Enterprise Level Security with Homomorphic Encryption

被引:0
|
作者
Foltz, Kevin [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Enterprise; Database; System Design; Confidentiality; Integrity; Enterprise Level Security; Homomorphic Encryption; Application Security; Security; Cloud Services; End-to-End Encryption; Key Management; Database Security;
D O I
10.5220/0006245901770184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Level Security (ELS) is an approach to enterprise information exchange that provides strong security guarantees. It incorporates measures for authentication, encryption, access controls, credential management, monitoring, and logging. ELS has been adapted for cloud hosting using the Virtual Application Data Center (VADC) approach. However, a key vulnerability in placing unprotected data in the cloud is the database that stores each web application's data. ELS puts controls on the end-to-end connection from requester to application, but an exploit of the back-end database can allow direct access to data and bypass ELS controls at the application. In a public cloud environment the data and web application may be vulnerable to insider attacks using direct hardware access, misconfiguration, and redirection to extract data. Traditional encryption can be used to protect data in the cloud, but it must be transferred out of the cloud and decrypted to perform processing, and then re-encrypted and sent back to the cloud. Homomorphic encryption offers a way to not only store encrypted data, but also perform processing directly on the encrypted values. This paper examines the current state of homomorphic encryption and its applicability to ELS.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [21] Symmetric quantum fully homomorphic encryption with perfect security
    Min Liang
    Quantum Information Processing, 2013, 12 : 3675 - 3687
  • [22] Enhancement in Homomorphic Encryption Scheme for Cloud Data Security
    Kaur, Samjot
    Wasson, Vikas
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 54 - 59
  • [23] A lightweight fully homomorphic encryption scheme for cloud security
    Biksham, V.
    Vasumathi, D.
    International Journal of Information and Computer Security, 2020, 13 (3-4) : 357 - 371
  • [24] Enterprise Level Security
    Trias, Eric D.
    Simpson, William R.
    Foltz, Kevin E.
    Konieczny, Frank P.
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 31 - 36
  • [25] On the security of fully homomorphic encryption for data privacy in Internet of Things
    Peng, Zhiniang
    Zhou, Wei
    Zhu, Xiaogang
    Wu, Youke
    Wen, Sheng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (19):
  • [26] Improving the Security Strength of Iseki's Fully Homomorphic Encryption
    Nakadai, Naho
    Iseki, Takumi
    Hayashi, Masahiro
    35TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2020), 2020, : 299 - 304
  • [27] Introduction of Homomorphic Encryption for Security of Cyber-Physical Systems
    Lee S.
    Lee J.
    Shim H.
    Journal of Institute of Control, Robotics and Systems, 2021, 27 (03) : 177 - 184
  • [28] A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
    El-Yahyaoui, Ahmed
    Ech-Cherif El Kettani, Mohamed Dafir
    TECHNOLOGIES, 2019, 7 (01):
  • [29] A cloud computing security solution based on fully homomorphic encryption
    Zhao, Feng
    Li, Chao
    Liu, Chun Feng
    2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, : 485 - 488
  • [30] SECURITY STRUCTURE OF CLOUD STORAGE BASED ON HOMOMORPHIC ENCRYPTION SCHEME
    Li, Jian
    Chen, Sicong
    Song, Danjie
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 224 - 227