Data encryption
In this section, we will discuss the driving factors for encrypting data, emerging techniques for protecting data while increasing its value, and how to have confidence that data has not been unintentionally or surreptitiously modified. You will learn about protecting data during processing without decrypting. By the end of the section, you should be aware of which techniques work well on the edge.
Motivations for encrypting data
Data is encrypted so that unintended parties cannot read and ultimately use the data. Since the data does not belong to those third parties, nor do they have permission to use it, they should not be able to benefit from the usage of that data – also known as the concept of data ownership. It’s about the principle of ownership and the data owner being able to determine to what ends the data and derived value should be put – data sovereignty. Therefore, encryption of data is a method for the data owner to prevent, and...