SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645
www.ijmer.com 1396 | Page
Shaik Kalesha, 1
G.Sridevi2
1
M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India
2
Assoc.Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India
Abstract: Cloud Computing is a subscription based service where you can obtain the networked storage space and
computer resources. In cloud computing model, the customers plug into the cloud to access IT resources which are priced
and provided on demand services. This cloud computing model composed of five essential characteristics, three service
models and four deployment models. Users can store their data in the cloud and there is a lot of personal information and
potentially secure data that people store on their computers, and this information is now being transferred to the cloud. Here
we must ensure the security of user’s data, which is in stored in the cloud. This paper presents the secure outsourcing
mechanism for linear programming in the cloud computing environment. Linear programming is an algorithmic and
computational tool which captures the first order effects of various system parameters that should be optimized, and is
essential to the engineering optimization. It has been widely used in various engineering disciplines that analyze and
optimize real world systems, such as - packet routing, flow control, power management of data centers, etc.
Keywords: Cloud, Linear programming, Security.
I. INTRODUCTION
The end of this decade is marked by a paradigm shift of the industrial information technology towards the
subscription based or pay-per-use service business model known as cloud computing [1]. This paradigm provides users with
a long list of advantages, such as- provision computing capabilities; broad, heterogeneous network access; resource pooling
and rapid elasticity with measured services [2]. Huge amounts of data being retrieved from the geographically distributed
data sources, and non-localized data-handling requirements, creates such a change in technological as well as business
model. One of the prominent services offered in the cloud computing is the cloud data storage, in which subscribers do not
have to store their data on their own servers, where instead their data will be stored on the cloud service provider’s servers.
In cloud computing, the subscribers have to pay the service providers for this storage service. This service does not
only provides flexibility and the scalability for the data storage, it also provide customers with the benefit of paying only for
the amount of data they need to store for a particular period of time, without any concerns for efficient storage mechanisms
and maintainability issues with large amounts of data storage. In addition to these benefits, the customers can easily access
their data from any geographical region where the Cloud Service Provider’s network or Internet can be accessed. An
example of the cloud computing is shown in Figure 1.
Along with these unprecedented advantages, the cloud data storage also redefines the security issues targeted on
customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). Since the cloud service
providers (SP) are separate market entities, data integrity and privacy are the most critical issues that need to be addressed in
cloud computing. Even though the cloud service providers have standard regulations and has powerful infrastructure to
ensure customer’s data privacy and provide a better availability, the reports of privacy breach and service outage have been
apparent in last few years [3] [4] [5].
Figure 1: Cloud Computing Architecture Example
This paper presents the secure outsourcing mechanism for linear programming (LP) in the cloud computing
environment. Linear programming is an algorithmic and computational tool which captures the first order effects of various
system parameters that should be optimized, and is essential to the engineering optimization. It has been widely used in
various engineering disciplines that analyze and optimize real world systems, such as - packet routing, flow control, power
management of data centers, etc.
Secure Outsourcing Mechanism for Linear Programming in
Cloud Computing
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645
www.ijmer.com 1397 | Page
II. RELATED WORK
General secure computation outsourcing that fulfills all the aforementioned requirements, such as input/output
privacy and correctness/soundness guarantee has been shown feasible in theory by Gennaro et al. [6]. However, it is
currently not practical due to the huge computation complexity. Atallah et al. explore a list of work [7][8] for securely
