Fully Homomorphic Encryption in Real World ApplicationsSecure Database Handling
Fully Homomorphic Encryption in Real World Applications: Secure Database Handling
Chatterjee, Ayantika; Aung, Khin Mi Mi
2019-03-30 00:00:00
[Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services. Enterprises and Small-to-Medium Businesses (SMB) see this as a roadblock in adopting cloud services because they do not have full control of the security of the stored data on the cloud. Due to these security issues, one possible solution for the data owners is to store their sensitive data in encrypted form. However, to take full advantage of cloud database as service, FHE enabled SQL processing is a promising solution, which will be elaborated in this chapter.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/fully-homomorphic-encryption-in-real-world-applications-secure-Q2x0sTUPD0
Fully Homomorphic Encryption in Real World ApplicationsSecure Database Handling
[Onset of cloud computing allowed various IT services to be outsourced to cloud service providers (CSP). This includes the management and storage of users’ structured or unstructured data called Database as a Service (DBaaS). However, users need to trust the CSP to protect their data, which is inherent in all cloud-based services. Enterprises and Small-to-Medium Businesses (SMB) see this as a roadblock in adopting cloud services because they do not have full control of the security of the stored data on the cloud. Due to these security issues, one possible solution for the data owners is to store their sensitive data in encrypted form. However, to take full advantage of cloud database as service, FHE enabled SQL processing is a promising solution, which will be elaborated in this chapter.]
Published: Mar 30, 2019
Recommended Articles
Loading...
There are no references for this article.
Share the Full Text of this Article with up to 5 Colleagues for FREE
Sign up for your 14-Day Free Trial Now!
Read and print from thousands of top scholarly journals.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.