Cloud Computing Patterns, Mechanisms > Data Management and Storage Device Patterns > IP Storage Isolation
IP Storage Isolation (Cope, Erl)
How can IP storage be secured while using the same communication layer and channel as other networking traffic?
Problem
Storage traffic needs to share the same underlying network infrastructure as network traffic.
Solution
Implement a security mechanism that manages the appropriate levels of isolation for cloud storage devices.
Application
IP storage data can be protected from unauthorized users via a networking mechanism that is used to allocate a dedicated or virtually dedicated tunnel of traffic to IP storage.
Mechanisms
Cloud Storage Management Portal, LUN Masking, RAID-level Identifier, Storage Path Masking, Virtual Network
Compound Patterns
Burst In, Burst Out to Private Cloud, Burst Out to Public Cloud, Cloud Authentication, Cloud Balancing, Elastic Environment, Infrastructure-as-a-Service (IaaS), Isolated Trust Boundary, Multitenant Environment, Platform-as-a-Service (PaaS), Private Cloud, Public Cloud, Resilient Environment, Resource Workload Management, Secure Burst Out to Private Cloud/Public Cloud, Software-as-a-Service (SaaS)