ESPRESSO: An Encryption as a Service for Cloud Storage Systems
|
|
|
- Alaina Allison
- 10 years ago
- Views:
Transcription
1 8th International Conference on Autonomous Infrastructure, Management and Security ESPRESSO: An Encryption as a Service for Cloud Storage Systems Kang Seungmin 30 th Jun., 2014
2 Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 2
3 Introduction and Motivation Cloud storage systems provide high data availability and the flexibility in data management, and they become the primary storage space for cloud users data. Data privacy is one of the most important challenges to be solved due to the shared storage space characteristic of cloud storage systems. Data encryption emerged as one of the most effective means to protect sensitive data. Among existing CSPs, only Google Cloud Storage and Amazon S3 provide such encryption service. Many other CSPs do not have yet this service. 3
4 Main Contribution Proposing a solid encryption service which allows any CSP to integrate it Designing and implementing an encryption service, called ESPRESSO (Encryption as a Service for Cloud Storage Systems). ESPRESSO is a standalone service is configurable and flexible service for both CSPs and cloud users CSPs can choose the encryption algorithm based on their preference Users can specify the critical level of their data is easily integrated. 4
5 Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 5
6 Cloud Storage System Models Cloud users deploy the encryption software on their local machine or on a remote machine in their trusted domain. Cloud users rely on a third party who deploys the encryption software and provides it to users as a service. CSPs deploy the encryption software on a server in its trusted domain as one of its components. Users Internet Storage server Cloud Service Provider Encryption server Storage server 6
7 Overall Architecture of ESPRESSO Universal API submitted Encryption/ Decryption Requests requests data encryption/ decryption Key Generator Encryption as a Service Keys Management Master Key Data Encryptor requests algorithm Encryption Algorithms Data Encryption Management requests keys Encrypted Key Storage Encrypted Key Replicator requests/stores encrypted keys replicates encrypted keys updates DB requests key encryption/ decryption updates DB Primary Keys DB Key Encryptor requests master key Backup Keys DB Two main components Data encryption management. Key management. Supporting flexibility in ESPRESSO AES and Blowfish algorithms. Three critical levels with three key lengths: 128, 192 and 256 bits. 7
8 Implementation of ESPRESSO - dataencryptor UniversalAPI + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) WSGIAPI + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) - keygenerator - algorithm DataEncryptor + encrypt_data(user_id, critical_level, data) + decrypt_data(user_id, encrypted_data) Algorithm - keyencryptor - keystorage KeyGenerator + getuserkey(user_id, critical_level) espresso.keymnt MasterKey + getmasterkey() + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) - keyreplicator KeyStorage AESAlgorithm + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) BlowfishAlgorithm + encrypt_data(key_string, data) + decrypt_data(key_string, encrypted_data) espresso.enmnt + getuserkey(user_id, critical_level) + storeuserkey(user_id, critical_level, encrypted_key) KeyReplicator + replicatekey(key_id, encrypted_key) - masterkey KeyEncryptor + encryptuserkey(user_key) + decryptuserkey(encrypted_key) Implementing the abstract Universal API class to allow multiple CSPs to integrate ESPRESSO, e.g., SwiftAPI. Implementing the abstract Algorithm class to support different encryption algorithms. 8
9 Integration of ESPRESSO into Swift Users ESPRESSO server CSP trusted domain Swift ESPRESSO is deployed on a separate server. The proxy server initializes encryption on ESPRESSO. REST requests Proxy server Storage server All modification were made in swift/proxy/controller/obj.py. Internet switch Keystone server switch Storage server... Storage server Less than 50 code lines were added for encryption and decryption requests in Swift. Parameters of requests: Input data User identification Critical level of data 9
10 Integration of ESPRESSO into Cumulus Internet CSP trusted domain Cumulus interfaces S3 Cumulus Redirection ESPRESSO is deployed on a separate server. The Cumulus interface initializes encryption on ESPRESSO. S3 requests Cumulus API Cumulus Service Implementation Authz DB All modification were made in cumulus/cb/pycb/cbrequest.py. Users ESPRESSO server Cumulus Storage API Cumulus interfaces POSIX HDFS Cumulus Less than 50 code lines were added for encryption and decryption requests in Cumulus. --add-header critical level: A. 10
