A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment

被引:9
|
作者
Liu, Zewei [1 ]
Hu, Chunqiang [1 ,2 ]
Li, Ruinian [3 ]
Xiang, Tao [4 ]
Li, Xingwang [5 ]
Yu, Jiguo [6 ]
Xia, Hui [7 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400030, Peoples R China
[2] China Southern Power Grid, Joint Lab Cyberspace Secur, Guangzhou 510530, Guangdong, Peoples R China
[3] Bowling Green State Univ, Comp Sci Dept, Bowling Green, OH 43403 USA
[4] Chongqing Univ, Coll Comp Sci, Chongqing 400030, Peoples R China
[5] Henan Polytech Univ, Coll Phys & Elect Informat Engn, Jiaozuo 454099, Henan, Peoples R China
[6] Qilu Univ Technol, Big Data Inst, Jinan 250353, Shandong, Peoples R China
[7] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266005, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Terms-Outsourcing computing; privacy-preserving; blockchain; trusted execution environment; smart contract; CLOUD; COMPUTATION; ALGORITHMS;
D O I
10.1109/TCC.2022.3201401
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data. Though cloud computing brings great advantages, new issues emerge, such as data security breach and privacy disclosure. In this article, we introduce a novel secure and privacy-preserving outsourcing computing scheme (hereafter referred to as SPOCS) to tackle this issue. In SPOCS, the effective use of Intel Software Guard Extensions (SGX), one of the trusted execution environment (TEE), ensures the confidence and integrity of sensitive data in cloud computing and prevents data loss from causing privacy disclosure. In order to keep malicious cloud service providers (CSPs) from illegally tampering with the outsourcing results, blockchain is employed to ensure the data immutability. Significantly, our proposed scheme achieves anonymity and traceability. In the outsourcing process, smart contracts are applied to make the whole process fully automated without any human involvement. Finally, the security of the proposed scheme is analyzed in terms of its resistance to different attacks. The experiments indicate that our scheme is effective and efficient.
引用
收藏
页码:2325 / 2336
页数:12
相关论文
共 50 条
  • [1] A Lightweight Privacy-Preserving Protocol for VANETs Based on Secure Outsourcing Computing
    Wei, Zhijun
    Li, Jing
    Wang, Xianmin
    Gao, Chong-Zhi
    [J]. IEEE ACCESS, 2019, 7 : 62785 - 62793
  • [2] A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment
    Peng, Tao
    Guan, Kejian
    Liu, Jierong
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 215 - 226
  • [3] Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 281 - 298
  • [4] A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
    Akguen, Mete
    Soykan, Elif Ustundag
    Soykan, Gurkan
    [J]. IEEE ACCESS, 2023, 11 : 9182 - 9196
  • [5] Privacy-preserving logistic regression outsourcing in cloud computing
    Zhu, Xu Dong
    Li, Hui
    Li, Feng Hua
    [J]. INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 144 - 150
  • [6] Secure and Privacy-preserving Energy Trading Scheme based on Blockchain
    Jiang, Shunrong
    Zhang, Xiaoyan
    Li, Jinpeng
    Yue, Hao
    Zhou, Yong
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [7] Secure and privacy-preserving DRM scheme using homomorphic encryption in cloud computing
    HUANG Qin-long
    MA Zhao-feng
    YANG Yi-xian
    FU Jing-yi
    NIU Xin-xin
    [J]. The Journal of China Universities of Posts and Telecommunications, 2013, 20 (06) : 88 - 95
  • [8] A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment br
    Zhang, Yiran
    Geng, Huizheng
    Xu, Yanyan
    Su, Li
    Liu, Fei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2023, 17 (02): : 450 - 470
  • [9] Privacy-preserving genotype imputation in a trusted execution environment
    Dokmai, Natnatee
    Kockan, Can
    Zhu, Kaiyuan
    Wang, XiaoFeng
    Sahinalp, S. Cenk
    Cho, Hyunghoon
    [J]. CELL SYSTEMS, 2021, 12 (10) : 983 - +
  • [10] Secure and Evaluable Clustering Based on a Multifunctional and Privacy-Preserving Outsourcing Computation Toolkit
    Li, Jialin
    Lu, Penghao
    Lin, Xuemin
    [J]. IEEE ACCESS, 2022, 10 : 39407 - 39423