Overview of homomorphic encryption technology for data privacy
Qiang Chen (),
Huixian Li (),
Suriyani Ariffin () and
Nur Atiqah Sia Abdullah ()
Review of Computer Engineering Research, 2024, vol. 11, issue 3, 130-139
Abstract:
This study examines the overview of homomorphic encryption technology for data privacy. In the era of big data, the growing need to utilize vast amounts of information while ensuring privacy and security has become a significant challenge. Homomorphic encryption technology has gained attention as a solution for privacy-preserving data processing, allowing computations on encrypted data without exposing sensitive information. This study introduces the concept of data privacy preservation and explores the evaluation of homomorphic encrypted technology. The focus is on analyzing both partial and full homomorphic encryption methods, highlighting their respective characteristics, evaluation criteria, and the current state of research. Partial homomorphic encryption supports limited operations, while full homomorphic encryption enables unlimited computation on encrypted data, though both face challenges related to computational overhead and efficiency. Additionally, this paper addresses the ongoing issues and limitations associated with homomorphic encryption, such as its complexity, large encryption volumes, and difficulties in handling large-scale datasets. Despite these challenges, researchers continue to refine the technology and expand its applications in cloud computing, big data analytics, and privacy-preserving computing environments. This study also discussed potential future research avenues aimed at improving the scalability, efficiency, and security of homomorphic encryption to support broader, real-world applications. Ultimately, homomorphic encryption is positioned as a key enabler for secure data utilization in an increasingly privacy-conscious digital landscape.
Keywords: Big data; Homomorphic encryption; Privacy preservation; Cloud computing; Full homomorphic encryption; Partial homomorphic encryption. (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:
Downloads: (external link)
https://archive.conscientiabeam.com/index.php/76/article/view/3955/8327 (application/pdf)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:pkp:rocere:v:11:y:2024:i:3:p:130-139:id:3955
Access Statistics for this article
More articles in Review of Computer Engineering Research from Conscientia Beam
Bibliographic data for series maintained by Dim Michael ().