11 Outline Introduction and motivation Main contribution Detailed proposed solution Cloud storage system models Overall architecture of ESPRESSO Implementation of ESPRESSO Integration of ESPRESSO into Swift and Cumulus Experiments and performance evaluation Conclusion and future work. 11
12 Experiments and Performance Evaluation Experiment setup Deploying the integrated Swift/Cumulus storage system on two dedicated physical servers of the same rack PowerEdge C6220 with Intel(R) Xeon(R) Processor E GHz, 24GB RAM Using real data files which are downloaded from the Wikipedia archive. Data size varies from 100MB to 4000MB (~4GB). Performance metrics Latency of encryption algorithms Latency of the storage system with and without ESPRESSO Impact of network bandwidth Comparison of Swift and Cumulus. 12
13 Experiments and Performance Evaluation Latency of encryption algorithm Encryption time (s) bit key length 192-bit key length 128-bit key length Data size (MB) With the same key length, the larger data volume, the longer time needed to complete the encryption. The longer key provides higher security level, however, needs longer time to complete the encryption. 13
14 Experiments and Performance Evaluation Overall latency with and without ESPRESSO Operation time (s) With encryption service Without encryption service Data size (MB) Without ESPRESSO The total time is considered the data transfer time from the client to the Swift server. With ESPRESSO Additional overhead includes the encryption time and the data transfer time between the Swift and ESPRESSO servers. 14
15 Experiments and Performance Evaluation Impact of network bandwidth Operation time (s) WiFi connection Wired connection Total encryption time Data size (MB) The client machine is 3kms far from the Swift server. The data transfer time dominates in both cases: WiFi (~2 Mbps) Wired connection (~10 Mbps). The observed encryption time overhead is negligible (2.75 mins) compared to the total uploading time (37.45 mins) with the WiFi connection. 15
16 Experiments and Performance Evaluation Swift vs. Cumulus performance The operation times of both systems are almost the same. Swift needs longer time for replicating data with three copies. Cumulus does not provide the replication service. The overhead on Swift is compromised by the fluctuation of data transfer time. 16
17 Conclusion and Future Work We provided ESPRESSO, an encryption service which is Standalone Transparent Flexible Real experiments assess the performance and effectiveness of ESPRESSO. Any CSP can integrate ESPRESSO into its infrastructure without heavy modification. Future Work: integrate ESPRESSO with Homomorphic encryption (HE). 17
18 Thank you for your attention! Q & A 18
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
Ahsay Online Backup Suite v5.0. Whitepaper Backup speed
Ahsay Online Backup Suite v5.0 Version 5.0.1.0 Jan 2006 Table of Content 1 Introduction...3 2 Testing Configuration and Setup...4 2.1 Hardware and Software Setup...4 2.2 Test Scenarios...4 3 Results...5
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Cloud Computing and Amazon Web Services
Cloud Computing and Amazon Web Services Gary A. McGilvary edinburgh data.intensive research 1 OUTLINE 1. An Overview of Cloud Computing 2. Amazon Web Services 3. Amazon EC2 Tutorial 4. Conclusions 2 CLOUD
Lecture 11. RFS A Network File System for Mobile Devices and the Cloud
Lecture 11 RFS A Network File System for Mobile Devices and the Cloud Yuan Dong, Jinzhan Peng, Dawei Wang, Haiyang Zhu, Fang Wang, Sun C. Chan, Michael P. Mesnier Advanced Operating Systems January 4th,
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Hardware/Software Guidelines
There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is
Cloud for PC SOFT applications Pricing
Cloud for PC SOFT applications Pricing Date when pricing takes effect: 6 January 2016 10:51 Overview The Cloud for PC SOFT applications offers operating platforms for your WINDEV, WEBDEV or WINDEV Mobile
Implementing the Application Control Engine Service Module
Course: Implementing the Application Control Engine Service Module Duration: 4 Day Hands-On Lab & Lecture Course Price: $ 2,995.00 Learning Credits: 30 Hitachi HiPass: 4 Description: Implementing the Application
Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms
Distributed File System 1 How do we get data to the workers? NAS Compute Nodes SAN 2 Distributed File System Don t move data to workers move workers to the data! Store data on the local disks of nodes
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Administering Windows Server 2012
Administering Windows Server 2012 Course Summary Configuring and Troubleshooting Domain Name System Maintaining Active Directory Domain Services Managing User and Service Accounts Implementing a Group
