Enterprise Level Security with Homomorphic Encryption

被引:0
|
作者
Foltz, Kevin [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Enterprise; Database; System Design; Confidentiality; Integrity; Enterprise Level Security; Homomorphic Encryption; Application Security; Security; Cloud Services; End-to-End Encryption; Key Management; Database Security;
D O I
10.5220/0006245901770184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Level Security (ELS) is an approach to enterprise information exchange that provides strong security guarantees. It incorporates measures for authentication, encryption, access controls, credential management, monitoring, and logging. ELS has been adapted for cloud hosting using the Virtual Application Data Center (VADC) approach. However, a key vulnerability in placing unprotected data in the cloud is the database that stores each web application's data. ELS puts controls on the end-to-end connection from requester to application, but an exploit of the back-end database can allow direct access to data and bypass ELS controls at the application. In a public cloud environment the data and web application may be vulnerable to insider attacks using direct hardware access, misconfiguration, and redirection to extract data. Traditional encryption can be used to protect data in the cloud, but it must be transferred out of the cloud and decrypted to perform processing, and then re-encrypted and sent back to the cloud. Homomorphic encryption offers a way to not only store encrypted data, but also perform processing directly on the encrypted values. This paper examines the current state of homomorphic encryption and its applicability to ELS.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [31] Labeled PSI from Fully Homomorphic Encryption with Malicious Security
    Chen, Hao
    Huang, Zhicong
    Laine, Kim
    Rindal, Peter
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1223 - 1237
  • [32] Integrating fully homomorphic encryption to enhance the security of blockchain applications
    Wu, Xiaohua
    Wang, Jing
    Zhang, Tingbo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 161 : 467 - 477
  • [33] SoK: Learning with Errors, Circular Security, and Fully Homomorphic Encryption
    Micciancio, Daniele
    Vaikuntanathan, Vinod
    PUBLIC-KEY CRYPTOGRAPHY, PT IV, PKC 2024, 2024, 14604 : 291 - 321
  • [34] Security Encryption Analysis of Economic Big Data Based on Homomorphic Encryption and Attribute Base
    Chen, Limin
    International Journal of Network Security, 2024, 26 (02) : 299 - 304
  • [35] Homomorphic Encryption
    Ogburn, Monique
    Turner, Claude
    Dahal, Pushkar
    COMPLEX ADAPTIVE SYSTEMS: EMERGING TECHNOLOGIES FOR EVOLVING SYSTEMS: SOCIO-TECHNICAL, CYBER AND BIG DATA, 2013, 20 : 502 - 509
  • [36] Homomorphic Encryption as a secure PHM outsourcing solution for small and medium manufacturing enterprise
    Kang, Ha Eun David
    Kim, Duhyeong
    Kim, Sangwoon
    Kim, David Donghyun
    Cheon, Jung Hee
    Anthony, Brian W.
    JOURNAL OF MANUFACTURING SYSTEMS, 2021, 61 : 856 - 865
  • [37] Analysis and improvement of the security of the key-nets homomorphic encryption scheme
    Li W.
    Dong L.
    Zeng Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (01): : 192 - 202
  • [38] Research on medical data security sharing scheme based on homomorphic encryption
    Guo, Lihong
    Gao, Weilei
    Cao, Ye
    Lai, Xu
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (02) : 2261 - 2279
  • [39] Enhancing Healthcare Data Security with Homomorphic Encryption in Virtual Health Support
    Sutradhar, Shrabani
    Bose, Rajesh
    Majumder, Sudipta
    Mondal, Haraprasad
    Bhattacharya, Debnath
    EAI INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND GENERATIVE AI, 2025, : 89 - 105
  • [40] An Efficient Homomorphic Medical Image Encryption Algorithm For Cloud Storage Security
    Vengadapurvaja, A. M.
    Nisha, G.
    Aarthy, R.
    Sasikaladevi, N.
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATIONS (ICACC-2017), 2017, 115 : 643 - 650