A Comprehensive Survey on Secure Outsourced Computation and Its Applications
With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outso...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8884162/ |
_version_ | 1818349373691527168 |
---|---|
author | Yang Yang Xindi Huang Ximeng Liu Hongju Cheng Jian Weng Xiangyang Luo Victor Chang |
author_facet | Yang Yang Xindi Huang Ximeng Liu Hongju Cheng Jian Weng Xiangyang Luo Victor Chang |
author_sort | Yang Yang |
collection | DOAJ |
description | With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. Finally, we discuss the security and performance of existing works and give future directions in this field. |
first_indexed | 2024-12-13T18:04:55Z |
format | Article |
id | doaj.art-082a3223f2e84803978301a5b9d3cb42 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-13T18:04:55Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-082a3223f2e84803978301a5b9d3cb422022-12-21T23:36:05ZengIEEEIEEE Access2169-35362019-01-01715942615946510.1109/ACCESS.2019.29497828884162A Comprehensive Survey on Secure Outsourced Computation and Its ApplicationsYang Yang0https://orcid.org/0000-0002-7891-2670Xindi Huang1Ximeng Liu2https://orcid.org/0000-0002-4238-3295Hongju Cheng3https://orcid.org/0000-0002-0768-7859Jian Weng4Xiangyang Luo5Victor Chang6https://orcid.org/0000-0002-8012-5852College of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaCollege of Mathematics and Computer Science, Fuzhou University, Fuzhou, ChinaGuangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, ChinaState Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, ChinaSchool of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, U.K.With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. Finally, we discuss the security and performance of existing works and give future directions in this field.https://ieeexplore.ieee.org/document/8884162/Secure outsourced computingprivacy preservinghomomorphic encryptionsecure outsourced machine learningdata processing |
spellingShingle | Yang Yang Xindi Huang Ximeng Liu Hongju Cheng Jian Weng Xiangyang Luo Victor Chang A Comprehensive Survey on Secure Outsourced Computation and Its Applications IEEE Access Secure outsourced computing privacy preserving homomorphic encryption secure outsourced machine learning data processing |
title | A Comprehensive Survey on Secure Outsourced Computation and Its Applications |
title_full | A Comprehensive Survey on Secure Outsourced Computation and Its Applications |
title_fullStr | A Comprehensive Survey on Secure Outsourced Computation and Its Applications |
title_full_unstemmed | A Comprehensive Survey on Secure Outsourced Computation and Its Applications |
title_short | A Comprehensive Survey on Secure Outsourced Computation and Its Applications |
title_sort | comprehensive survey on secure outsourced computation and its applications |
topic | Secure outsourced computing privacy preserving homomorphic encryption secure outsourced machine learning data processing |
url | https://ieeexplore.ieee.org/document/8884162/ |
work_keys_str_mv | AT yangyang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT xindihuang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT ximengliu acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT hongjucheng acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT jianweng acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT xiangyangluo acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT victorchang acomprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT yangyang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT xindihuang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT ximengliu comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT hongjucheng comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT jianweng comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT xiangyangluo comprehensivesurveyonsecureoutsourcedcomputationanditsapplications AT victorchang comprehensivesurveyonsecureoutsourcedcomputationanditsapplications |