Enterprise Level Security with Homomorphic Encryption

被引:0
|
作者
Foltz, Kevin [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Enterprise; Database; System Design; Confidentiality; Integrity; Enterprise Level Security; Homomorphic Encryption; Application Security; Security; Cloud Services; End-to-End Encryption; Key Management; Database Security;
D O I
10.5220/0006245901770184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Level Security (ELS) is an approach to enterprise information exchange that provides strong security guarantees. It incorporates measures for authentication, encryption, access controls, credential management, monitoring, and logging. ELS has been adapted for cloud hosting using the Virtual Application Data Center (VADC) approach. However, a key vulnerability in placing unprotected data in the cloud is the database that stores each web application's data. ELS puts controls on the end-to-end connection from requester to application, but an exploit of the back-end database can allow direct access to data and bypass ELS controls at the application. In a public cloud environment the data and web application may be vulnerable to insider attacks using direct hardware access, misconfiguration, and redirection to extract data. Traditional encryption can be used to protect data in the cloud, but it must be transferred out of the cloud and decrypted to perform processing, and then re-encrypted and sent back to the cloud. Homomorphic encryption offers a way to not only store encrypted data, but also perform processing directly on the encrypted values. This paper examines the current state of homomorphic encryption and its applicability to ELS.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [1] Homomorphic encryption with CCA security
    Prabhakaran, Manoj
    Rosulek, Mike
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 667 - 678
  • [2] Limits of Provable Security for Homomorphic Encryption
    Bogdanov, Andrej
    Lee, Chin Ho
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 111 - 128
  • [3] Cloud Security based on the Homomorphic Encryption
    Al-Sit, Waleed T.
    Al-Zoubi, Hani
    Al-Jubouri, Qussay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) : 300 - 307
  • [4] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [5] On the Security of Homomorphic Encryption on Approximate Numbers
    Li, Baiyu
    Micciancio, Daniele
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 648 - 677
  • [6] A Comparative Review on Homomorphic Encryption for Cloud Security
    Mahato, Ganesh Kumar
    Chakraborty, Swarnendu Kumar
    IETE JOURNAL OF RESEARCH, 2023, 69 (08) : 5124 - 5133
  • [7] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [8] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [9] Enhanced Database Security Using Homomorphic Encryption
    Roset, Connor
    Warren, Van
    Chiang, Chia-Chu
    INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 377 - 387
  • [10] Cloud Security Implementation using Homomorphic Encryption
    Syafalni, Infall
    Fadhli, Hamdani
    Utami, Wuri
    Dharma, Gede Satya Adi
    Mulyawan, Rahmat
    Sutisna, Nana
    Adiono, Trio
    2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORKS AND SATELLITE (COMNETSAT), 2020, : 341 - 345