Data Protection
OBS takes different measures to keep data stored in OBS secure and reliable.
Measure |
Description |
Reference |
---|---|---|
Transmission encryption (HTTPS) |
OBS supports HTTP and HTTPS, but HTTPS is recommended to enhance the security of data transmission. |
|
Data redundancy |
OBS uses the Erasure Code (EC) algorithm, instead of multiple copies, to ensure data redundancy. Compared with the multi-copy redundancy, EC delivers a higher storage space utilization while maintaining the same reliability level. When creating a bucket on OBS, you can choose a data redundancy policy. Choosing the multi-AZ storage will make your data redundantly stored in multiple AZs in the same region. If one AZ becomes unavailable, data can still be properly accessed from the other AZs. The multi-AZ storage is ideal for scenarios that demand high reliability. |
|
Data integrity verification (MD5) |
During object uploads or downloads, data may become inconsistent due to network hijacking, caching, and other reasons. OBS verifies data consistency by calculating the MD5 value when data is uploaded or downloaded. |
|
Server-side encryption |
With server-side encryption enabled, objects you upload to OBS will be encrypted into ciphertext before they are stored on the server. When objects are downloaded, they will be decrypted on the server first and then returned in plaintext to you. |
|
Cross-region replication |
You can configure cross-region replication rules to automatically, asynchronously replicate data from a source bucket to a destination bucket in another region. This provides you with the capability for disaster recovery across regions, catering to your needs for remote backup. |
|
Versioning |
When versioning is enabled for a bucket, OBS can keep multiple versions of an object in the bucket. That way you can quickly retrieve and restore every object version as needed, or recover data from both accidental actions and application failures. |
|
Critical operation protection |
With this function enabled, the system authenticates user's identity when they perform any risky operation like deleting a bucket. This enhances the protection for your data and configuration. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot