I. Introduction
Contemporary data usage lifecycle is generally more complicated than it was before due to the interconnected stakeholders and untrusted service vendors in the system, such as the Internet-of-Things and cloud computing [1]–[3]. Data owners are unaware of the real service providers behind the mask of the service presentation when computing resources are offered as a manner of the service [4], [5]. This security concern is commonly caused by the loss of control over the data from the data owner side [6], [7]. Thus, there has been an urgent demand for finding out an approach that proactively prevents data from unexpected usage on the remotes, which forms the major motivation of this work. A fully homomorphic encryption (FHE) solution is an ideal conceptual alternative. For example, an FHE application scenario can be that a financial service institution can prevent cloud providers from touching sensitive data but still can use cloud services. However, there is no practicable FHE application yet in the market due to technical obstacles.