NDSA:Cloud Presentations: Difference between revisions

From DLF Wiki
Trow (talk | contribs)
Nowviskie (talk | contribs)
adding logo
 
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
[[File:NDSA Logo.png|thumb]]
In each case we would want to identify who would present, who will contact them. Then when they will present.  
In each case we would want to identify who would present, who will contact them. Then when they will present.  


Line 43: Line 44:
* [Snavely] Built on LOCKSS, so data integrity assurances are provided by robust networked software model augmented to commodity hardware and storage. Federated nature provides integrity assurance but also a lack of central control in that the accidental loss of multiple caches is unlikely but e.g. scheduled maintenance or upgrades could coincidentally collide.
* [Snavely] Built on LOCKSS, so data integrity assurances are provided by robust networked software model augmented to commodity hardware and storage. Federated nature provides integrity assurance but also a lack of central control in that the accidental loss of multiple caches is unlikely but e.g. scheduled maintenance or upgrades could coincidentally collide.


==Questions for Member Institution Implementations of Large Scale Storage Architectures==
#What is the particular preservation goal or challenge you need to accomplish? (for example, re-use, public access, internal access, legal mandate, etc.)
#What large scale storage or cloud technologies are you using to meet that challenge? Further, why did you choose these particular technologies?
#Specifically, what kind of materials are you preserving (text, data sets, images, moving images, web pages, etc.)
#How big is your collection? (In terms of number of objects and storage space required)
#What are your performance requirements? Further, why are these your particular requirements?
#What storage media have you elected to use? (Disk, Tape, etc) Further, why did you choose these particular media?
#What do you think the key advantages of the system you use?
#What do you think are the key problems or disadvantages your system present?
#What important principles informed your decision about the particular tool or service you chose to use?
#How frequently do you migrate from one system to another? Further, what is it that prompts you to make these migrations?
# What characteristics of the storage system(s) you use do you feel are particularly well-suited to long-term digital preservation? (High levels of redundancy/resiliency, internal checksumming capabilities, automated tape refresh, etc)
# What functionality or processes have you developed to augment your storage systems in order to meet preservation goals? (Periodic checksum validation, limited human access or novel use of permissions schemes)
# Are there tough requirements for digital preservation, e.g. TRAC certification, that you wish were more readily handled by your storage system?
===Responses to questions===
====[[NDSA:Florida Center for Library Automation]]====
====[[NDSA:Harvard Library]]====
====[[NDSA:Harvard IQSS - DVN/Murray Archive]]====
====[[NDSA:HathiTrust]]====
====[[NDSA:National Library of Medicine Responses]]====
====[[NDSA:Penn State]]====
====[[NDSA:WGBH Responses]]====
====[[NDSA:NYU Response]]====
====[[NDSA:Library of Congress]]====
====[[NDSA:Columbia University]]====
==General Concerns==
# confidential data
# encrypted data
# auditing
# preservation risks
# legal compliance
# ...


==Solution Models and Environments==
==Solution Models and Environments==

Latest revision as of 16:59, 29 November 2016

In each case we would want to identify who would present, who will contact them. Then when they will present.

From there we can include specific questions we would like them to respond to.

Presentation Schedule and Slides

  1. Feb 1, Tues, 1:00 EST call with iRods Reagan Moore (presentation)
  2. Feb 14, Monday, 11:00 EST call with Duracloud (presentation)
  3. Feb 17, Thurs, 11:00 EST call with MetaArchive/GDDP Katherine Skinner, Matt Schultz and Martin Halbert MetaArchive NDSA (presentation)

People/Projects to Contact

  • Chronopolis (Mike Smorul will contact)
  • Open questions from the Educopia Guide to Distributed Digital Preservation
  • Commercial providers? (Who specifically would we want here? Please add them.)
    • Azure (Leslie to contact)
    • Amazon (Who will contact?)

General Questions for Cloud Service Presenters

Here we are working on a set of general questions for presenters to develop talks around.

  1. What sort of use cases is your system designed to support? What doesn't this support?
  2. What preservation standards would your system support?
  3. What resources are required to support a solution implemented in your environment?
  4. What infrastructure do you rely on?
  5. How can your system impact digital preservation activities?
  6. If we put data in your system today what systems and processes are in place so that we can get it back 10 years from now? (Take for granted a sophisticated audience that knows about multiple copies etc.)
  7. What types of materials does your system handle? (documents, audio files, video file, stills, data sets, etc) And give examples of those types in practice

Responses to questions

NDSA:iRODS direct responses

Other general notes:

  • [Snavely] The need for each storage target to support a specific set of operations, and consistently with other storage targets, seems like a risk that comes along with the elegant abstraction that iRODS provides. Clear specifications help mitigate this risk.

NDSA:DuraCloud direct responses

Other general notes:

  • [Snavely] Treatment of cloud provider is generally as a black box, without a strong sense of actual reliability of underlying storage systems. Cloud providers tend to promise checksum validation of contents, but recourse if validation fails was unknown (right?). Additional checksum validation has been augmented on top of cloud storage service by Duracloud.

NDSA:MetaArchive/GDDP direct responses

Other general notes:

  • [Snavely] Built on LOCKSS, so data integrity assurances are provided by robust networked software model augmented to commodity hardware and storage. Federated nature provides integrity assurance but also a lack of central control in that the accidental loss of multiple caches is unlikely but e.g. scheduled maintenance or upgrades could coincidentally collide.


Solution Models and Environments

Name Offered as Service Deployed Locally Opensource Authentication Scheme Ingest Mechanism Export Mechanism Integrity/Validation Mechanism Replication Mechanism Administration Model (Federated, etc.) Tiering Support
iRODS Offered as Service Deployed Locally Opensource Authentication Scheme Ingest Mechanism Export Mechanism Integrity/Validation Mechanism Replication Mechanism Content Administration Model (Federated, etc.) Tiering Support Certifications
DuraCloud yes yes yes (Apache2) Basic Auth 1:web-ui, 2:client-side utility, 3:REST-API 1:web-ui, 2:client-side utility, 3:REST-API Checksum verified on ingest. On-demand checksum verification service. Built-in support for cross-cloud replication. Local No
MetaArchive/GDDP Mixed - PLN service layer on top of local LOCKSS nodes Mixed - PLN service layer on top of local LOCKSS nodes No IP-based LOCKSS harvesting plugins LOCKSS web proxy LOCKSS distributed integrity checking LOCKSS P2P Single superuser across all nodes No
Chronopolis Yes No No SRB/Irods based SRB/Irods based SRB/Irods based Local checksums SRB/Irods Single superuser No
Microsoft Azure Yes No No Multiple .Net/WIF Multiple APIs, .Net Not known/propietary Not known/propietary Single super user Not known/propietary
Amazon S3/EC2 Yes No Opensource Multiple, including certs; proprietary / limited delegation model Restful API's Restful API's Proprietary Proprietary Single superuser Yes
DVN/Safearchive Yes Yes Opensource Basic Auth/IP Proprietary UI/Batch UI/LOCKSS harvesting plugins OAI/Lockss harvesting/proprietary LOCKS distributed integrity checks with additional TRAC auditing layer LOCKS with additional TRAC-based provisioning layer Federated & distributed No