Working Group
Fully Homomorphic Encryption
FHE in Cloud: Enhancing Security, Standardization, and Implementation Practices in Cloud Environments
Working Group Summary
Through the use and deployment of cryptographic libraries, specialist software toolchains and dedicated hardware and infrastructure, FHE can be leveraged to provide enhanced levels of protection for data in use. Supporting integration of FHE-enabled workflows with existing data practices will require technical resources and insight based on ongoing experimentation. The objectives of the working group are to investigate, understand and communicate the impact of FHE in a cloud security context, and to establish best working practices and standards in the implementation and use of FHE as an information security tool. What do we discuss? We discuss FHE in the context of cloud computing, with emphasis on practical elements of implementation, standardization and security modelling. The regulatory environment, impact on the control domains for cloud security, and establishment and evaluation of proofs-of-concept, also fall within the scope of the working group.
What is Fully Homomorphic Encryption?
Working Group Leadership
Ryan Gifford
Research Analyst, CSA
Working Group Co-Chairs
Jez Goldstone
Director of Security Architecture, Cloud & Innovation
Jez is a cyber security expert, leader, innovator with over twenty years of IT experience in the Financial Services and other sectors. He has lead innovation initiatives and teams - focusing on where cyber innovations really add value to solve complex business challenges and open up competitive advantage opportunities. I have a keen interest in how Privacy Enhancing Tech, and specifically FHE, can help solve some of these challenges.
Joseph Wilson
Joseph Wilson is co-Chair for the Cloud Security Alliance's (CSA's) Fully Homomorphic Encryption (FHE) Working Group (WG), which was formed to address industrial deployment and adoption of FHE and to help the industry navigate this branch of Privacy Enhancing Technologies. He holds a PhD in Theoretical Physics from the University of Leeds, and an MPhys in Experimental Physics from the University of York. He is currently Head of Strategic In...
Publications in Review | Open Until |
---|---|
Shadow Access and AI | Nov 17, 2024 |
Enterprise Authority To Operate (EATO) Auditing Guidelines | Nov 18, 2024 |
Context-Based Access Control for Zero Trust | Nov 27, 2024 |
Who can join?
Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.
What is the time commitment?
The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.
Open Peer Reviews
Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.