Outsourcing Strategies and Secure Data Encryption in OpenStack Swift Environments

Authors

  • Kuldeep Singh Arya INDIA Author
  • G. Krishnan Kutty INDIA Author

Keywords:

Cloud Computing, Data Encryption, OpenStack Swift, Data Outsourcing, Cloud Security, Object Storage, Data Confidentiality, Secure Cloud Storage, Encryption Algorithms

Abstract

As cloud computing continues to evolve, the demand for secure and efficient data storage solutions has grown significantly. OpenStack Swift, a widely adopted object storage system, provides a scalable and flexible platform for managing large volumes of unstructured data. However, the security of outsourced data remains a paramount concern, necessitating robust encryption strategies. This paper presents an in-depth analysis of outsourcing strategies and secure data encryption methods tailored for OpenStack Swift environments. We explore various encryption algorithms and their implementation within Swift, highlighting their strengths and potential vulnerabilities. Additionally, we propose a comprehensive framework that integrates encryption protocols seamlessly with data outsourcing practices, ensuring data confidentiality, integrity, and availability. Our findings demonstrate that a strategic combination of encryption and outsourcing can effectively mitigate security risks, providing a secure cloud storage solution for organizations.

References

Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). "Provable data possession at untrusted stores." Proceedings of the 14th ACM conference on Computer and communications security, 598-609.

Kaufman, L. M. (2009). "Data security in the world of cloud computing." IEEE Security & Privacy, 7(4), 61-64.

Gentry, C. (2009). "Fully homomorphic encryption using ideal lattices." STOC '09: Proceedings of the 41st annual ACM symposium on Theory of computing, 169-178.

Kamara, S., & Lauter, K. (2010). "Cryptographic cloud storage." Financial Cryptography and Data Security, Lecture Notes in Computer Science, 6054, 136-149.

Wei, J., Zhang, X., Ammons, G., Bala, V., & Ning, P. (2009). "Managing security of virtual machine images in a cloud environment." Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96.

Dong, X., Chen, J., & Ma, H. (2007). "Survey on the security models and strategies of cloud computing." Journal of Software, 18(1), 150-163.

Juels, A., & Kaliski, B. S. (2007). "Pors: proofs of retrievability for large files." Proceedings of the 14th ACM conference on Computer and communications security, 584-597.

Popa, R. A., Redfield, C. M. S., Zeldovich, N., & Balakrishnan, H. (2011). "CryptDB: protecting confidentiality with encrypted query processing." Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, 85-100.

S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, & P. Samarati. (2010). "Over-encryption: management of access control evolution on outsourced data." Proceedings of the 33rd international conference on Very large data bases, 123-134.

Zhang, Q., Cheng, L., & Boutaba, R. (2010). "Cloud computing: state-of-the-art and research challenges." Journal of Internet Services and Applications, 1(1), 7-18.

Published

2015-12-02

How to Cite

Outsourcing Strategies and Secure Data Encryption in OpenStack Swift Environments. (2015). JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), 3(2), 47-59. https://jrtcse.com/index.php/home/article/view/JRTCSE.2015.2.3