outsourcing specific applications. The customized solutions are expected to be very efficient than the general way of
constructing the circuits. In [7], they give the first investigation of secure outsourcing of numerical and scientific
computation. Later on in [8] and [9], Atallah et al. give two protocol designs for both secure sequence comparison
outsourcing and the secure algebraic computation outsourcing. However, both protocols use heavy cryptographic primitive
such as homomorphic encryptions [10] and/or oblivious transfer [11] and do not scale well for large problem set.
Hohenberger et al. [12] provide protocols for secure outsourcing of modular exponentiation, which is considered as
prohibitively expensive in most public-key cryptography operations. Recently, Atallah [13] et al. give a provably secure
protocol for secure outsourcing matrix multiplications based on secret sharing [14]. Another large existing list of work that
relates to ours is Secure Multi-party Computation (SMC), first introduced by Yao [15] and later extended by Goldreich et al.
[16] and many others. Very recently, Wang et al. [17] give the first study of secure outsourcing of linear programming in
cloud computing. Their solution is based on the problem transformation, and has the advantage of bringing customer savings
without introducing substantial overhead on cloud. However, those techniques involve cubic time computational burden
matrix-matrix operations, which the weak customer in our case is not necessarily able to handle for large-scale problems.
III. PROPOSED WORK
Our proposed mechanism consists of three phases:
A. Problem Transformation
In this phase, the cloud customer would initialize a randomized key generation algorithm and prepare the LE
problem into some encrypted form K via key K. Transformation and encryption operations will be needed when necessary.
The customer who has coefficient vector “b” and seeks solution “x” satisfying Ax = b cannot directly starts the
ProbSolve with cloud, since such interaction may expose the private information on final result x. Thus, we still need a
transformation technique to allow the customer to properly hide such information first. The customer picks a random vector r
n
R as his secret keying material, the new LE problem is written as:
Ay=
'
b ------------ (1)
Where y = x + r and
'
b = b + Ar. Equation (1) can be rewritten as follows:
')(1_
. CyTy kK
 ------------ (2)
Where T= RD .1
,
1' 
 Dc .
'
b , and A= D + R.
The whole procedure of “ProbTransform” is summarized in the following Algorithm 1.
Algorithm1:
Data: original problem =(A,b)
Result: transformed problem as shown in Equation (2)
Step 1: Pick random r
n
R
Step 2: Compute
1
b =b+Ar, and
1
c =
1
D .
1
b
Step 3: Replace tuple (x,c) in Equation (2) with (y=x+r,
1
c )
Return transformed problem as Equation (2).
B. Problem Solving
In this phase, the cloud customer would use the encrypted form K of LE to start the computation outsourcing
process. In case of using the iterative methods, the protocol ends when the solution within the required accuracy is found.
After the problem transformation step, now we are ready to describe the phase of “ProbSolve”. The purpose of the
protocol is to let the customer securely harness the cloud for the most expensive computation, i.e., the matrix-vector
multiplication T.
)(K
y in Eq. (2) for each algorithm iteration, k = 1, 2,……L. assume without loss of generality that our
main protocol of solving LE works over integers. All arithmetic is modular with respect to the modulus “N” of the
homomorphic encryption, and the modulus is large enough to contain the answer. For the first iteration, the customer starts
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645
www.ijmer.com 1398 | Page
the initial guess on the vector
T
ynyyy ),........2,1( )0()0()0()0(
 , and then sends it to the cloud. The cloud server, in
possession of the encrypted matrix Enc (T), computes the value Enc (T.
)0(
y ) by using the homomorphic property of the
encryption:
------- (3)
After receiving Enc (T.
)0(
y ) the customer decrypts and gets value T.
)0(
y Using his private key. He then updates
the next approximation
)1(
y = T.
)0(
y +
'
c via Equ (2). The protocol execution continues until the result converges, as
shown in the following Algorithm 2.
Algorithm 2:
Data: Transformed problem with input
1
c and Enc (T)
Result: Solution x to the original problem = (A, b)
% L: Maximum number of iterations to be performed;
%: Measurement of convergence point;
Step 1: Customer picks
N
NZy )()0(

