IDEAS home Printed from https://ideas.repec.org/a/igg/jcini0/v15y2021i4p1-22.html
   My bibliography  Save this article

Research Review on the Application of Homomorphic Encryption in Database Privacy Protection

Author

Listed:
  • Yong Ma

    (School of Computer Information Engineering, Jiangxi Normal University, China)

  • Jiale Zhao

    (School of Computer Information Engineering, Jiangxi Normal University, China)

  • Kangshun Li

    (College of Computer, Guangdong University of Science and Technology, China)

  • Yuanlong Cao

    (School of Software, Jiangxi Normal University, China)

  • Huyuan Chen

    (School of Mathematics and Statistics, Jiangxi Normal University, China)

  • Youcheng Zhang

    (Nanjing Unary Information Technology Co. Ltd., China)

Abstract

With the advent and development of database applications such as big data and data mining, how to ensure the availability of data without revealing sensitive information has been a significant problem for database privacy protection. As a critical technology to solve this problem, homomorphic encryption has become a hot research area in information security at home and abroad in recent years. The paper sorted out, analyzed, and summarized the research progress of homomorphic encryption technology in database privacy protection. Moreover, the application of three different types of homomorphic encryption technology in database privacy protection was introduced respectively, and the rationale and characteristics of each technique were analyzed and explained. Ultimately, this research summarized the challenges and development trends of homomorphic encryption technology in the application of database privacy protection, which provides a reference for future research.

Suggested Citation

  • Yong Ma & Jiale Zhao & Kangshun Li & Yuanlong Cao & Huyuan Chen & Youcheng Zhang, 2021. "Research Review on the Application of Homomorphic Encryption in Database Privacy Protection," International Journal of Cognitive Informatics and Natural Intelligence (IJCINI), IGI Global, vol. 15(4), pages 1-22, October.
  • Handle: RePEc:igg:jcini0:v:15:y:2021:i:4:p:1-22
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCINI.287600
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jcini0:v:15:y:2021:i:4:p:1-22. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.