Enterprise Level Security with Homomorphic Encryption

被引:0
作者
Foltz, Kevin [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
来源
ICEIS: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 1 | 2017年
关键词
Enterprise; Database; System Design; Confidentiality; Integrity; Enterprise Level Security; Homomorphic Encryption; Application Security; Security; Cloud Services; End-to-End Encryption; Key Management; Database Security;
D O I
10.5220/0006245901770184
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise Level Security (ELS) is an approach to enterprise information exchange that provides strong security guarantees. It incorporates measures for authentication, encryption, access controls, credential management, monitoring, and logging. ELS has been adapted for cloud hosting using the Virtual Application Data Center (VADC) approach. However, a key vulnerability in placing unprotected data in the cloud is the database that stores each web application's data. ELS puts controls on the end-to-end connection from requester to application, but an exploit of the back-end database can allow direct access to data and bypass ELS controls at the application. In a public cloud environment the data and web application may be vulnerable to insider attacks using direct hardware access, misconfiguration, and redirection to extract data. Traditional encryption can be used to protect data in the cloud, but it must be transferred out of the cloud and decrypted to perform processing, and then re-encrypted and sent back to the cloud. Homomorphic encryption offers a way to not only store encrypted data, but also perform processing directly on the encrypted values. This paper examines the current state of homomorphic encryption and its applicability to ELS.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 24 条
  • [1] Akin I. H., 2015, DIFFICULTY SECURING
  • [2] [Anonymous], 2009, A Fully Homomorphic Encryption Scheme
  • [3] [Anonymous], 2011, CCCT2010
  • [4] Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
  • [5] CHANDERSEKARAN C, 2008, WORLD WID WEB CONS W
  • [6] Chang C.Y., 2012, INT J PHOTOENERGY, V6, P1
  • [7] Cheon JH, 2013, LECT NOTES COMPUT SC, V7881, P315, DOI 10.1007/978-3-642-38348-9_20
  • [8] Dayioglu Z. N, 2015, INT J INFORM SECURIT, V3, P129
  • [9] Doroz Y., 2014, IACR CRYPTOLOGY EPRI, V2014, P39
  • [10] Foltz K., 2016, P 20 WORLD MULT SYST, VI