Netinfo Security ›› 2025, Vol. 25 ›› Issue (11): 1643-1657.doi: 10.3969/j.issn.1671-1122.2025.11.001

Previous Articles     Next Articles

Research Progress on Data Security Processing Integrating Confidential Computing

ZHU Hui(), FANG Yunyi, WANG Fengwei, XU Wei   

  1. School of Cyber Engineering, Xidian University, Xi’an 710126, China
  • Received:2025-05-25 Online:2025-11-10 Published:2025-12-02

Abstract:

Driven by the increasing recognition of data as a critical asset, alongside rising concerns over data security, legal and regulatory compliance, and privacy protection, encrypted data computation is anticipated to become the dominant approach for data utilization in the future. Traditional methods rely heavily on anonymization and cryptographic techniques serve as the foundational building blocks. However, anonymization-based security enhancement strategies often compromise data utility, reducing its availability, while existing cryptographic schemes suffer from limitations in both performance and functionality. To overcome these challenges, the integration of Trusted Execution Environments (TEE) with conventional encrypted computation techniques has emerged as a focal point of research in both academia and industry. This study reviewed existing solutions that combined TEEs with encrypted data computation, analyzing them in terms of research background, current progress, and representative works. Based on this analysis, a secure model integrating TEEs and encrypted computation was proposed, and potential future research directions were explored.

Key words: confidential computing, encrypted computation, secure data processing, integrated security model

CLC Number: