All Products
Search
Document Center

Object Storage Service:Advanced features

Last Updated:Aug 30, 2023

After you are familiar with basic Object Storage Service (OSS) operations such as uploading and downloading objects, you can use the advanced features provided by OSS.

The following table lists the common advanced features of OSS.

Feature

Description

Pay-by-requester

If you enable pay-by-requester for a bucket, the requester is charged the request and traffic fees when the requester accesses objects in the bucket. The bucket owner is charged only the storage fees of the objects. You can enable pay-by-requester to share your data in OSS without additional fees.

Lifecycle rules

After you configure lifecycle rules for a bucket, OSS can periodically convert the storage class of objects in the bucket to IA, Archive, Cold Archive, and Deep Cold Archive, or delete expired objects and parts. This helps reduce storage costs.

Static website hosting

Static websites are websites in which all web pages consist of only static content, including scripts such as JavaScript code that can be run on a client. You can use the static website hosting feature to host your static website in an OSS bucket and use the domain name of the bucket to access the website.

Versioning

OSS allows you to configure versioning for a bucket to protect objects that are stored in the bucket. After you enable versioning for a bucket, existing objects in the bucket are stored as previous versions when they are overwritten or deleted. After you configure versioning for a bucket, you can restore objects in the bucket to a previous version to protect your data from being accidentally overwritten or deleted.

Access control

OSS allows you to use the following access control methods to manage access to objects in buckets: bucket policies, access control list (ACL), Resource Access Management (RAM) policies, Security Token Service (STS)-based temporary access authorization, and hotlink protection. Bucket policies and ACLs are implemented based on resources. RAM policies are implemented based on users. Hotlink protection is implemented by configuring whitelists.

Encryption

Server-side encryption: When you upload an object, OSS encrypts the object and stores the encrypted object. When you download an object, OSS automatically decrypts the object and returns the decrypted object to you. In addition, OSS declares that the object is encrypted on the server in the HTTP response header.

Client-side encryption: Objects are encrypted on the local client before they are uploaded to OSS.

CRR

Cross-region replication (CRR) enables you to automatically and asynchronously (near real-time) replicate objects across buckets in different OSS regions. Operations performed on the source bucket (such as creating, overwriting, and deleting objects) are performed asynchronously on the destination bucket. CRR is ideal for meeting compliance requirements for cross-region disaster recovery and data replication.