A Comprehensive Survey on Secure Outsourced Computation and Its Applications

Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang

Research output: Contribution to journalArticle

8 Downloads (Pure)

Abstract

With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing
brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.
Original languageEnglish
Pages (from-to)159426 - 159465
JournalIEEE Access
Volume7
DOIs
Publication statusPublished - 28 Oct 2019

Fingerprint

Outsourcing
Data privacy
Security of data
Cryptography
Servers
Industry

Cite this

Yang, Yang ; Huang, Xindi ; Liu, Ximeng ; Cheng, Hongju ; Weng, Jian ; Luo, Xiangyang ; Chang, Victor. / A Comprehensive Survey on Secure Outsourced Computation and Its Applications. In: IEEE Access. 2019 ; Vol. 7. pp. 159426 - 159465.
@article{d9adc8d5a56142d391554527471915fb,
title = "A Comprehensive Survey on Secure Outsourced Computation and Its Applications",
abstract = "With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcingbrings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.",
author = "Yang Yang and Xindi Huang and Ximeng Liu and Hongju Cheng and Jian Weng and Xiangyang Luo and Victor Chang",
year = "2019",
month = "10",
day = "28",
doi = "10.1109/ACCESS.2019.2949782",
language = "English",
volume = "7",
pages = "159426 -- 159465",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Yang, Y, Huang, X, Liu, X, Cheng, H, Weng, J, Luo, X & Chang, V 2019, 'A Comprehensive Survey on Secure Outsourced Computation and Its Applications', IEEE Access, vol. 7, pp. 159426 - 159465. https://doi.org/10.1109/ACCESS.2019.2949782

A Comprehensive Survey on Secure Outsourced Computation and Its Applications. / Yang, Yang; Huang, Xindi; Liu, Ximeng; Cheng, Hongju; Weng, Jian; Luo, Xiangyang; Chang, Victor.

In: IEEE Access, Vol. 7, 28.10.2019, p. 159426 - 159465.

Research output: Contribution to journalArticle

TY - JOUR

T1 - A Comprehensive Survey on Secure Outsourced Computation and Its Applications

AU - Yang, Yang

AU - Huang, Xindi

AU - Liu, Ximeng

AU - Cheng, Hongju

AU - Weng, Jian

AU - Luo, Xiangyang

AU - Chang, Victor

PY - 2019/10/28

Y1 - 2019/10/28

N2 - With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcingbrings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.

AB - With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcingbrings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks.

UR - https://doi.org/10.1109/ACCESS.2019.2949782

U2 - 10.1109/ACCESS.2019.2949782

DO - 10.1109/ACCESS.2019.2949782

M3 - Article

VL - 7

SP - 159426

EP - 159465

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

ER -

Yang Y, Huang X, Liu X, Cheng H, Weng J, Luo X et al. A Comprehensive Survey on Secure Outsourced Computation and Its Applications. IEEE Access. 2019 Oct 28;7:159426 - 159465. https://doi.org/10.1109/ACCESS.2019.2949782