Cloud Courses Description
Cloud Courses Description Cloud 101: Fundamental Cloud Computing and Architecture Cloud Computing Concepts and Models. Fundamental Cloud Architecture. Virtualization Basics. Cloud platforms: IaaS, PaaS,
SQL Server Hybrid Features. Luis Vargas, Senior Program Manager Lead Xin Jin, Program Manager @ Microsoft
SQL Server Hybrid Features Luis Vargas, Senior Program Manager Lead Xin Jin, Program Manager @ Microsoft Key Takeaway SQL Server integrates cloud services from Azure providing end-to-end experiences that
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
Office 365 Migration Performance & Server Requirements
Solutions for the Modern Workforce Office 365 Migration Performance & Server Requirements Understanding Migration Performance There are many factors that can affect performance when migrating to Office
Comparing major cloud-service providers: virtual processor performance. A Cloud Report by Danny Gee, and Kenny Li
Comparing major cloud-service providers: virtual processor performance A Cloud Report by Danny Gee, and Kenny Li Comparing major cloud-service providers: virtual processor performance 09/03/2014 Table
Cloud Federation to Elastically Increase MapReduce Processing Resources
Cloud Federation to Elastically Increase MapReduce Processing Resources A.Panarello, A.Celesti, M. Villari, M. Fazio and A. Puliafito {apanarello,acelesti, mfazio, mvillari, apuliafito}@unime.it DICIEAMA,
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i
QUALITY OF SERVICE FOR CLOUD-BASED MOBILE APPS: Aruba Networks AP-135 and Cisco AP3602i Conducted at the Aruba Proof-of-Concept Lab November 2012 Statement of test result confidence Aruba makes every attempt
Infor Web UI Sizing and Deployment for a Thin Client Solution
Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and
Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study
Creating Value Delivering Solutions Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study Chris Zajac, NJDOT Bud Luo, Ph.D., Michael Baker Jr., Inc. Overview
EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications
ECE6102 Dependable Distribute Systems, Fall2010 EWeb: Highly Scalable Client Transparent Fault Tolerant System for Cloud based Web Applications Deepal Jayasinghe, Hyojun Kim, Mohammad M. Hossain, Ali Payani
Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups
IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
Microsoft Exchange Server 2003 Deployment Considerations
Microsoft Exchange Server 3 Deployment Considerations for Small and Medium Businesses A Dell PowerEdge server can provide an effective platform for Microsoft Exchange Server 3. A team of Dell engineers
http://support.oracle.com/
Oracle Primavera Contract Management 14.0 Sizing Guide October 2012 Legal Notices Oracle Primavera Oracle Primavera Contract Management 14.0 Sizing Guide Copyright 1997, 2012, Oracle and/or its affiliates.
LabStats 5 System Requirements
LabStats Tel: 877-299-6241 255 B St, Suite 201 Fax: 208-473-2989 Idaho Falls, ID 83402 LabStats 5 System Requirements Server Component Virtual Servers: There is a limit to the resources available to virtual
Contents Introduction... 5 Deployment Considerations... 9 Deployment Architectures... 11
Oracle Primavera Contract Management 14.1 Sizing Guide July 2014 Contents Introduction... 5 Contract Management Database Server... 5 Requirements of the Contract Management Web and Application Servers...
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Minimum System Requirements
NOTE Consider the information presented in this document as minimum requirements. Your organization may need a more robust configuration for optimal performance. Contact MD EMR Systems before finalizing
Performance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
Public Versus Private Cloud Services
Public Versus Private Cloud Services Table of Contents vs. What constitutes a Public Cloud versus a Private Cloud solution? When considering moving to a public Cloud infrastructure, what questions should
Tertiary Backup objective is automated offsite backup of critical data
Tertiary Backups Entire System Including Windows Installation Data Files, Emails, Databases, Documents Not Important Important Critical Ultra Critical Tertiary Backup Tertiary Backup objective is automated
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
INTRODUCTION TO WINDOWS 7
INTRODUCTION TO WINDOWS 7 Windows 7 Editions There are six different Windows 7 editions: Starter Home Basic Home Premium Professional Enterprise Ultimate Starter Windows 7 Starter edition does not support
High speed Ethernet WAN: Is encryption compromising your network?
