• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Yang, Y. (Yang, Y..) [1] | Huang, X. (Huang, X..) [2] | Liu, X. (Liu, X..) [3] | Cheng, H. (Cheng, H..) [4] | Weng, J. (Weng, J..) [5] | Luo, X. (Luo, X..) [6] | Chang, V. (Chang, V..) [7]

Indexed by:

Scopus

Abstract:

With the ever-increasing requirement of storage and computation resources, it is unrealistic for local devices (with limited sources) to implement large-scale data processing. Therefore, individuals or corporations incline to outsource their computation requirements to the cloud. However, data outsourcing brings security and privacy concerns to users when the cloud servers are not fully trusted. Recently, extensive research works are conducted, aiming at secure outsourcing schemes for diverse computational tasks via different technologies. In this survey, we provide a technical review and comparison of existing outsourcing schemes using diverse secure computation methods. Specifically, we begin the survey by describing security threats and requirements of secure outsourcing computation. Meanwhile, we introduce four secure techniques (i.e., secure multi-party computation, pseudorandom functions, software guard extensions, and perturbation approaches) and their related works. Then, we focus on the theories and evolution of homomorphic encryption, as well as the applications of the basic operations and application-specific tasks. Finally, we discuss the security and performance of existing works and give future directions in this field. © 2013 IEEE.

Keyword:

data processing; homomorphic encryption; privacy preserving; Secure outsourced computing; secure outsourced machine learning

Community:

  • [ 1 ] [Yang, Y.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 2 ] [Yang, Y.]Guangxi Key Laboratory of Cryptography and Information Security, Guangxi, 541004, China
  • [ 3 ] [Yang, Y.]Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China
  • [ 4 ] [Yang, Y.]Fujian Provincial Key Laboratory of Information Processing and Intelligent Control, Minjiang University, Fuzhou, 350108, China
  • [ 5 ] [Yang, Y.]University Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350108, China
  • [ 6 ] [Huang, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 7 ] [Huang, X.]University Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350108, China
  • [ 8 ] [Liu, X.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 9 ] [Liu, X.]University Key Laboratory of Information Security of Network Systems, Fuzhou University, Fuzhou, 350108, China
  • [ 10 ] [Cheng, H.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou, China
  • [ 11 ] [Weng, J.]Guangdong Provincial Key Laboratory of Data Security and Privacy Protection, Guangzhou, China
  • [ 12 ] [Luo, X.]State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China
  • [ 13 ] [Chang, V.]School of Computing, Engineering and Digital Technologies, Teesside University, Middlesbrough, United Kingdom

Reprint 's Address:

  • [Yang, Y.]College of Mathematics and Computer Science, Fuzhou UniversityChina

Show more details

Related Keywords:

Related Article:

Source :

IEEE Access

ISSN: 2169-3536

Year: 2019

Volume: 7

Page: 159426-159465

3 . 7 4 5

JCR@2019

3 . 4 0 0

JCR@2023

ESI HC Threshold:150

JCR Journal Grade:1

CAS Journal Grade:2

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 38

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:44/10038160
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1