For (k<-0 to L) do
Step 2: Customer sends
)(k
y to cloud
Step 3: Cloud computes Enc (T
)(k
y ) via Equation (3)
Step 4: Customer decrypts T
)(k
y via his private key
If ||
)(k
y -
)1( k
y || <=  then
Step 5: break with convergence point
)1( k
y
Step 6: return x=
)1( k
y - r
C. Result Verification
In this phase, the cloud customer would verify the encrypted result produced from the cloud server, using the
randomized secret key K. A correct output “x” to the problem is produced by decrypting the encrypted output. When the
validation fails, the customer output  , indicating the cloud server was cheating.
IV. CONCLUSION
Cloud Computing provides convenient on demand network access to a shared pool of configurable computing
resources that can be rapidly deployed with the great efficiency and minimal management overhead. Focusing on the
engineering and scientific computing problems, this proposed work investigates secure outsourcing for widely applicable
large-scale systems of linear equations (LE), which are among the most popular algorithmic and computational tools in
various engineering disciplines that analyze and optimize real-world systems. Our proposed work has three phases- problem
transformation, problem solving and result verification. In problem transformation, the cloud customer would initialize a
randomized key generation algorithm and prepare the LE problem into some encrypted form K via key K. Transformation
and encryption operations will be needed when necessary. In problem solving, the cloud customer would use the encrypted
form K of LE to start the computation outsourcing process. In case of using the iterative methods, the protocol ends when
the solution within the required accuracy is found. In result verification, the cloud customer would verify the encrypted result
produced from the cloud server, using the randomized secret key K.
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645
www.ijmer.com 1399 | Page
REFERENCES
[1] M. Armbrust, A. Fox, R. Grifth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia.
Above the clouds: A berkeley view of cloud computing. Technical report, University of California at Berkeley, February 2009.
[2] P. Mell, T. Grance, “Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, online at
http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009.
[3] Amazon.com, “Amazon s3 availablity event: July 20, 2008”, online at http://status.aws.amazon.com/s3-20080720.html, 2008.
[4] M. Arrington, “Gmail Disaster: Reports of mass email deletions”, Online at http://www.techcrunch.com/2006/12/28/gmail-
disasterreports-ofmass- email-deletions/, December 2006.
[5] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors”, Online at http://www.techcrunch.com/2008/-7/10/mediamaxthelinkup-closes-
itsdorrs/, July 2008
[6] R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers,” in
Proc. Of CRYPTO’10, Aug. 2010.
[7] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure outsourcing of scientific computations,” Advances in
Computers, vol. 54, pp. 216–272, 2001.
[8] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J. Inf. Sec., vol. 4, no. 4, pp. 277–287, 2005
[9] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of algebraic computations,” in Proc. of 6th Conf. on Privacy,
Security, and Trust (PST), 2008, pp. 240–245.
[10] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. of EUROCRYPT’99, 1999, pp. 223–
238.
[11] S. Even, O. Goldreich, and A. Lempel, “A randomized protocol for signing contracts,” Commun ACM, vol. 28, no. 6, pp. 637–647,
1985.
[12] S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations” in Proc. of TCC, 2005 pp. 264–282.
[13] M. Atallah and K. Frikken, “Securely outsourcing linear algebra computations,” in Proc. of ASIACCS, 2010, pp. 48–59
[14] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979
[15] A. C.-C. Yao, “Protocols for secure computations (extended abstract),” in Proc. of FOCS’82, 1982, pp 160–164
[16] O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game or a completeness theorem for protocols with honest
majority,” in Proc. of STOC’87, 1987, pp 218–229
[17] C. Wang, K. Ren, and J. Wang, “Secure and practical outsourcing of linear programming in cloud computing,” in Proc. of IEEE
INFOCOM, 2011

