# homomorphic encryption

## Disk Encryption and File Encryption

### Looking for something else?

TECHNOLOGIES
Encryption techniques

Homomorphic encryption is the conversion of data into ciphertext that can be analyzed and worked with as if it were still in its original form.

Homomorphic encryptions allow complex mathematical operations to be performed on encrypted data without compromising the encryption. In mathematics, homomorphic describes the transformation of one data set into another while preserving relationships between elements in both sets.  The term is derived from the Greek words for "same structure." Because the data in a homomorphic encryption scheme retains the same structure, identical mathematical operations -- whether they are performed on encrypted or decrypted data --  will yield equivalent results.

Homomorphic encryption is expected to play an important part in cloud computing, allowing companies to store encrypted data in a public cloud and take advantage of the cloud provider’s analytic services.

Here is a very simple example of how a homomorphic encryption scheme might work in cloud computing:

• Business XYZ has a very important data set (VIDS) that consists of the numbers 5 and 10.  To encrypt the data set, Business XYZ multiplies each element in the set by 2, creating a new set whose members are 10 and 20.
• Business XYZ sends the encrypted VIDS set to the cloud for safe storage.  A few months later, the government contacts Business XYZ and requests the sum of VIDS elements.
• Business XYZ is very busy, so it asks the cloud provider to perform the operation.  The cloud provider, who only has access to the encrypted data set,  finds the sum of 10 + 20 and returns the answer 30.
• Business XYZ decrypts the cloud provider’s reply and provides the government with the decrypted answer, 15.

This was first published in August 2011

#### Next Steps

Read our full disk encryption tools buyer's guide to learn the basics of FDE storage, how your enterprise business can benefit from implementing FDE technology and what you should know before purchasing a full disk encryption product.

## Content

Find more PRO+ content and other member only offers, here.

Oldest

## SearchCloudSecurity

• ### Lack of secure APIs can create IaaS risks

IaaS data security risks are a persistent problem for enterprises moving to the cloud, but there are specific issues to keep an ...

• ### Microsoft-Adallom deal poised to impact cloud security gateway market

Microsoft reportedly agreed to acquire cloud security startup Adallon for \$320 million, which analysts say could spark major ...

• ### Keep credentials safe despite insecure mobile cloud backup services

A recent study revealed app developers that use mobile cloud backup services put user credentials at risk. Expert Rob Shapland ...

## SearchNetworking

• ### Big data impact on network operations probed in study

Big data is big news, but it's also influencing networking pros' capacity planning, according to an Enterprise Management ...

• ### ICYMI: NetScout-Danaher deal to wed security, DPI

NetScout plans to incorporate security in monitoring; Barracuda upgrades ADCs; and Riverbed improves SteelHead.

• ### Overcoming the challenges of wiring farm networks

The sound of mooing and the smell of diesel fuel are just part of what makes wiring a farm for networking a special experience.

## SearchCIO

• ### AI technology: Is the genie (or genius) out of the bottle?

Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's ...

• ### Free IT strategy plan templates and examples for CIOs

How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide ...

• ### CIOs under pressure to generate revenue through data monetization

Is data monetization the new gold rush? CEOs and boards of directors think so, and they are looking to CIOs to strike it rich.

## SearchConsumerization

• ### Android, Windows tablets from HP take aim at business users

HP released a new line of tablets targeting business users. The HP Pro Slate 8 and Pro Slate 12 run Android and cost \$449 and ...

• ### Microsoft to lay off 18,000, Nokia X moves to Windows Phone

Microsoft will lay off 18,000 people over the next year while the Nokia X line of Android smartphones, which was unveiled earlier...

• ### Microsoft Surface Pro 3 vs. Microsoft Surface Pro 2

Surface Pro 2 and Surface Pro 3 are different enough that Microsoft is keeping both on the market as competing products. Which ...

## SearchEnterpriseDesktop

• ### Windows 10 guide for IT administrators

Windows 10 boasts of bevy of features, including Contiuum, Universal Windows apps, Cortana and improved security. Before you ...

• ### Why you should remove local administrator rights once and for all

Some companies shy away from removing local admin rights just to make users happy, but taking back users' admin privileges can ...

• ### Putting the Windows 10 Action Center to work

The Windows 10 Action Center is a carryover from Windows Phone that puts all your notifications in one place. It also makes ...

## SearchCloudComputing

• ### Taking a multivendor approach to an OpenStack project

Enterprises building an OpenStack private cloud often rely on a managed service provider for implementation. But sometimes, a ...

• ### HP Helion gets a boost from PaaS acquisition

HP has one more Cloud Foundry PaaS offering following an acquisition that may help the company get into more hybrid cloud ...

• ### Rackspace, Intel launch OpenStack training center

Enterprises are interested in OpenStack, but can't find enough IT pros with open source cloud expertise. Rackspace and Intel hope...

## ComputerWeekly

• ### Interview: CCS director Sarah Hurrell on improving government technology purchasing

The government's procurement agency has plenty of critics, but its technology lead insists that IT and digital purchasing is ...

• ### British Gas to invest £500m in connected homes business

Energy provider aims to build on success of its Hive smart thermostat and roll-out of smartmeters

• ### Commercial software more secure than open source, finds report

A study has found that commercial code is more compliant than open source code with security compliance standards, such as the ...

Close