Cloud 101CircleEventsBlog
Take the Understanding Data Risk Survey to help shape the future of data security!

Working Group

Fully Homomorphic Encryption

FHE in Cloud: Enhancing Security, Standardization, and Implementation Practices in Cloud Environments
Fully Homomorphic Encryption

Working Group Summary

Through the use and deployment of cryptographic libraries, specialist software toolchains and dedicated hardware and infrastructure, FHE can be leveraged to provide enhanced levels of protection for data in use. Supporting integration of FHE-enabled workflows with existing data practices will require technical resources and insight based on ongoing experimentation. The objectives of the working group are to investigate, understand and communicate the impact  of FHE in a cloud security context, and to establish best working practices and standards in the implementation and use of FHE as an information security tool.  What do we discuss? We discuss FHE in the context of cloud computing, with emphasis on practical elements of implementation, standardization and security modelling. The regulatory environment, impact on the control domains for cloud security, and establishment and evaluation of proofs-of-concept, also fall within the scope of the working group.

What is Fully Homomorphic Encryption?

Fully Homomorphic Encryption (FHE) is a cryptographic technology that enables computing over encrypted data. In traditional computing and cryptography, data can be protected by encryption when in storage or in transit over networks, but this protection must be stripped away before processing. This leaves data-in-use vulnerable to malicious attacks, accidental leakage, or unwarranted data sharing. FHE closes this vulnerability by providing a cryptographic system in which computing operations can be performed directly on the data without removing the protective encryption. 

Any computing operation can be performed under FHE, including more complex functionality such as machine learning and other data analytic processes. FHE also supports a range of different security models that allow for forms of secure multi-party computation and collaboration in which the inputs to the process remain totally private.

What is the importance of Fully Homomorphic Encryption?

FHE offers significant improvements to the way in which access and analysis of sensitive data is handled in fields such as finance, healthcare, and government, where cryptographic assurances of protection throughout the data life-cycle are highly desirable. Access to sensitive information for processing purposes is critical to the modern world, yet satisfactory protection of this asset under existing models of information security is technically complex and difficult to achieve. By encrypting data throughout all stages of management and use, a wide range of challenges to information security including both internal and external threats can be better managed. 

In summary, FHE is a new and extremely powerful technology that extends mathematically assessable cryptographic security from storage and transit to the processing stage of data usage. As the support provided by advances in the core technology and infrastructure improves, FHE is likely to become a ubiquitous tool in data security, in much the same way as conventional cryptography has become universal.

Working Group Leadership

Ryan Gifford
Ryan Gifford

Ryan Gifford

Research Analyst, CSA

Working Group Co-Chairs

Jez Goldstone
Jez Goldstone

Jez Goldstone

Director of Security Architecture, Cloud & Innovation

Jez is a cyber security expert, leader, innovator with over twenty years of IT experience in the Financial Services and other sectors. He has lead innovation initiatives and teams - focusing on where cyber innovations really add value to solve complex business challenges and open up competitive advantage opportunities. I have a keen interest in how Privacy Enhancing Tech, and specifically FHE, can help solve some of these challenges.

Read more

Joseph Wilson
Joseph Wilson

Joseph Wilson

Joseph Wilson is co-Chair for the Cloud Security Alliance's (CSA's) Fully Homomorphic Encryption (FHE) Working Group (WG), which was formed to address industrial deployment and adoption of FHE and to help the industry navigate this branch of Privacy Enhancing Technologies. He holds a PhD in Theoretical Physics from the University of Leeds, and an MPhys in Experimental Physics from the University of York. He is currently Head of Strategic In...

Read more

Publications in ReviewOpen Until
Shadow Access and AINov 17, 2024
Enterprise Authority To Operate (EATO) Auditing GuidelinesNov 18, 2024
Context-Based Access Control for Zero TrustNov 27, 2024
View all
Who can join?

Anyone can join a working group, whether you have years of experience or want to just participate as a fly on the wall.

What is the time commitment?

The time commitment for this group varies depending on the project. You can spend a 15 minutes helping review a publication that's nearly finished or help author a publication from start to finish.

Open Peer Reviews

Peer reviews allow security professionals from around the world to provide feedback on CSA research before it is published.

Learn how to participate in a peer review here.

Shadow Access and AI

Open Until: 11/17/2024

The document titled "Shadow Access and AI" explores the intricate relationship between Shadow Access and AI, highlighting t...

Enterprise Authority To Operate (EATO) Auditing Guidelines

Open Until: 11/18/2024

The CSA Enterprise Authority to Operate (EATO) Working Group has identified gaps within the understanding and implementa...

Context-Based Access Control for Zero Trust

Open Until: 11/27/2024

The document "Context-Based Access Control for Zero Trust" provides guidance on implementing context-based access control (...