{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:30:28Z","timestamp":1777390228105,"version":"3.51.4"},"reference-count":152,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:00:00Z","timestamp":1519084800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"U.S. National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1262277 and CNS-1319090"],"award-info":[{"award-number":["CNS-1262277 and CNS-1319090"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Grants Council of HK","award":["CityU C1008-16G"],"award-info":[{"award-number":["CityU C1008-16G"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2019,3,31]]},"abstract":"<jats:p>The rapid development of cloud computing promotes a wide deployment of data and computation outsourcing to cloud service providers by resource-limited entities. Based on a pay-per-use model, a client without enough computational power can easily outsource large-scale computational tasks to a cloud. Nonetheless, the issue of security and privacy becomes a major concern when the customer\u2019s sensitive or confidential data is not processed in a fully trusted cloud environment. Recently, a number of publications have been proposed to investigate and design specific secure outsourcing schemes for different computational tasks. The aim of this survey is to systemize and present the cutting-edge technologies in this area. It starts by presenting security threats and requirements, followed with other factors that should be considered when constructing secure computation outsourcing schemes. In an organized way, we then dwell on the existing secure outsourcing solutions to different computational tasks such as matrix computations, mathematical optimization, and so on, treating data confidentiality as well as computation integrity. Finally, we provide a discussion of the literature and a list of open challenges in the area.<\/jats:p>","DOI":"10.1145\/3158363","type":"journal-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T15:15:22Z","timestamp":1519398922000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":108,"title":["Practical Secure Computation Outsourcing"],"prefix":"10.1145","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9219-4372","authenticated-orcid":false,"given":"Zihao","family":"Shan","sequence":"first","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Kui","family":"Ren","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Marina","family":"Blanton","sequence":"additional","affiliation":[{"name":"State University of New York at Buffalo, NY, USA"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2018,2,20]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"A. Adshead. 2014. Data set to grow 10-fold by 2020 as internet of things takes off. Retrieved from http:\/\/www.computerweekly.com\/news\/2240217788.  A. Adshead. 2014. Data set to grow 10-fold by 2020 as internet of things takes off. Retrieved from http:\/\/www.computerweekly.com\/news\/2240217788."},{"key":"e_1_2_1_2_1","doi-asserted-by":"crossref","unstructured":"E. Aguiar Y. Zhang and M. Blanton. 2014. An overview of issues and recent developments in cloud computing and storage security. In High Performance Cloud Auditing and Applications B.-Y. Choi K. Han and S. Song (Eds.). Springer.  E. Aguiar Y. Zhang and M. Blanton. 2014. An overview of issues and recent developments in cloud computing and storage security. In High Performance Cloud Auditing and Applications B.-Y. Choi K. Han and S. Song (Eds.). Springer.","DOI":"10.1007\/978-1-4614-3296-8_1"},{"key":"e_1_2_1_3_1","volume-title":"Advances in Cryptology (CRYPTO\u201913)","author":"Alperin-Sheriff Jacob"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","volume-title":"Faster bootstrapping with polynomial error","author":"Alperin-Sheriff Jacob","DOI":"10.1007\/978-3-662-44371-2_17"},{"key":"e_1_2_1_5_1","volume-title":"International Conference on Financial Cryptography and Data Security. 239--257","author":"Aly A."},{"key":"e_1_2_1_6_1","unstructured":"Amazon. 2017. What Is Cloud Computing? Retrieved from https:\/\/aws.amazon.com\/what-is-cloud-computing\/.  Amazon. 