Mais conteúdo relacionado

Mais procurados

IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEEGLOBALSOFTSTUDENTPROJECTS
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...Nexgen Technology
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...IJCSIS Research Publications
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Editor IJCATR
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...1crore projects
 
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...IJCNCJournal
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentShakas Technologies
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...INFOGAIN PUBLICATION
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
On network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudOn network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudssuser79fc19
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
Cost minimizing dynamic migration of content distribution services into hybri...
Cost minimizing dynamic migration of content distribution services into hybri...Cost minimizing dynamic migration of content distribution services into hybri...
Cost minimizing dynamic migration of content distribution services into hybri...Pvrtechnologies Nellore
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
Integrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureIntegrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureTELKOMNIKA JOURNAL
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...hemanthbbc
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
 

Mais procurados (18)

IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Performance and cost evaluation of an...
 
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR... COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
COST-MINIMIZING DYNAMIC MIGRATION OF CONTENT DISTRIBUTION SERVICES INTO HYBR...
 
Am36234239
Am36234239Am36234239
Am36234239
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
 
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
Profit Maximization for Service Providers using Hybrid Pricing in Cloud Compu...
 
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
Cost-Minimizing Dynamic Migration of Content Distribution Services into Hybri...
 
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...
 
Cost minimizing dynamic migration of content
Cost minimizing dynamic migration of contentCost minimizing dynamic migration of content
Cost minimizing dynamic migration of content
 
35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...35 content distribution with dynamic migration of services for minimum cost u...
35 content distribution with dynamic migration of services for minimum cost u...
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
On network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloudOn network throughput variability in microsoft azure cloud
On network throughput variability in microsoft azure cloud
 
A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Cost minimizing dynamic migration of content distribution services into hybri...
Cost minimizing dynamic migration of content distribution services into hybri...Cost minimizing dynamic migration of content distribution services into hybri...
Cost minimizing dynamic migration of content distribution services into hybri...
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Integrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architectureIntegrity verification for an optimized cloud architecture
Integrity verification for an optimized cloud architecture
 
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...Ieeepro techno solutions   ieee java project - budget-driven scheduling algor...
Ieeepro techno solutions ieee java project - budget-driven scheduling algor...
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 

Destaque

Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural networkDEEPASHRI HK
 
Vehicle management system
Vehicle management systemVehicle management system
Vehicle management systemMohd Saddam
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingSi Chen
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismseSAT Journals
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detectionieeepondy
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technologybhupathi vikas
 
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...CloudTechnologies
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural networkNagarajan
 
Neural networks
Neural networksNeural networks
Neural networksSlideshare
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSREHMAT ULLAH
 
neural network
neural networkneural network
neural networkSTUDENT
 
დეპრესია
დეპრესიადეპრესია
დეპრესიაNini Talabadze
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerIJMER
 
Image Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterImage Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterIJMER
 
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...IJMER
 
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...IJMER
 
Mgt 330 final exam set 3
Mgt 330 final exam set 3Mgt 330 final exam set 3
Mgt 330 final exam set 3liam111221
 
Ab02417411746
Ab02417411746Ab02417411746
Ab02417411746IJMER
 

Destaque (20)

Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Vehicle management system
Vehicle management systemVehicle management system
Vehicle management system
 
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud ComputingTowards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 
Smart Crawler
Smart CrawlerSmart Crawler
Smart Crawler
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
 
Documentation on barcode technology
Documentation on barcode technologyDocumentation on barcode technology
Documentation on barcode technology
 
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...
SMART CRAWLER: A TWO-STAGE CRAWLER FOR EFFICIENTLY HARVESTING DEEP-WEB INTERF...
 
Introduction Of Artificial neural network
Introduction Of Artificial neural networkIntroduction Of Artificial neural network
Introduction Of Artificial neural network
 
ARM Processor
ARM ProcessorARM Processor
ARM Processor
 
Neural networks
Neural networksNeural networks
Neural networks
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
 
neural network
neural networkneural network
neural network
 
დეპრესია
დეპრესიადეპრესია
დეპრესია
 
Finite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat ExchangerFinite Element Analysys of Heat Exchanger
Finite Element Analysys of Heat Exchanger
 
Image Denoising Using Non Linear Filter
Image Denoising Using Non Linear FilterImage Denoising Using Non Linear Filter
Image Denoising Using Non Linear Filter
 
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...Finite Element Analysis of Convective Micro Polar Fluid Flow  through a Porou...
Finite Element Analysis of Convective Micro Polar Fluid Flow through a Porou...
 
