Securing Cloud: Elastic Key Management and Homomorphic Encryption

  • Koehler A
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Businesses choosing cloud based infrastructures for all of their IT needs enjoy business agility, technical flexibility and lower IT costs – but face a security dilemma of how to use the cloud securely.This dilemma is fostered by conventional wisdom which stipulates, that in order to achieve data protection and compliance in cloud, organizations must use hardware security mechanisms and dedicated servers. We will explain why such traditional modes of hardware based security and physical controls of servers are becoming much less relevant for the dynamic cloud ecosystem.We will discuss the concepts of “Software defined Security” as it relates to the cloud context and the capabilities of cryptographic data protection solutions for the cloud that require no hardware. We will discuss the potential uses and benefits of Elastic Key Management & Homomorphic Encryption, an emerging mathematical technique which holds great promise for cloud security. By focusing on the specific problem of Key Management, we will show it is possible today to design high performance, software only security solutions that use Partially Homomorphic Encryption to protect encryption keys.

Cite

CITATION STYLE

APA

Koehler, A. W. (2014). Securing Cloud: Elastic Key Management and Homomorphic Encryption. In ISSE 2014 Securing Electronic Business Processes (pp. 144–154). Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978-3-658-06708-3_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free