2017. What Is Cloud Computing? Retrieved from https:\/\/aws.amazon.com\/what-is-cloud-computing\/."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcp.2015.09.040"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755695"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0070-3"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(01)80019-X"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Y. Bai L. Zhuo B. Cheng and Y. Peng. 2014. Surf feature extraction in encrypted domain. In ICME. IEEE.  Y. Bai L. Zhuo B. Cheng and Y. Peng. 2014. Surf feature extraction in encrypted domain. In ICME. IEEE.","DOI":"10.1109\/ICME.2014.6890170"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.12"},{"key":"e_1_2_1_15_1","volume-title":"Matrix Mathematics: Theory, Facts, and Formulas with Application to Linear Systems Theory","author":"Bernstein D.","year":"2005"},{"key":"e_1_2_1_16_1","first-page":"1","article-title":"Pattern recognition","volume":"128","author":"Bishop C.","year":"2006","journal-title":"Mach. Learn."},{"key":"e_1_2_1_17_1","volume-title":"IFIP Annual Conference on Data and Applications Security and Privacy. 49--64","author":"Blanton M."},{"key":"e_1_2_1_18_1","first-page":"2","article-title":"Secure outsourced computation of iris matching","volume":"20","author":"Blanton M.","year":"2012","journal-title":"JCS"},{"key":"e_1_2_1_19_1","volume-title":"European Symposium on Research in Computer Security. 505--522","author":"Blanton M."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484341"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535523"},{"key":"e_1_2_1_22_1","unstructured":"Bluewaters. 2013. Blue Waters history. Retrieved from https:\/\/bluewaters.ncsa.illinois.edu\/blue-waters.  Bluewaters. 2013. Blue Waters history. Retrieved from https:\/\/bluewaters.ncsa.illinois.edu\/blue-waters."},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"D. Boneh C. Gentry S. Gorbunov S. Halevi V. Nikolaenko G. Segev V. Vaikuntanathan and D. Vinayagamurthy. 2014. Fully key-homomorphic encryption arithmetic circuit ABE and compact garbled circuits. In EUROCRYPT. 533--556.  D. Boneh C. Gentry S. Gorbunov S. Halevi V. Nikolaenko G. Segev V. Vaikuntanathan and D. Vinayagamurthy. 2014. Fully key-homomorphic encryption arithmetic circuit ABE and compact garbled circuits. In EUROCRYPT. 533--556.","DOI":"10.1007\/978-3-642-55220-5_30"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"G. Bonnoron C. Fontaine G. Gogniat V. Herbert V. Lap\u00f4tre V. Migliore and A. Roux-Langlois. 2017. Somewhat\/fully homomorphic encryption: Implementation progresses and challenges. In C2SI. Springer 68--82.  G. Bonnoron C. Fontaine G. Gogniat V. Herbert V. Lap\u00f4tre V. Migliore and A. Roux-Langlois. 2017. Somewhat\/fully homomorphic encryption: Implementation progresses and challenges. In C2SI. Springer 68--82.","DOI":"10.1007\/978-3-319-55589-8_5"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"e_1_2_1_26_1","doi-asserted-by":"crossref","unstructured":"S. Boyd and L. Vandenberghe. 2004. Convex Optimization. Cambridge UniversityPress.   S. Boyd and L. Vandenberghe. 2004. Convex Optimization. Cambridge UniversityPress.","DOI":"10.1017\/CBO9780511804441"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-009-0098-7"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-150540"},{"key":"e_1_2_1_33_1","doi-asserted-by":"crossref","unstructured":"M. Chase and S. Kamara. 2010. Structured encryption and controlled disclosure. In Asiacrypt. 577--594.  M. Chase and S. Kamara. 2010. Structured encryption and controlled disclosure. In Asiacrypt. 577--594.","DOI":"10.1007\/978-3-642-17373-8_33"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2378757"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2013.11.007"},{"key":"e_1_2_1_36_1","first-page":"1","article-title":"Introduction to secure outsourcing computation. Synth. Lect. Inform. Secur., Priv","volume":"8","author":"Chen X.","year":"2016","journal-title":"Trust"},{"key":"e_1_2_1_37_1","article-title":"New algorithms for secure outsourcing of large-scale systems of linear equations","volume":"10","author":"Chen X.","year":"2015","journal-title":"Trans. Inform. Forensics Secur."