PlumX Metrics
Embed PlumX Metrics

A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment

IEEE Transactions on Cloud Computing, ISSN: 2168-7161, Vol: 11, Issue: 3, Page: 2325-2336
2023
  • 16
    Citations
  • 0
    Usage
  • 16
    Captures
  • 1
    Mentions
  • 0
    Social Media
Metric Options:   Counts1 Year3 Year

Metrics Details

  • Citations
    16
    • Citation Indexes
      16
  • Captures
    16
  • Mentions
    1
    • News Mentions
      1
      • News
        1

Most Recent News

Researchers from Chongqing University Report Details of New Studies and Findings in the Area of Cloud Computing (A Privacy-preserving Outsourcing Computing Scheme Based On Secure Trusted Environment)

2023 OCT 31 (NewsRx) -- By a News Reporter-Staff News Editor at NewsRx Policy and Law Daily -- Current study results on Information Technology -

Article Description

As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data. Though cloud computing brings great advantages, new issues emerge, such as data security breach and privacy disclosure. In this article, we introduce a novel secure and privacy-preserving outsourcing computing scheme (hereafter referred to as SPOCS) to tackle this issue. In SPOCS, the effective use of Intel Software Guard Extensions (SGX), one of the trusted execution environment (TEE), ensures the confidence and integrity of sensitive data in cloud computing and prevents data loss from causing privacy disclosure. In order to keep malicious cloud service providers (CSPs) from illegally tampering with the outsourcing results, blockchain is employed to ensure the data immutability. Significantly, our proposed scheme achieves anonymity and traceability. In the outsourcing process, smart contracts are applied to make the whole process fully automated without any human involvement. Finally, the security of the proposed scheme is analyzed in terms of its resistance to different attacks. The experiments indicate that our scheme is effective and efficient.

Bibliographic Details

Zewei Liu; Chunqiang Hu; Ruinian Li; Tao Xiang; Xingwang Li; Jiguo Yu; Hui Xia

Institute of Electrical and Electronics Engineers (IEEE)

Computer Science

Provide Feedback

Have ideas for a new metric? Would you like to see something else here?Let us know