High speed Ethernet WAN: Is encryption compromising your network? Trademark: 2010 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet. All other product names
The State of Cloud Storage
205 Industry Report A Benchmark Comparison of Speed, Availability and Scalability Executive Summary Both 203 and 204 were record-setting years for adoption of cloud services in the enterprise. More than
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Cloud Computing @ JPL Science Data Systems
Cloud Computing @ JPL Science Data Systems Emily Law, GSAW 2011 Outline Science Data Systems (SDS) Space & Earth SDSs SDS Common Architecture Components Key Components using Cloud Computing Use Case 1:
Distributed Network Monitoring. netbeez.net Booth #2344
Distributed Network Monitoring Booth #2344 Network Blindness Do users have network connectivity? Is the network degrading application performance? The network monitoring stack Active end- to- end tests
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
Softline VIP Payroll System Requirements v2.9a January 2010
i Softline VIP Payroll System Requirements v2.9a January 2010 Table of Contents Introduction... 1 Assumptions... 1 Standalone Requirements... 2 Note:Peer-to-peer Network Installations... 2 Peer-to-peer
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Aspera Direct-to-Cloud Storage WHITE PAPER
Transport Direct-to-Cloud Storage and Support for Third Party April 2014 WHITE PAPER TABLE OF CONTENTS OVERVIEW 3 1 - THE PROBLEM 3 2 - A FUNDAMENTAL SOLUTION - ASPERA DIRECT-TO-CLOUD TRANSPORT 5 3 - VALIDATION
Hardware and Software Requirements for Sage 50 v15 to v22
Hardware and Software Requirements for Sage 50 v15 to v22 Sage 50 Accounts v22 Note: The Sage Data Service has the same system requirements as Sage 50 Accounts v22. Note: For more information on support
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
Sage Grant Management System Requirements
Sage Grant Management System Requirements You should meet or exceed the following system requirements: One Server - Database/Web Server The following system requirements are for Sage Grant Management to
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Archiving On-Premise and in the Cloud. March 2015
Archiving On-Premise and in the Cloud March 2015 Cloud Storage Storage accessed over a network via web services APIs. http://swift.example.com/v1/account/container/object Source: http://docs.openstack.org/admin-guide-cloud/content/objectstorage_characteristics.html
www.cosmetisuite.com 530-852-0306 [email protected]
Meditab - CosmetiSuite Cloud Hosting 1. System requirements 1.1 Workstations Workstations Workstations (Desktop/Laptop/Tablet PC) High-Usage Workstations (Provider/Critical Tasks) Component Minimum Specifications
Verifying Correctness of Trusted data in Clouds
Volume-3, Issue-6, December-2013, ISSN No.: 2250-0758 International Journal of Engineering and Management Research Available at: www.ijemr.net Page Number: 21-25 Verifying Correctness of Trusted data in
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Table of Contents. Using the plug- in... 11 Pure Storage Flash Array Home Page... 11
Table of Contents Prerequisites... 3 Oracle Environment Prerequisites... 3 Oracle Enterprise Manager... 3 Oracle Management Server (OMS)... 3 Oracle Management Agent (OMA)... 3 Pure Environment Prerequisites...
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
HC900 Hybrid Controller When you need more than just discrete control
HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network
Hadoop Architecture. Part 1
Hadoop Architecture Part 1 Node, Rack and Cluster: A node is simply a computer, typically non-enterprise, commodity hardware for nodes that contain data. Consider we have Node 1.Then we can add more nodes,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL
Getting Started with Attunity CloudBeam for Azure SQL Data Warehouse BYOL Overview This short guide explains how to use Attunity CloudBeam to replicate data from your on premises database to Microsoft
Microsoft Windows Server Update Services Questions & Answers About The Product
Microsoft Windows Server Update Services Questions & Answers About The Product General Information Q. What is Windows Server Update Services (WSUS)? A. WSUS (previously called Windows Update Services)
Adapt Support Managed Service Programs
Adapt Support Managed Service Programs Introduction The purpose of this document is to present the different managed service offerings from Adapt that clients may choose to purchase to supplement their
Online Backup by Mozy. Common Questions
Online Backup by Mozy Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 What is Online Backup by Mozy? Online Backup by Mozy is a secure online data backup
Network Administrator s Guide
Overview Beam is a comprehensive Smart Presence system that couples high-end video, high-end audio, and the freedom of mobility for a crisp and immersive, video experience that enhances collaboration and
System requirements for MuseumPlus and emuseumplus
System requirements for MuseumPlus and emuseumplus System requirements for MuseumPlus and emuseumplus Valid from July 1 st, 2008 Apart from the listed system requirements, the requirements established
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
Lindenbaum Web Conference
Product information Lindenbaum Web Conference Lindenbaum Your partner for high-quality conferencing Scalable, secure and easy-to-use web conference Lindenbaum Web Conference is a secure and reliable web
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
An Oracle White Paper July 2011. Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
Turnkey Deduplication Solution for the Enterprise
Symantec NetBackup 5000 Appliance Turnkey Deduplication Solution for the Enterprise Mayur Dewaikar Sr. Product Manager, Information Management Group White Paper: A Deduplication Appliance Solution for
BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB
BENCHMARKING CLOUD DATABASES CASE STUDY on HBASE, HADOOP and CASSANDRA USING YCSB Planet Size Data!? Gartner s 10 key IT trends for 2012 unstructured data will grow some 80% over the course of the next
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
QHR Accuro EMR IT Hardware Requirements
QHR Accuro EMR IT Hardware Requirements Hardware Requirements for Accuro EMR Table of Contents Local Install Platform:... 3 Server Requirements:... 3 Workstation Requirements:... 4 Peripheral Requirements:...
