Next Article in Journal
The Cybersecurity Awareness INventory (CAIN): Early Phases of Development of a Tool for Assessing Cybersecurity Knowledge Based on the ISO/IEC 27032
Previous Article in Journal
The Privacy Flag Observatory: A Crowdsourcing Tool for Real Time Privacy Threats Evaluation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing

1
Laboratory for Machine Tools and Production Engineering (WZL), RWTH Aachen University, Campus-Boulevard 30, 52074 Aachen, Germany
2
Fraunhofer Institute for Production Technology IPT, Steinbachstraße 17, 52074 Aachen, Germany
*
Author to whom correspondence should be addressed.
J. Cybersecur. Priv. 2023, 3(1), 44-60; https://doi.org/10.3390/jcp3010004
Submission received: 18 December 2022 / Revised: 28 January 2023 / Accepted: 29 January 2023 / Published: 6 February 2023
(This article belongs to the Topic Next Generation of Security and Privacy in IoT, Industry 4.0, 5G Systems and Beyond)
(This article belongs to the Section Cryptography and Cryptology)

Abstract

Homomorphic encryption enables secure cloud computing over the complete data lifecycle. As so-called in-use encryption methodology, it allows using encrypted data for, e.g., data analysis—in contrast to classic encryption methods. In-use encryption enables new ways of value creation and an extensive use of cloud computing for manufacturing companies. However, homomorphic encryption is not widely implemented in practice yet. This is mainly since homomorphic encryption has higher computation times and is limited regarding its calculation operations. Nevertheless, for some use cases, the security requirements are a lot stricter than, e.g., timeliness requirements. Thus, homomorphic encryption might be beneficial. This paper, therefore, analyzes the potential of homomorphic encryption for cloud computing in manufacturing. First, the potential and limitations for both classic and homomorphic encryption are presented on the basis of a literature review. Second, to validate the limitations, simulations are executed, comparing the computation time and data transfer of classic and homomorphic encryption. The results show that homomorphic encryption is a tradeoff of security, time, and cost, which highly depends on the use case. Therefore, third, manufacturing use cases are identified; the two use cases of predictive maintenance and contract manufacturing are presented in detail, demonstrating how homomorphic encryption can be beneficial.
Keywords: homomorphic encryption; cloud computing; manufacturing homomorphic encryption; cloud computing; manufacturing

Share and Cite

MDPI and ACS Style

Kiesel, R.; Lakatsch, M.; Mann, A.; Lossie, K.; Sohnius, F.; Schmitt, R.H. Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. J. Cybersecur. Priv. 2023, 3, 44-60. https://doi.org/10.3390/jcp3010004

AMA Style

Kiesel R, Lakatsch M, Mann A, Lossie K, Sohnius F, Schmitt RH. Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. Journal of Cybersecurity and Privacy. 2023; 3(1):44-60. https://doi.org/10.3390/jcp3010004

Chicago/Turabian Style

Kiesel, Raphael, Marvin Lakatsch, Alexander Mann, Karl Lossie, Felix Sohnius, and Robert H. Schmitt. 2023. "Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing" Journal of Cybersecurity and Privacy 3, no. 1: 44-60. https://doi.org/10.3390/jcp3010004

APA Style

Kiesel, R., Lakatsch, M., Mann, A., Lossie, K., Sohnius, F., & Schmitt, R. H. (2023). Potential of Homomorphic Encryption for Cloud Computing Use Cases in Manufacturing. Journal of Cybersecurity and Privacy, 3(1), 44-60. https://doi.org/10.3390/jcp3010004

Article Metrics

Back to TopTop