IDEAS home Printed from https://ideas.repec.org/a/pkp/rocere/v11y2024i3p130-139id3955.html
   My bibliography  Save this article

Overview of homomorphic encryption technology for data privacy

Author

Listed:
  • Qiang Chen
  • Huixian Li
  • Suriyani Ariffin
  • Nur Atiqah Sia Abdullah

Abstract

This study examines the overview of homomorphic encryption technology for data privacy. In the era of big data, the growing need to utilize vast amounts of information while ensuring privacy and security has become a significant challenge. Homomorphic encryption technology has gained attention as a solution for privacy-preserving data processing, allowing computations on encrypted data without exposing sensitive information. This study introduces the concept of data privacy preservation and explores the evaluation of homomorphic encrypted technology. The focus is on analyzing both partial and full homomorphic encryption methods, highlighting their respective characteristics, evaluation criteria, and the current state of research. Partial homomorphic encryption supports limited operations, while full homomorphic encryption enables unlimited computation on encrypted data, though both face challenges related to computational overhead and efficiency. Additionally, this paper addresses the ongoing issues and limitations associated with homomorphic encryption, such as its complexity, large encryption volumes, and difficulties in handling large-scale datasets. Despite these challenges, researchers continue to refine the technology and expand its applications in cloud computing, big data analytics, and privacy-preserving computing environments. This study also discussed potential future research avenues aimed at improving the scalability, efficiency, and security of homomorphic encryption to support broader, real-world applications. Ultimately, homomorphic encryption is positioned as a key enabler for secure data utilization in an increasingly privacy-conscious digital landscape.

Suggested Citation

  • Qiang Chen & Huixian Li & Suriyani Ariffin & Nur Atiqah Sia Abdullah, 2024. "Overview of homomorphic encryption technology for data privacy," Review of Computer Engineering Research, Conscientia Beam, vol. 11(3), pages 130-139.
  • Handle: RePEc:pkp:rocere:v:11:y:2024:i:3:p:130-139:id:3955
    as

    Download full text from publisher

    File URL: https://archive.conscientiabeam.com/index.php/76/article/view/3955/8327
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pkp:rocere:v:11:y:2024:i:3:p:130-139:id:3955. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Dim Michael (email available below). General contact details of provider: https://archive.conscientiabeam.com/index.php/76/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.