A Comprehensive Survey on Secure Outsourced Computation and Its Applications

Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang

Research output: Contribution to journalArticlepeer-review

452 Downloads (Pure)

Abstract

With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing
brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.
Original languageEnglish
Pages (from-to)159426 - 159465
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 28 Oct 2019

Fingerprint

Dive into the research topics of 'A Comprehensive Survey on Secure Outsourced Computation and Its Applications'. Together they form a unique fingerprint.

Cite this