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"J. Cheon J. Coron J. Kim M. Lee T. Lepoint M. Tibouchi and A. Yun. 2013. Batch fully homomorphic encryption over the integers. In EUROCRYPT. 315--335.  J. Cheon J. Coron J. Kim M. Lee T. Lepoint M. Tibouchi and A. Yun. 2013. Batch fully homomorphic encryption over the integers. In EUROCRYPT. 315--335.","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590343"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1006\/jpdc.2000.1696"},{"key":"e_1_2_1_42_1","volume-title":"Introduction to Algorithms","author":"Cormen T."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"e_1_2_1_44_1","volume-title":"Annual Cryptology Conference. 487--504","author":"Coron J."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022627411411"},{"key":"e_1_2_1_47_1","volume-title":"Matrices and Linear Transformations","author":"Cullen C."},{"key":"e_1_2_1_48_1","doi-asserted-by":"crossref","unstructured":"W. Dai Y. Dor\u00f6z and B. Sunar. 2014. Accelerating NTRU based homomorphic encryption using GPUs. In HPEC. IEEE.  W. Dai Y. Dor\u00f6z and B. Sunar. 2014. Accelerating NTRU based homomorphic encryption using GPUs. In HPEC. IEEE.","DOI":"10.1109\/HPEC.2014.7041001"},{"key":"e_1_2_1_49_1","unstructured":"G. Dantzig and M. Thapa. 2006. Linear Programming 2: Theory and Extensions. Springer Science 8 Business Media.  G. Dantzig and M. Thapa. 2006. Linear Programming 2: Theory and Extensions. Springer Science 8 Business Media."},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"D. Demirel L. Schabh\u00fcser and J. Buchmann. 2017. Privately and Publicly Verifiable Computing Techniques-A Survey. Springer. 1--58.   D. Demirel L. Schabh\u00fcser and J. Buchmann. 2017. Privately and Publicly Verifiable Computing Techniques-A Survey. Springer. 1--58.","DOI":"10.1007\/978-3-319-53798-6_1"},{"key":"e_1_2_1_51_1","unstructured":"Y. Dor\u00f6z Y. Hu and B. Sunar. 2014. Homomorphic AES Evaluation using NTRU. IACR Cryptology ePrint Archive 2014\/039.  Y. Dor\u00f6z Y. Hu and B. Sunar. 2014. Homomorphic AES Evaluation using NTRU. IACR Cryptology ePrint Archive 2014\/039."},{"key":"e_1_2_1_52_1","unstructured":"W. Du and M. Atallah. 2001. Privacy-preserving cooperative statistical analysis. In ACSAC. IEEE 102--110.   W. Du and M. Atallah. 2001. Privacy-preserving cooperative statistical analysis. In ACSAC. IEEE 102--110."},{"key":"e_1_2_1_53_1","unstructured":"W. Du M. Murugesan and J. Jia. 2010. Uncheatable grid computing. In Algorithms and Theory of Computation Handbook. Chapman 8 Hall\/CRC 30--30.   W. Du M. Murugesan and J. Jia. 2010. Uncheatable grid computing. In Algorithms and Theory of Computation Handbook. Chapman 8 Hall\/CRC 30--30."},{"key":"e_1_2_1_54_1","volume-title":"The IEEE International Conference on Privacy, Security and Data Mining","volume":"14","author":"Du W."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909827.2930794"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Y. Elmehdwi B. Samanthula and W. Jiang. 2014. Secure k-nearest neighbor query over encrypted data in outsourced environments. In ICDE. IEEE 664--675.  Y. Elmehdwi B. Samanthula and W. Jiang. 2014. Secure k-nearest neighbor query over encrypted data in outsourced environments. In ICDE. IEEE 664--675.","DOI":"10.1109\/ICDE.2014.6816690"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2014.53"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382250"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/4.4.332"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-09526-8_5"},{"key":"e_1_2_1_62_1","doi-asserted-by":"crossref","unstructured":"T. S. Fun and A. Samsudin. 2016. A survey of homomorphic encryption for outsourced big data computation.TIIS 10 8 (2016) 3826--3851.  T. S. Fun and A. Samsudin. 2016. A survey of homomorphic encryption for outsourced big data computation.TIIS 10 8 (2016) 3826--3851.","DOI":"10.3837\/tiis.2016.08.022"},{"key":"e_1_2_1_63_1","doi-asserted-by":"crossref","unstructured":"R. Gennaro C. Gentry and B. Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO. 465--482.   