Enterprise Level Security with Homomorphic Encryption

被引:0
|
作者
Foltz, Kevin [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
来源
ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1 | 2017年
关键词
Enterprise; Database; System Design; Confidentiality; Integrity; Enterprise Level Security; Homomorphic Encryption; Application Security; Security; Cloud Services; End-to-End Encryption; Key Management; Database Security;
D O I
10.5220/0006245901770184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Level Security (ELS) is an approach to enterprise information exchange that provides strong security guarantees. It incorporates measures for authentication, encryption, access controls, credential management, monitoring, and logging. ELS has been adapted for cloud hosting using the Virtual Application Data Center (VADC) approach. However, a key vulnerability in placing unprotected data in the cloud is the database that stores each web application's data. ELS puts controls on the end-to-end connection from requester to application, but an exploit of the back-end database can allow direct access to data and bypass ELS controls at the application. In a public cloud environment the data and web application may be vulnerable to insider attacks using direct hardware access, misconfiguration, and redirection to extract data. Traditional encryption can be used to protect data in the cloud, but it must be transferred out of the cloud and decrypted to perform processing, and then re-encrypted and sent back to the cloud. Homomorphic encryption offers a way to not only store encrypted data, but also perform processing directly on the encrypted values. This paper examines the current state of homomorphic encryption and its applicability to ELS.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [41] Ensuring security of artificial pancreas device system using homomorphic encryption
    Weng, Haotian
    Hettiarachchi, Chirath
    Nolan, Christopher
    Suominen, Hanna
    Lenskiy, Artem
    BIOMEDICAL SIGNAL PROCESSING AND CONTROL, 2023, 79
  • [42] A Note on Ring-LWE Security in the Case of Fully Homomorphic Encryption
    Bonnoron, Guillaume
    Fontaine, Caroline
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2017, 2017, 10698 : 27 - 43
  • [43] Attribute-Based Adaptive Homomorphic Encryption for Big Data Security
    Thenmozhi, R.
    Shridevi, S.
    Mohanty, Sachi Nandan
    Garcia Diaz, Vicente
    Gupta, Deepak
    Tiwari, Prayag
    Shorfuzzaman, Mohammad
    BIG DATA, 2024, 12 (05) : 343 - 356
  • [44] Additively LWE based homomorphic encryption for compact devices with enhanced security
    Challa, Ratnakumari
    Kumari, Gunta Vijaya
    International Journal of Network Security, 2019, 21 (03) : 378 - 383
  • [45] A Data Aggregation Security Enhancing Scheme in WSNs Using Homomorphic Encryption
    Hayouni, Haythem
    Hamdi, Mohamed
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2018, 24 (04): : 729 - 737
  • [46] Data Security in Distributed System using Fully Homomorphic Encryption and Linear
    Gauraha, Narendra
    Mishra, Deepak
    Trivedi, Prashant
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 423 - 425
  • [47] Homomorphic Encryption in the Cloud
    Hrestak, Darko
    Picek, Stjepan
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 1400 - 1404
  • [48] Subring Homomorphic Encryption
    Arita, Seiko
    Handa, Sari
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 112 - 136
  • [49] Parallel Homomorphic Encryption
    Kamara, Seny
    Raykova, Mariana
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2013 WORKSHOPS, 2013, 7862 : 213 - 225
  • [50] A Method of Homomorphic Encryption
    XIANG Guang-li~ 1
    2. School of Computer
    3. School of Information
    Wuhan University Journal of Natural Sciences, 2006, (01) : 181 - 184