Cloud Computing Patterns | Design Patterns | IP Storage Isolation


Cloud Computing Patterns, Mechanisms > Data Management and Storage Device Patterns > IP Storage Isolation
Home > Design Patterns > IP Storage Isolation

IP Storage Isolation (Cope, Erl)

How can IP storage be secured while using the same communication layer and channel as other networking traffic?

IP Storage Isolation

Problem

Storage traffic needs to share the same underlying network infrastructure as network traffic.

Solution

Implement a security mechanism that manages the appropriate levels of isolation for cloud storage devices.

Application

IP storage data can be protected from unauthorized users via a networking mechanism that is used to allocate a dedicated or virtually dedicated tunnel of traffic to IP storage.


CloudSchool.com Cloud Certified Professional (CCP) Module 7: Fundamental Cloud Security
CloudSchool.com Cloud Certified Professional (CCP) Module 8: Advanced Cloud Security

This mechanism is covered in CCP Module 7: Fundamental Cloud Security and
in Module 8: Advanced Cloud Security.

For more information regarding the Cloud Certified Professional (CCP) curriculum, visit www.arcitura.com/ccp.


Cloud Computing Design Patterns

The architectural model upon which this design pattern is based is further covered in:

Cloud Computing Design Patterns by Thomas Erl, Robert Cope, Amin Naserpour

(ISBN: 9780133858563, Hardcover, ~ 528 pages)

For more information about this book, visit www.arcitura.com/books.