User-Controlled Computations in Untrusted Computing Environments