A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment

被引:11
作者
Liu, Zewei [1 ]
Hu, Chunqiang [1 ,2 ]
Li, Ruinian [3 ]
Xiang, Tao [4 ]
Li, Xingwang [5 ]
Yu, Jiguo [6 ]
Xia, Hui [7 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400030, Peoples R China
[2] China Southern Power Grid, Joint Lab Cyberspace Secur, Guangzhou 510530, Guangdong, Peoples R China
[3] Bowling Green State Univ, Comp Sci Dept, Bowling Green, OH 43403 USA
[4] Chongqing Univ, Coll Comp Sci, Chongqing 400030, Peoples R China
[5] Henan Polytech Univ, Coll Phys & Elect Informat Engn, Jiaozuo 454099, Henan, Peoples R China
[6] Qilu Univ Technol, Big Data Inst, Jinan 250353, Shandong, Peoples R China
[7] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266005, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Terms-Outsourcing computing; privacy-preserving; blockchain; trusted execution environment; smart contract; CLOUD; COMPUTATION; ALGORITHMS;
D O I
10.1109/TCC.2022.3201401
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data. Though cloud computing brings great advantages, new issues emerge, such as data security breach and privacy disclosure. In this article, we introduce a novel secure and privacy-preserving outsourcing computing scheme (hereafter referred to as SPOCS) to tackle this issue. In SPOCS, the effective use of Intel Software Guard Extensions (SGX), one of the trusted execution environment (TEE), ensures the confidence and integrity of sensitive data in cloud computing and prevents data loss from causing privacy disclosure. In order to keep malicious cloud service providers (CSPs) from illegally tampering with the outsourcing results, blockchain is employed to ensure the data immutability. Significantly, our proposed scheme achieves anonymity and traceability. In the outsourcing process, smart contracts are applied to make the whole process fully automated without any human involvement. Finally, the security of the proposed scheme is analyzed in terms of its resistance to different attacks. The experiments indicate that our scheme is effective and efficient.
引用
收藏
页码:2325 / 2336
页数:12
相关论文
共 50 条
  • [31] A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework
    Yang, Huijie
    Zhou, Tianqi
    Wang, Chen
    He, Debiao
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 374 - 391
  • [32] DPPR: A Dynamic, Privacy-Preserving Scheme for Reputation-Based Blockchain
    Hao, Yun
    Wang, Jingyu
    Liu, Lixin
    Du, Yongxing
    Zhang, Zetian
    Yang, Hanqing
    2024 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2024, 2024, : 1341 - 1343
  • [33] A Trusted Approach for Decentralised and Privacy-Preserving Identity Management
    Torres Moreno, Rafael
    Garcia-Rodriguez, Jesus
    Bernal Bernabe, Jorge
    Skarmeta, Antonio
    IEEE ACCESS, 2021, 9 : 105788 - 105804
  • [34] Edge Computing Based Privacy-Preserving Data Aggregation Scheme in Smart Grid
    Kang, Yuhao
    Guo, Songtao
    Li, Pan
    Yang, Yuanyuan
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [35] Efficient and privacy-preserving decentralized energy trading scheme in a blockchain environment
    Dong, Jingya
    Song, Chunhe
    Zhang, Tao
    Hu, Youjun
    Zheng, Hao
    Li, Yuanjian
    ENERGY REPORTS, 2022, 8 : 485 - 493
  • [36] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [37] A Practical Privacy-preserving Password Authentication Scheme for Cloud Computing
    Yassin, Ali A.
    Jin, Hai
    Ibrahim, Ayad
    Qiang, Weizhong
    Zou, Deqing
    2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 1210 - 1217
  • [38] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [39] A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing
    Li, Hongzhi
    Han, Dezhi
    Tang, Mingdong
    IEEE SYSTEMS JOURNAL, 2021, 15 (03): : 3189 - 3200
  • [40] A Secure and Efficient Privacy-Preserving Range Query Scheme in Location-Based Services
    Huang, Zhisheng
    Yan, Xiai
    Lin, Yaping
    Xu, Zhou
    Lin, Feng
    IEEE ACCESS, 2018, 6 : 72796 - 72807