Securing the Cloud with
Homomorphic Encryption
A major concern of cloud users is the
potential for losing data privacy once
the data has moved to the cloud. Customers
need assurance that their data
is well protected by cloud service providers.
Encryption can alleviate this
fear, but it also has drawbacks. To
avoid time-consuming downloading
and uploading of data for customers,
the cloud provider can perform operations in the
cloud. However, to manipulate encrypted data in the
cloud, users must share their encryption/decryption
keys with the cloud provider, effectively allowing
them access to the data.
One of the top threats to cloud computing is malicious
insiders. An insider can be a rogue administrator
employed by a cloud service provider, an employee
of the victim organization who exploits vulnerabilities
to gain unauthorized access, or an attacker who uses
cloud resources to launch attacks. The multitenant
nature of the cloud computing environment makes it
difficult to detect and prevent insider attacks.
Homomorphic encryption allows computations
to be carried out on encrypted data (also known
as ciphertext), thus generating an encrypted result,
which, when decrypted, matches the result of the
same operations performed on the original data
(plaintext). This can be a major advantage for applications
that outsource encrypted data to the cloud.
Securing the Cloud withHomomorphic EncryptionA major concern of cloud users is thepotential for losing data privacy oncethe data has moved to the cloud. Customersneed assurance that their datais well protected by cloud service providers.Encryption can alleviate thisfear, but it also has drawbacks. Toavoid time-consuming downloadingand uploading of data for customers,the cloud provider can perform operations in thecloud. However, to manipulate encrypted data in thecloud, users must share their encryption/decryptionkeys with the cloud provider, effectively allowingthem access to the data.One of the top threats to cloud computing is maliciousinsiders. An insider can be a rogue administratoremployed by a cloud service provider, an employeeof the victim organization who exploits vulnerabilitiesto gain unauthorized access, or an attacker who usescloud resources to launch attacks. The multitenantnature of the cloud computing environment makes itdifficult to detect and prevent insider attacks.Homomorphic encryption allows computationsto be carried out on encrypted data (also knownas ciphertext), thus generating an encrypted result,which, when decrypted, matches the result of thesame operations performed on the original data(plaintext). This can be a major advantage for applicationsthat outsource encrypted data to the cloud.
การแปล กรุณารอสักครู่..
