Skip to content

Object Storage Core Vocabulary Collection (100 Terms)

No.TermDescription
1Object StorageAn architecture where data is stored as objects, replacing traditional file hierarchy structures
2BucketA container for storing objects with globally unique namespace
3ObjectBasic storage unit containing data, metadata, and unique identifier (Object Key)
4MetadataKey-value pair information describing object attributes (such as file type, creation time)
5S3-CompatibleStorage services compatible with Amazon S3 API standards
6Data DurabilityThe probability that data remains intact and accessible over a period of time (e.g., 99.999999999%)
7ReplicationRedundancy technology that ensures data safety through multiple copies
8Erasure CodingA method of data protection in which data is broken into fragments, expanded and encoded with redundant data pieces
9Cold StorageLow-cost storage type for infrequently accessed data (such as archived data)
10Lifecycle ManagementPolicies for automatically transitioning/deleting objects (e.g., move to cold storage after 30 days)
11VersioningRetaining historical versions of objects to prevent overwriting
12Storage ClassDifferent performance/cost storage tiers (Standard, Infrequent Access, Archive)
13Access KeyAuthentication keys for API requests (Access Key ID + Secret Access Key)
14RegionGeographic location of storage infrastructure (e.g., East China 1, US West)
15Availability Zone (AZ)Isolated data centers with independent power/network within the same region
16EndpointDomain address for accessing storage service (e.g., us-east1.rustfs.com)
17RESTful APIAPI design specification based on HTTP protocol
18Multipart UploadMechanism for splitting large files for upload and merging
19Pre-Signed URLTemporary access links with time validity
20Server-Side Encryption (SSE)Automatic data encryption on server side (SSE-S3/SSE-KMS/SSE-C)
21Client-Side Encryption (CSE)Local encryption on client side before upload
22Cross-Region ReplicationAutomatic object replication across geographic regions
23Access Control List (ACL)Rule list controlling access permissions for buckets/objects
24Bucket PolicyJSON-based fine-grained permission control policies
25IAMIdentity and Access Management system for centralized user/role permission management
26Event NotificationSending notifications to message queues/function computing when events trigger
27Data LakeRepository for centralized storage of structured/unstructured data
28ComplianceMeeting data storage regulatory requirements like GDPR, HIPAA
29Logging & AuditRecording all API operation logs for auditing
30Monitoring & AlertingReal-time monitoring of storage usage/requests with alerting
31CORSRules controlling browser cross-origin resource access
32Transfer AccelerationOptimizing upload/download speed through edge nodes
33CDN IntegrationCombining with Content Delivery Network for caching acceleration
34Data ExportProcess of migrating data to other storage systems
35Data ImportBatch data migration from external systems to object storage
36Static Website HostingDirectly hosting HTML/CSS/JS static files through buckets
37Hotlink ProtectionTechnology preventing external websites from stealing resource links
38Request Rate LimitingControlling API request frequency per user/IP
39TaggingAdding classification tags to buckets/objects for management
40Inventory ReportPeriodically generated CSV/ORC files listing storage objects
41Data RestorationRestoring data from archive storage to accessible state
42Storage GatewayAccess layer mapping object storage as local file system
43Data CompressionCompressing data before upload to save storage space
44Data DeduplicationEliminating duplicate data to reduce storage usage
45Direct Read ArchiveTechnology for directly reading archived data without restoration
46Bandwidth ControlLimiting download bandwidth to avoid network congestion
47Concurrent ConnectionsNumber of simultaneous data transfer connections
48Data Migration ServiceAutomated migration tools (e.g., AWS Snowball)
49Client SDKDeveloper toolkits for integrating storage services (e.g., Python/Java SDK)
50CLICommand line management tools (e.g., aws s3 cp)
51Web ConsoleWeb-based management interface
52Data Integrity CheckVerifying transmission integrity through MD5/SHA
53Resumable Upload/DownloadContinuing transfer from breakpoint after network interruption
54Mirror Back to SourcePulling and saving from specified origin when requested object doesn't exist
55Canary ReleaseRelease strategy gradually opening new features to some users
56Soft DeleteMarking objects for deletion while maintaining recovery period
57Object LockCompliance protection mechanism preventing object deletion or overwriting
58WatermarkingAdding identification information to images/videos
59Thumbnail GenerationAutomatically creating thumbnail versions of images
60Image ProcessingOnline cropping/scaling/rotation processing functions
61Video TranscodingConverting video formats/resolutions for different devices
62Content ModerationAutomatically detecting inappropriate images/videos/text
63Cost AnalysisCalculating costs by storage type/request count dimensions
64Usage MonitoringReal-time dashboard viewing storage/traffic/request counts
65Storage AnalyticsTools analyzing storage patterns to optimize costs
66Requester PaysBilling model where data downloader bears the cost
67Tiered StorageAutomatically moving data to lower-cost storage tiers
68Intelligent TieringAutomatically selecting optimal storage type based on access patterns
69PrivateLinkAccessing object storage through internal network avoiding public exposure
70VPC EndpointEntry point for securely accessing storage services within Virtual Private Cloud
71SSL/TLSEncrypting data transmission through HTTPS protocol
72Client-Side EncryptionUsers encrypting data themselves before upload
73KMSKey Management Service for centralized encryption key management
74Permission BoundaryLimiting maximum permission scope of IAM roles/users
75Temporary CredentialsShort-term valid access tokens (e.g., STS Token)
76MFA DeleteRequiring multi-factor authentication to delete data
77ImmutabilityProperty preventing data tampering (combined with WORM model)
78Legal HoldMandatory protection prohibiting data deletion/modification in compliance scenarios
79Cross-Account SharingAllowing other cloud accounts to access specified storage resources
80Prefetch PolicyLoading data into cache in advance to accelerate subsequent access
81Cache-ControlSpecifying browser/CDN caching behavior through HTTP headers
82Delayed DeletionDelaying deletion operations to prevent accidental actions
83Batch OperationsPerforming unified operations on multiple objects (delete/copy/restore)
84Data LineageMetadata records tracking data sources and change history
85Data CatalogRetrieval system storing metadata information
86Storage GatewayHybrid cloud solution connecting local systems with cloud storage
87Hybrid Cloud StorageArchitecture using both local storage and cloud storage
88Edge StorageProviding storage services at edge nodes close to data sources
89Multi-Cloud StorageStorage solutions across different cloud service providers
90Storage FederationAbstraction layer for unified management of multiple storage systems
91Object TagAdding custom classification tags to objects
92Bucket Tag存储桶标签
93Storage Quota存储配额
94Request Throttling请求限速
95SLA服务等级协议
96Disaster Recovery灾难恢复
97Storage Topology存储拓扑
98Proximity Access就近访问
99Global Namespace全球统一命名空间
100Zero-Copy Migration零拷贝迁移

Released under the Apache License 2.0.