies, and cross-region replication.
◼ Google Cloud Storage: A highly scalable object storage for storing and retrieving any
amount of data at any time.
◼ Azure Blob Storage: Designed for storing massive amounts of unstructured data like
documents, images, and video files.
2. Block Storage - Block storage provides raw storage volumes (blocks) that can be
attached to virtual machines or servers. It offers low-latency, high-performance
storage suitable for applications that require fast I/O operations like databases and
enterprise applications.
⦿ Examples:
◼ Amazon EBS (Elastic Block Store): Block storage for Amazon EC2 instances with SSD and
HDD options for different performance needs.
◼ Google Persistent Disk: A scalable and durable block storage for Google Compute Engine
VMs.
◼ Azure Disk Storage: High-performance, durable storage for Azure virtual machines.
CLOUD DATA STORES
3. File Storage - Cloud file storage provides shared file systems that can be
accessed by multiple users or applications, often used for workloads that
require file-level access such as media workflows, home directories, or
shared project files.
⦿ Examples:
◼ Amazon EFS (Elastic File System): Fully-managed file storage for Amazon EC2
instances that can scale automatically.
◼ Google Cloud Filestore: A fully managed file storage service designed for
Google Cloud workloads.
◼ Azure Files: A managed file share service in the cloud accessible via standard
SMB or NFS protocols.
4. Relational Databases (RDBMS) - Relational cloud data stores manage
structured data using predefined schemas and SQL queries. These databases
are ideal for transactional applications, e-commerce platforms, and
enterprise resource planning (ERP) systems.
⦿ Examples:
◼ Amazon RDS (Relational Database Service): Managed service for running
databases like MySQL, PostgreSQL, Oracle, and SQL Server.
◼ Google Cloud SQL: A fully managed relational database service for MySQL,
PostgreSQL, and SQL Server.
◼ Azure SQL Database: A fully managed relational database service that offers
scalability and high availability.
CLOUD DATA STORES
5. NoSQL Databases - NoSQL databases store unstructured or semi-structured data,
allowing for more flexible data models than relational databases. These databases are
typically used in big data applications, real-time analytics, or scenarios requiring high
availability and scalability.
⦿ Examples:
◼ Amazon DynamoDB: A key-value and document database that delivers single-digit
millisecond performance.
◼ Google Cloud Firestore: A NoSQL document database for building real-time, scalable
applications.
◼ Azure Cosmos DB: A globally distributed, multi-model database supporting document,
graph, and key-value models.
◼ Bigtable is a distributed, scalable, and high-performance NoSQL database developed by
Google.
6. Data Warehouses - Cloud data warehouses are optimized for querying large
volumes of structured data and are used for business intelligence, reporting, and data
analytics.
⦿ Examples:
◼ Amazon Redshift: A fully managed data warehouse that offers fast query performance
using SQL for big data analytics.
◼ Google BigQuery: A serverless, highly scalable, and cost-effective multi-cloud data
warehouse.
◼ Azure Synapse Analytics: An integrated analytics service that allows querying both
relational and non-relational data at scale.
CLOUD DATA STORES
7. Data Lakes - Data lakes are storage systems that can hold massive
amounts of structured, semi-structured, and unstructured data. They are
typically used for storing raw data for analytics, big data processing, and
machine learning.
⦿ Examples:
◼ Amazon S3 (for Data Lakes): Often used in conjunction with AWS Glue and
AWS Lake Formation to create data lakes.
◼ Google Cloud Storage (for Data Lakes): Used to store raw data in combination
with services like Google Dataflow and Dataproc.
◼ Azure Data Lake Storage: A scalable and secure data lake service that
supports high-performance analytics.
8. In-Memory Databases - In-memory databases store data in the system’s
RAM to provide ultra-fast data retrieval and processing, often used for
caching, session management, and real-time analytics.
⦿ Examples:
◼ Amazon ElastiCache: A fully managed service for deploying, operating, and
scaling in-memory data stores like Redis and Memcached.
◼ Google Cloud Memorystore: A managed Redis and Memcached service for
low-latency data access.
◼ Azure Cache for Redis: A fully managed in-memory data store based on Redis
for caching and session management.
CLOUD DATA STORES
9. Cold Storage / Archival Storage - Cold storage services are designed for
long-term retention of data that is rarely accessed. These solutions provide
lower costs compared to other storage options but have higher access
latencies.
⦿ Examples:
◼ Amazon Glacier: Low-cost storage designed for data archiving and long-term
backup.
◼ Google Cloud Archive Storage: A highly durable, low-cost archival storage
option.
◼ Azure Archive Storage: A storage tier optimized for data that is rarely
accessed but needs to be preserved long-term.
10. Hybrid and Multi-Cloud Storage Solutions - These solutions enable
organizations to integrate on-premises infrastructure with cloud storage,
providing flexibility to store data across both environments.
⦿ Examples:
◼ AWS Storage Gateway: A hybrid cloud storage service enabling on-premises
applications to access cloud storage for backups and archiving.
◼ Google Cloud Storage Transfer Service: Moves data between on-premises
storage and Google Cloud.
◼ Azure StorSimple: Combines on-premises storage with cloud-based storage
tiers for data management and backups.

You might also like