A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment

被引:11
作者
Liu, Zewei [1 ]
Hu, Chunqiang [1 ,2 ]
Li, Ruinian [3 ]
Xiang, Tao [4 ]
Li, Xingwang [5 ]
Yu, Jiguo [6 ]
Xia, Hui [7 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400030, Peoples R China
[2] China Southern Power Grid, Joint Lab Cyberspace Secur, Guangzhou 510530, Guangdong, Peoples R China
[3] Bowling Green State Univ, Comp Sci Dept, Bowling Green, OH 43403 USA
[4] Chongqing Univ, Coll Comp Sci, Chongqing 400030, Peoples R China
[5] Henan Polytech Univ, Coll Phys & Elect Informat Engn, Jiaozuo 454099, Henan, Peoples R China
[6] Qilu Univ Technol, Big Data Inst, Jinan 250353, Shandong, Peoples R China
[7] Ocean Univ China, Coll Comp Sci & Technol, Qingdao 266005, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Terms-Outsourcing computing; privacy-preserving; blockchain; trusted execution environment; smart contract; CLOUD; COMPUTATION; ALGORITHMS;
D O I
10.1109/TCC.2022.3201401
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the key technologies to enable the internet of things (IoT), cloud computing plays a significant role in providing huge computing and storage facilities for large-scale data. Though cloud computing brings great advantages, new issues emerge, such as data security breach and privacy disclosure. In this article, we introduce a novel secure and privacy-preserving outsourcing computing scheme (hereafter referred to as SPOCS) to tackle this issue. In SPOCS, the effective use of Intel Software Guard Extensions (SGX), one of the trusted execution environment (TEE), ensures the confidence and integrity of sensitive data in cloud computing and prevents data loss from causing privacy disclosure. In order to keep malicious cloud service providers (CSPs) from illegally tampering with the outsourcing results, blockchain is employed to ensure the data immutability. Significantly, our proposed scheme achieves anonymity and traceability. In the outsourcing process, smart contracts are applied to make the whole process fully automated without any human involvement. Finally, the security of the proposed scheme is analyzed in terms of its resistance to different attacks. The experiments indicate that our scheme is effective and efficient.
引用
收藏
页码:2325 / 2336
页数:12
相关论文
共 50 条
  • [41] A Trusted and Privacy-Preserving Internet of Mobile Energy
    Jurdak, Raja
    Dorri, Ali
    Vilathgamuwa, Mahinda
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (06) : 89 - 95
  • [42] Privacy-Preserving HCV Data Outsourcing Scheme for Initial Diagnosis and Epidemiological Study
    Li, Hui
    Liu, Kexin
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2460 - 2465
  • [43] Secure and Lightweight Conditional Privacy-Preserving Identity Authentication Scheme for VANET
    Zhu, Dongxu
    Guan, Yepeng
    IEEE SENSORS JOURNAL, 2024, 24 (21) : 35743 - 35756
  • [44] Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme
    Zhu, Hui
    Gao, Lijuan
    Li, Hui
    SENSORS, 2016, 16 (02)
  • [45] A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
    Xu, Guangquan
    Qi, Chen
    Dong, Wenyu
    Gong, Lixiao
    Liu, Shaoying
    Chen, Si
    Liu, Jian
    Zheng, Xi
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 698 - 709
  • [46] A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain
    Zhang, Yujian
    Tong, Fei
    Xu, Yuwei
    Tao, Jun
    Cheng, Guang
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [47] BAPS: a blockchain-assisted privacy-preserving and secure sharing scheme for PHRs in IoMT
    Li, Hongzhi
    Zhu, Peng
    Wang, Jiacun
    Fortino, Giancarlo
    JOURNAL OF SUPERCOMPUTING, 2024, 80 (18) : 26197 - 26225
  • [48] Secure and Privacy-preserving Biometrics based Active Authentication
    Sui, Yan
    Zou, Xukai
    Du, Eliza Y.
    Li, Feng
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1291 - 1296
  • [49] An effective and verifiable secure aggregation scheme with privacy-preserving for federated learning
    Wang, Rong
    Xiong, Ling
    Geng, Jiazhou
    Xie, Chun
    Li, Ruidong
    JOURNAL OF SYSTEMS ARCHITECTURE, 2025, 161
  • [50] A Blockchain based Privacy-Preserving Reputation Scheme for Cloud Service
    Geng, Ziye
    He, Yunhua
    Wang, Chao
    Xu, Gang
    Xiao, Ke
    Yu, Shui
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,