A Comprehensive Survey on Secure Outsourced Computation and Its Applications

With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outso...

Full description

Bibliographic Details
Main Authors: Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang
Format: Article
Language:English
Published: IEEE 2019-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8884162/
_version_ 1818349373691527168
author Yang Yang
Xindi Huang
Ximeng Liu
Hongju Cheng
Jian Weng
Xiangyang Luo
Victor Chang
author_facet Yang Yang
Xindi Huang
Ximeng Liu
Hongju Cheng
Jian Weng
Xiangyang Luo
Victor Chang
author_sort Yang Yang
collection DOAJ
description With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. Finally, we discuss the security and performance of existing works and give future directions in this field.
first_indexed 2024-12-13T18:04:55Z
format Article
id doaj.art-082a3223f2e84803978301a5b9d3cb42
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-13T18:04:55Z
publishDate 2019-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-082a3223f2e84803978301a5b9d3cb422022-12-21T23:36:05ZengIEEEIEEE Access2169-35362019-01-01715942615946510.1109/ACCESS.2019.29497828884162A Comprehensive Survey on Secure Outsourced Computation and Its ApplicationsYang Yang0https://orcid.org/0000-0002-7891-2670Xindi Huang1Ximeng Liu2https://orcid.org/0000-0002-4238-3295Hongju Cheng3https://orcid.org/0000-0002-0768-7859Jian Weng4Xiangyang Luo5Victor Chang6https://orcid.org/0000-0002-8012-5852College of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaGuangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaSchool of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, U.K.With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. Finally, we discuss the security and performance of existing works and give future directions in this field.https://ieeexplore.ieee.org/document/8884162/Secure outsourced computingprivacy preservinghomomorphic encryptionsecure outsourced machine learningdata processing
spellingShingle Yang Yang
Xindi Huang
Ximeng Liu
Hongju Cheng
Jian Weng
Xiangyang Luo
Victor Chang
A Comprehensive Survey on Secure Outsourced Computation and Its Applications
IEEE Access
Secure outsourced computing
privacy preserving
homomorphic encryption
secure outsourced machine learning
data processing
title A Comprehensive Survey on Secure Outsourced Computation and Its Applications
title_full A Comprehensive Survey on Secure Outsourced Computation and Its Applications
title_fullStr A Comprehensive Survey on Secure Outsourced Computation and Its Applications
title_full_unstemmed A Comprehensive Survey on Secure Outsourced Computation and Its Applications
title_short A Comprehensive Survey on Secure Outsourced Computation and Its Applications
title_sort comprehensive survey on secure outsourced computation and its applications
topic Secure outsourced computing
privacy preserving
homomorphic encryption
secure outsourced machine learning
data processing
url https://ieeexplore.ieee.org/document/8884162/
work_keys_str_mv AT yangyang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT xindihuang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT ximengliu acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT hongjucheng acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT jianweng acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT xiangyangluo acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT victorchang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT yangyang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT xindihuang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT ximengliu comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT hongjucheng comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT jianweng comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT xiangyangluo comprehensivesurveyonsecureoutsourcedcomputationanditsapplications
AT victorchang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications