All Products
Search
Document Center

File Storage NAS:Benefits

Last Updated:Oct 31, 2024

File Storage NAS (NAS) provides a wide variety of features, such as scalable capacity, shared access, support for several standard protocols, security and compliance, data encryption, flexible access modes, data transmission, and data backup. NAS allows you to mount file systems on various compute nodes. These compute nodes include Elastic Compute Service (ECS) instances, ECS Bare Metal Instance instances, Elastic High Performance Computing (E-HPC) clusters, and Container Service for Kubernetes (ACK) clusters. You can mount file systems on compute nodes across virtual private clouds (VPCs) or regions by using Cloud Enterprise Network (CEN).

Scalable capacity

NAS provides scalable file systems. You can add file systems to increase the storage capacity, or delete file systems to decrease the storage capacity.

Shared access

NAS allows shared access to the same data source in a file system from multiple compute nodes and uses file locks to ensure data consistency.

Protocol compatibility

NAS supports standard protocols, such as Network File System (NFSv3 and NFSv4.0) and Server Message Block (SMB 2.1 and SMB 3.0). NAS also supports mainstream operating systems, such as Linux and Windows.

Access control and compliance

Based on Resource Access Management (RAM) authentication, NAS provides VPC-based isolation and security group-based access control to ensure data security.

Data encryption

NAS provides encryption in transit and encryption at rest to prevent user data from being intercepted or sniffed.

Flexible access modes

You can access file systems over VPCs. You can also access file systems from on-premises data centers over Express Connect circuits and virtual private networks (VPNs).

Data transmission

You can synchronously or asynchronously transfer data between NAS file systems or between NAS and Object Storage Service (OSS) by using Data Transmission Service (DTS).

Data backup

NAS generates multiple replicas for data based on flexible backup policies. These replicas are used to restore corrupted data.