week 5 discussion post 2

  • Read through the articles on homomorphic encryption above. You might also find a few more articles before you submit your posting.Given the information in these articles, provide your opinion on the realistic use of homomorphic encryption in cloud security. Is it ready for use? If not, why not? If so, why isn’t it already being used? What other forms of encryption are in use to protect data in cloud storage?