Secure Computation on Encrypted Data

A special issue of Sci (ISSN 2413-4155). This special issue belongs to the section "Computer Sciences, Mathematics and AI".

Deadline for manuscript submissions: closed (15 January 2022) | Viewed by 477

Special Issue Editor


E-Mail Website
Guest Editor
School of Computing, Engineering and Intelligent systems, Ulster University, Londonderry BT48 7JL, UK
Interests: cloud security; searchable symmetric encryption; cryptography

Special Issue Information

In recent years, there have been numerous data breaches where sensitive data has been leaked. Global data privacy and protection legislation is still poorly enforced, creating confusion and misinterpretation. As well as this, data security and data privacy are two of the most commonly cited issues with cloud computing. There is a fear amongst some that cloud service providers (CSPs) exploit customer data for their own means, such as sharing customer data with third parties. To alleviate these fears, cloud service providers have introduced support for data encryption. Whilst encryption is synonymous with data security, the matter in which it is utilised by cloud service providers fails to offer complete security.

Used in its traditional form, encryption guarantees the security of data-in-transit and data-at-rest. However, it must be decrypted once received or retrieved from storage to allow any type of computation to be performed on it. To retain the ability to process encrypted customer data, cloud service providers require access to the associated decryption keys. Such keys can be stored on the premises of the cloud service provider or forwarded there by the customer as and when they require access to their data. Whilst this approach goes some way towards addressing the data security and privacy fears associated with the cloud, it is not considered truly secure by virtue of the fact that customers must disclose their decryption keys.

As an application of cryptography, Searchable Encryption schemes are designed to be secure against an adversarial model and with a technical environment in mind. Legacy-Compliant Searchable Encryption schemes can be utilised with traditional relational database management systems (RDBMSs), which use structured query language (SQL)—a type of programming designed to retrieve specific information from databases. Ultimately, if a cloud service is breached and the data are encrypted, individuals or companies are the only ones who retain the private key to unlock the data. Having data encrypted in the cloud, yet as still searchable and updatable, is one path to preventing future data breaches.

Searchable Symmetric Encryption will be an essential tool for many individuals and organisations—especially in a time where the majority of us are relying on technology more than ever before. We can expect to see the continuation of this as technology advances, to prevent data breaches from becoming even more of a threat. This issue is a call for papers in the area of computation or search over encrypted data.

Prof. Dr. Kevin Curran
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sci is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • encryption
  • searchable symmetric encryption
  • homomorphic computing
  • cloud security

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop