期刊名称:Journal of Theoretical and Applied Information Technology
印刷版ISSN:1992-8645
电子版ISSN:1817-3195
出版年度:2013
卷号:47
期号:2
页码:479-495
出版社:Journal of Theoretical and Applied
摘要:The trend towards delegating data processing and management to a remote party raises major concerns related to privacy violations for both end-users and service providers. These concerns have attracted the attention of the research community, and several techniques have been proposed to protect against malicious parties by providing secure communication protocols. Most of the proposed techniques, however, require the involvement of a third party, and this by itself can be viewed as another security concern. In this paper, we present a survey of different techniques that aim at secure applications, services, and routing protocols. We exhibit practical and popular systems/models and highlight the lack of privacy and confidentiality support in them. Furthermore, to avoid security breaches, we propose adopting an innovative approach that depends on data sorted, managed, and processed in encrypted form at the remote servers. To realize such an approach, the encryption cryptosystem must support both addition and multiplication over encrypted data. Finally, we highlight some novel tracks helping in the construction of a fully secure protocol based on the fully homomorphic encryption schemes.