R. Gennaro C. Gentry and B. Parno. 2010. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In CRYPTO. 465--482.","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"e_1_2_1_64_1","volume-title":"CRYPTO","author":"Gentry C.","year":"2013"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"e_1_2_1_68_1","doi-asserted-by":"crossref","unstructured":"C. Gentry and S. Halevi. 2011. Implementing Gentry\u2019s fully-homomorphic encryption scheme. In EUROCRYPT. 129--148.   C. Gentry and S. Halevi. 2011. Implementing Gentry\u2019s fully-homomorphic encryption scheme. In EUROCRYPT. 129--148.","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_1"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"e_1_2_1_74_1","doi-asserted-by":"crossref","unstructured":"P. Golle and I. Mironov. 2001. Uncheatable distributed computations. In RSA. 425--440.   P. Golle and I. Mironov. 2001. Uncheatable distributed computations. In RSA. 425--440.","DOI":"10.1007\/3-540-45353-9_31"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746576"},{"key":"e_1_2_1_76_1","unstructured":"S. Halevi and V. Shoup. 2014. HElib-An Implementation of homomorphic encryption. Cryptology ePrint Archive Report 2014\/039.  S. Halevi and V. Shoup. 2014. HElib-An Implementation of homomorphic encryption. Cryptology ePrint Archive Report 2014\/039."},{"key":"e_1_2_1_77_1","doi-asserted-by":"crossref","unstructured":"S. Halevi and V. Shoup. 2015. Bootstrapping for helib. In EUROCRYPT. 641--670.  S. Halevi and V. Shoup. 2015. Bootstrapping for helib. In EUROCRYPT. 641--670.","DOI":"10.1007\/978-3-662-46800-5_25"},{"key":"e_1_2_1_78_1","unstructured":"V. Herbert and C. Fontaine. 2017. Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme. IACR Cryptology ePrint Archive 2017\/91.  V. Herbert and C. Fontaine. 2017. Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme. IACR Cryptology ePrint Archive 2017\/91."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_15"},{"key":"e_1_2_1_80_1","doi-asserted-by":"crossref","unstructured":"R. Horn and C. Johnson. 2012. Matrix Analysis. Cambridge University Press.   R. Horn and C. Johnson. 2012. Matrix Analysis. Cambridge University Press.","DOI":"10.1017\/CBO9781139020411"},{"key":"e_1_2_1_81_1","volume-title":"Media Watermarking, Security, and Forensics III","author":"Hsu C."},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2568460"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2695665"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2500576"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01291027"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.05.014"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2331694"},{"key":"e_1_2_1_88_1","article-title":"Outsourcing large matrix inversion computation to a public cloud","volume":"1","author":"Lei X.","year":"2013","journal-title":"IEEE Trans. Cloud Comput."},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2808425.2808430"},{"key":"e_1_2_1_90_1","doi-asserted-by":"crossref","unstructured":"W. Liao W. Du S. Salinas and P. Li. 2016. Efficient privacy-preserving outsourcing of large-scale convex separable programming for smart cities. In HPCC\/SmartCity\/DSS. IEEE 1349--1356.  W. Liao W. Du S. Salinas and P. Li. 2016. Efficient privacy-preserving outsourcing of large-scale convex separable programming for smart cities. In HPCC\/SmartCity\/DSS. IEEE 1349--1356.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0191"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2007.895831"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835852"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_2_1_94_1","volume-title":"USENIX Security Symposium","volume":"4","author":"Malkhi D.","year":"2004"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813672"},{"key":"e_1_2_1_96_1","volume-title":"Mathematical Programming: Theory and Algorithms","author":"Minoux M.","year":"1986"},{"key":"e_1_2_1_97_1","unstructured":"P. Mohassel. 2011. Efficient and Secure Delegation of Linear Algebra. IACR Cryptology ePrint Archive 2011\/605.  P. Mohassel. 2011. Efficient and Secure Delegation of Linear Algebra. IACR Cryptology ePrint Archive 2011\/605."