• A
      access control list

      A list of entities, together with their access rights, which are authorized to access a resource.

      access key ID

      An ID that confirms the identity of a user accessing the object-based storage system. One access key ID belongs to only one user, but one user can have multiple access key IDs. The object-based storage system recognizes the users accessing the system by their access key IDs.


      See access control list


      See access key ID


      See application programming interface

      application programming interface

      An application programming interface is a particular set of rules and specifications that are used for communication between software programs.

    • B

      A container used to store objects. A bucket name must be unique.

      bucket policy

      A group of control policies that accept or reject requests to access buckets, and control the permissions of one or more users to access buckets and objects in buckets.

    • C
      canonical name

      Indicates a canonical name and allows multiple domain names to be mapped to the same computer.


      See canonical name


      See cross-orgin resource sharing

      cross-orgin resource sharing

      Cross-origin resource sharing (CORS) is a mechanism that allows many resources (such as, fonts and JavaScript) on a web page to be requested from another domain outside the domain from which the resource originated.

    • D

      See domain name server

      domain name server

      A functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but servers in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.


      • L

        See life cycle management

        life cycle management

        Covers phases from creating an object to deleting the object and indicates a management means to automatically delete objects that meet specific conditions.

      • O

        A basic data unit in object storage service. It consists of object data and object metadata that describes object attributes.

        object storage service

        An object-based cloud storage service. It provides data storage of easy extensibility, high security, proven reliability, and high cost efficiency. Users can manage and use objects through HTTP-based interfaces. The object storage service (OBS) is applicable to large-scale data storage services.


        See object storage service


        • P-T

          See software development kit

          secret access key

          An authentication key for a user to access an object-based storage system. A secret access key and a request header form a set of authentication information for a user. Secret access keys and access key IDs are in one-to-one match.


          See secret access key

          software development kit

          A set of software development interfaces for service management and control, device management, user management, resource management, and system maintenance. SDKs can be used to develop diversified applications.

          static website hosting

          A service mode in which users store static website files on object storage services, set buckets to the hosting mode, and visit static websites by accessing buckets in the object storage services.


          • U-Z

            Records and stores the versions of objects at different times in the system to trace and manage multiple object versions, so that data of a specific version can be recovered when an anomaly occurs.