Since the cloud provider possesses plenty of computational resources that the lay customer does not, it can perform complex operations on data very fast. This encourages customers not only to outsource storage but also to outsource data processing. To facilitate the adoption of TREDISEC security services, we should focus on how to reconcile existing data processing functionalities and the pressing requirements of data confidentiality and computation integrity.
We note here that this requirement is more related to the use cases dealing with big data storage and secure processing services, since, for the case of file sharing services the cloud provider is only supposed to store the data.
