Google Cloud Storage - Store Business Data Securely
Google Cloud Storage pricing depends on what you use including the amount of data you store, the duration for which you store the data, the number of operations you may perform on your data, and the network resources used when moving or accessing your data.
Google Cloud Storage is a public cloud storage that can store a large number of unstructured data sets. Companies can purchase the storage based on the frequency of accessing data.
Object Versioning: It allows keeping multiple variants of an object in the same bucket. By enabling this feature you can preserve, retrieve and easily restore every version of every object stored in your Google Cloud bucket.
Object Lifecycle Management: It allows you to automatically manage the archiving and deletion of objects. By using this feature to manage your Object Storage and Archive Storage data, you can reduce your storage costs and the amount of time you spend managing data.
Retention Policies: This feature enables you to create a policy on an existing bucket. It ensures that all current and future objects in the bucket cannot be deleted or overwritten until they reach the time you define in the retention policy.
Pub/Sub Notifications: It sends a real-time notification about changes to objects in your buckets, where the information is added to a Pub/Sub topic of your choice in the form of messages. Enables you to track your objects that are created and deleted in your bucket. Each and every notification contains information describing both - the event that triggered it as well as the object that changed.
Uniform Bucket Level access: It allows you to uniformly access your cloud storage objects. Enabling this feature only bucket-level Cloud Identity and Access Management (IAM) permissions grant access to that bucket and the objects it contains.
Encryption Keys: There are two types of encryption keys where managed encryption keys encrypt object data with encryption keys stored by the Cloud Key Management Service and managed by you. And the supplied encryption keys encrypt object data with encryption keys created and managed by you.
Requester Pays: There are charges associated with creating and executing the request. Following charges are included
Operation charges for performing request
Network charges for reading the data
Data retrieval charges if the data stores as Nearline and Coldline storage