Cloud Sync White Paper. Based on DSM 6.0
Cloud Sync White Paper Based on DSM 6.0 1 Table of Contents Introduction 3 Product Features 4 Synchronization 5 Architecture File System Monitor (Local change notification) Event/List Monitor (Remote change
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2
DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.
Understanding the Benefits of IBM SPSS Statistics Server
IBM SPSS Statistics Server Understanding the Benefits of IBM SPSS Statistics Server Contents: 1 Introduction 2 Performance 101: Understanding the drivers of better performance 3 Why performance is faster
Performance Optimization Guide
Performance Optimization Guide Publication Date: July 06, 2016 Copyright Metalogix International GmbH, 2001-2016. All Rights Reserved. This software is protected by copyright law and international treaties.
The Porticor Virtual Private Data solution includes two or three major components:
Architecture The Porticor solution offers a rich variety of cloud encryption capabilities. Your project s needs and characteristics will determine the right choices for your application. The Porticor Virtual
DIR Contract Number DIR-SDD-2513 Appendix C Pricing Index
DIR Contract Number DIR-SDD-2513 Appendix C Pricing Index Cloud Brokerage General Dynamics Information Technologies (GDIT) experienced staff provides cloud services brokerage and management for multiple
Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide
Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide Abstract The sizing of hardware in a deployment of EMC Document Archive Services for SAP is determined
VANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
Scaling in a Hypervisor Environment
Scaling in a Hypervisor Environment Richard McDougall Chief Performance Architect VMware VMware ESX Hypervisor Architecture Guest Monitor Guest TCP/IP Monitor (BT, HW, PV) File System CPU is controlled
Understanding VPN Technology Choices
Understanding VPN Technology Choices Presented by: Rob Pantazelos, Network Administrator Brown Rudnick, LLP The most current version of this presentation can be downloaded at: http://www.brownrudnick.com/nr/ilta2008_vpn.ppt
Use of Hadoop File System for Nuclear Physics Analyses in STAR
1 Use of Hadoop File System for Nuclear Physics Analyses in STAR EVAN SANGALINE UC DAVIS Motivations 2 Data storage a key component of analysis requirements Transmission and storage across diverse resources
Investigating Private Cloud Storage Deployment using Cumulus, Walrus, and OpenStack/Swift
Investigating Private Cloud Storage Deployment using Cumulus, Walrus, and OpenStack/Swift Prakashan Korambath Institute for Digital Research and Education (IDRE) 5308 Math Sciences University of California,
Index Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud
IBM Platform Computing Cloud Service Ready to use Platform LSF & Symphony clusters in the SoftLayer cloud February 25, 2014 1 Agenda v Mapping clients needs to cloud technologies v Addressing your pain
THE SIMPLEST WAY TO BACKUP AND RECOVER DATA ON ALL LAPTOPS AND DESKTOPS IN YOUR BUSINESS.
THE SIMPLEST WAY TO BACKUP AND RECOVER DATA ON ALL LAPTOPS AND DESKTOPS IN YOUR BUSINESS. Central management & automation of all user data backups. WHITE PAPER www.cibecs.com 2 Table of ontents 01 02 03