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_2_1_99_1","volume-title":"Linear Algebra and Matrix Theory","author":"Nering E."},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.012582999"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.147"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2014.117"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_2_1_104_1","doi-asserted-by":"crossref","unstructured":"P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT. 223--238.   P. Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In EUROCRYPT. 223--238.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31301-6_2"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22161"},{"key":"e_1_2_1_107_1","volume-title":"Discovery, analysis, and presentation of strong rules. KDD","author":"Piatetsky-Shapiro G.","year":"1991"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_4"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647868.2654941"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978574"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2549982"},{"key":"e_1_2_1_113_1","doi-asserted-by":"crossref","unstructured":"S. Salinas C. Luo X. Chen and P. Li. 2015. Efficient secure outsourcing of large-scale linear systems of equations. In INFOCOM. IEEE 1035--1043.  S. Salinas C. Luo X. Chen and P. Li. 2015. Efficient secure outsourcing of large-scale linear systems of equations. In INFOCOM. IEEE 1035--1043.","DOI":"10.1109\/INFOCOM.2015.7218476"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897862"},{"key":"e_1_2_1_115_1","doi-asserted-by":"crossref","unstructured":"J. Sen. 2013. Security and privacy issues in cloud computing. Archit. Protoc. Sec. Inform. Technol. Infrastruct. (2013) 1--45.  J. Sen. 2013. Security and privacy issues in cloud computing. Archit. Protoc. Sec. Inform. Technol. Infrastruct. (2013) 1--45.","DOI":"10.4018\/978-1-4666-4514-1.ch001"},{"key":"e_1_2_1_116_1","doi-asserted-by":"crossref","unstructured":"R. Sion. 2008. Towards secure data outsourcing. In Handbook of Database Security. 137--161.  R. Sion. 2008. Towards secure data outsourcing. In Handbook of Database Security. 137--161.","DOI":"10.1007\/978-0-387-48533-1_6"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.32"},{"key":"e_1_2_1_120_1","volume-title":"Applied Multivariate Statistics for the Social Sciences","author":"Stevens J."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.155"},{"key":"e_1_2_1_122_1","volume-title":"DISCEX","volume":"2","author":"Swiler L."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"key":"e_1_2_1_124_1","volume-title":"to have 200-petaflop supercomputer by early","author":"Thibodeau P.","year":"2018"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775142"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_2_1_127_1","doi-asserted-by":"crossref","unstructured":"C. Wang K. Ren and J. Wang. 2011. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM. IEEE 820--828.  C. Wang K. Ren and J. Wang. 2011. Secure and practical outsourcing of linear programming in cloud computing. In INFOCOM. IEEE 820--828.","DOI":"10.1109\/INFCOM.2011.5935305"},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.206"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2013.2273797"},{"key":"e_1_2_1_131_1","doi-asserted-by":"crossref","unstructured":"Q. Wang S. Hu K. Ren M. He M. Du and Z. Wang. 2015. CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In ESORICS. 186--205.  Q. Wang S. Hu K. Ren M. He M. Du and Z. Wang. 2015. CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In ESORICS. 186--205.","DOI":"10.1007\/978-3-319-24177-7_10"},{"key":"e_1_2_1_132_1","doi-asserted-by":"crossref","unstructured":"Q. Wang S. Hu K. Ren J. Wang Z. Wang and M. Du. 2016. Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. In INFOCOM. IEEE 1--9.  Q. Wang S. Hu K. Ren J. Wang Z. Wang and M. Du. 2016. Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. In INFOCOM. IEEE 1--9.","DOI":"10.1109\/INFOCOM.2016.7524460"},{"key":"e_1_2_1_133_1","doi-asserted-by":"crossref","unstructured":"Q. Wang S. Hu J. Wang and K. Ren. 2016. Secure surfing: Privacy-preserving speeded-up robust feature extractor. In ICDCS. IEEE 700--710.  