After you are familiar with basic Object Storage Service (OSS) operations such as uploading and downloading objects, you can use the advanced features provided by OSS.
|Enable pay-by-requester||When pay-by-requester is enabled for a bucket, requesters pay the request and traffic fees that are incurred when the requesters access objects in the bucket. The bucket owner is still charged for the storage fees of the objects. You can enable pay-by-requester to share your data in OSS without having to pay for additional fees on your own.|
|Lifecycle rules||After you configure lifecycle rules for a bucket, OSS converts the storage class of objects in the bucket to Infrequent Access (IA), Archive, Cold Archive, or deletes expired objects and parts to save storage costs on a regular basis.|
|Versioning||OSS allows you to configure versioning for a bucket to protect objects stored in the bucket. After you enable versioning for a bucket, objects that are overwritten or deleted in the bucket are saved as previous versions. You can use versioning to recover a previous version of an object that is accidentally overwritten or deleted.|
|Access control||OSS provides you with the following access control methods to manage access to objects in buckets: bucket policies, access control list (ACL), Resource Access Management (RAM) policies, Security Token Service (STS)-based temporary access authorization, and hotlink protection. Bucket policies and ACLs are implemented based on resources. RAM policies are implemented based on users. Hotlink protection is implemented by configuring whitelists.|
|Data encryption||Server-side encryption: When you upload an object to a bucket for which server-side encryption is enabled,
OSS encrypts the object and stores the encrypted object. When you download the encrypted
object from OSS, OSS automatically decrypts the object and returns the decrypted object
to you. A header is added in the response to indicate that the object is encrypted
on the OSS server.
Client-side encryption: Before you upload an object to a bucket, the object is encryption on the local client.
|Cross-region replication||Cross-region replication (CRR) provides automatic and asynchronous (near real-time) replication of objects across buckets in different OSS regions. Operations such as creating, overwriting, and deleting objects can be synchronized from a source bucket to a destination bucket. CRR can meet your requirements on geo-disaster recovery and data replication.|