Q. Wang S. Hu J. Wang and K. Ren. 2016. Secure surfing: Privacy-preserving speeded-up robust feature extractor. In ICDCS. IEEE 700--710.","DOI":"10.1109\/ICDCS.2016.84"},{"key":"e_1_2_1_134_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 79--97","author":"Wang Q."},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897861"},{"key":"e_1_2_1_136_1","doi-asserted-by":"crossref","unstructured":"W. Wang Y. Hu L. Chen X. Huang and B. Sunar. 2012. Accelerating fully homomorphic encryption using GPU. In HPEC. IEEE 1--5.  W. Wang Y. Hu L. Chen X. Huang and B. Sunar. 2012. Accelerating fully homomorphic encryption using GPU. In HPEC. IEEE 1--5.","DOI":"10.1109\/HPEC.2012.6408660"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"e_1_2_1_138_1","unstructured":"W. Wong D. Cheung E. Hung B. Kao and N. Mamoulis. 2007. Security in outsourcing of association rule mining. In The 33rd VLDB. VLDB Endowment 111--122.   W. Wong D. Cheung E. Hung B. Kao and N. Mamoulis. 2007. Security in outsourcing of association rule mining. In The 33rd VLDB. VLDB Endowment 111--122."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687758"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"e_1_2_1_141_1","doi-asserted-by":"crossref","unstructured":"D. Wu J. Zimmerman J. Planul and J. Mitchell. 2016. Privacy-preserving shortest path computation. NDSS (2016).  D. Wu J. Zimmerman J. Planul and J. Mitchell. 2016. Privacy-preserving shortest path computation. NDSS (2016).","DOI":"10.14722\/ndss.2016.23052"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2598342"},{"key":"e_1_2_1_143_1","doi-asserted-by":"crossref","unstructured":"X. Yan and X. Su. 2009. Linear Regression Analysis: Theory and Computing. World Scientific.   X. Yan and X. Su. 2009. Linear Regression Analysis: Theory and Computing. World Scientific.","DOI":"10.1142\/6986"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.88"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544870"},{"key":"e_1_2_1_147_1","doi-asserted-by":"crossref","unstructured":"Y. Yu Y. Luo D. Wang S. Fu and M. Xu. 2016. Efficient secure and non-iterative outsourcing of large-scale systems of linear equations. In ICC. IEEE 1--6.  Y. Yu Y. Luo D. Wang S. Fu and M. Xu. 2016. Efficient secure and non-iterative outsourcing of large-scale systems of linear equations. In ICC. IEEE 1--6.","DOI":"10.1109\/ICC.2016.7510991"},{"key":"e_1_2_1_148_1","doi-asserted-by":"crossref","unstructured":"J. Yuan and S. Yu. 2013. Efficient privacy-preserving biometric identification in cloud computing. In INFOCOM. IEEE.  J. Yuan and S. Yu. 2013. Efficient privacy-preserving biometric identification in cloud computing. In INFOCOM. IEEE.","DOI":"10.1109\/INFCOM.2013.6567073"},{"key":"e_1_2_1_149_1","volume-title":"International Conference on Information Security. 158--178","author":"Zhang Y."},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/SocialSec2015.10"},{"key":"e_1_2_1_151_1","volume-title":"PPOPM: More efficient privacy preserving outsourced pattern matching. In ESORICS. 135--153.","author":"Zhou J.","year":"2016"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2505720"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2535103"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3158363","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3158363","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3158363","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:24Z","timestamp":1750212804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3158363"}},"subtitle":["A Survey"],"short-title":[],"issued":{"date-parts":[[2018,2,20]]},"references-count":152,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3,31]]}},"alternative-id":["10.1145\/3158363"],"URL":"https:\/\/doi.org\/10.1145\/3158363","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,20]]},"assertion":[{"value":"2017-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-11-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-02-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}