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...
Determination of Some Mechanical And Hydraulic Properties Of Biu Clayey Soils...
 
Mgt 330 final exam set 3
Mgt 330 final exam set 3Mgt 330 final exam set 3
Mgt 330 final exam set 3
 
Ab02417411746
Ab02417411746Ab02417411746
Ab02417411746
 

Semelhante a Secure Linear Programming in Cloud Computing

Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmIOSR Journals
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...IJERA Editor
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...IOSR Journals
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingIAEME Publication
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataIRJET Journal
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingIOSR Journals
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 

Semelhante a Secure Linear Programming in Cloud Computing (20)

Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
Public Verifiability in Cloud Computing Using Signcryption Based on Elliptic ...
 
F01113945
F01113945F01113945
F01113945
 
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computingProtection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
 
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud DataA Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
A Secure and Dynamic Multi Keyword Ranked Search over Encrypted Cloud Data
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Lm2519942003
Lm2519942003Lm2519942003
Lm2519942003
 
Lm2519942003
Lm2519942003Lm2519942003
Lm2519942003
 
Networking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud ComputingNetworking Issues and Challenges In Cloud Computing
Networking Issues and Challenges In Cloud Computing
 
G017214849
G017214849G017214849
G017214849
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 

Mais de IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless BicycleIJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningIJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessIJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And AuditIJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLIJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyIJMER
 

Mais de IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Último

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Secure Linear Programming in Cloud Computing

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645 www.ijmer.com 1396 | Page Shaik Kalesha, 1 G.Sridevi2 1 M.Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India 2 Assoc.Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India Abstract: Cloud Computing is a subscription based service where you can obtain the networked storage space and computer resources. In cloud computing model, the customers plug into the cloud to access IT resources which are priced and provided on demand services. This cloud computing model composed of five essential characteristics, three service models and four deployment models. Users can store their data in the cloud and there is a lot of personal information and potentially secure data that people store on their computers, and this information is now being transferred to the cloud. Here we must ensure the security of user’s data, which is in stored in the cloud. This paper presents the secure outsourcing mechanism for linear programming in the cloud computing environment. Linear programming is an algorithmic and computational tool which captures the first order effects of various system parameters that should be optimized, and is essential to the engineering optimization. It has been widely used in various engineering disciplines that analyze and optimize real world systems, such as - packet routing, flow control, power management of data centers, etc. Keywords: Cloud, Linear programming, Security. I. INTRODUCTION The end of this decade is marked by a paradigm shift of the industrial information technology towards the subscription based or pay-per-use service business model known as cloud computing [1]. This paradigm provides users with a long list of advantages, such as- provision computing capabilities; broad, heterogeneous network access; resource pooling and rapid elasticity with measured services [2]. Huge amounts of data being retrieved from the geographically distributed data sources, and non-localized data-handling requirements, creates such a change in technological as well as business model. One of the prominent services offered in the cloud computing is the cloud data storage, in which subscribers do not have to store their data on their own servers, where instead their data will be stored on the cloud service provider’s servers. In cloud computing, the subscribers have to pay the service providers for this storage service. This service does not only provides flexibility and the scalability for the data storage, it also provide customers with the benefit of paying only for the amount of data they need to store for a particular period of time, without any concerns for efficient storage mechanisms and maintainability issues with large amounts of data storage. In addition to these benefits, the customers can easily access their data from any geographical region where the Cloud Service Provider’s network or Internet can be accessed. An example of the cloud computing is shown in Figure 1. Along with these unprecedented advantages, the cloud data storage also redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). Since the cloud service providers (SP) are separate market entities, data integrity and privacy are the most critical issues that need to be addressed in cloud computing. Even though the cloud service providers have standard regulations and has powerful infrastructure to ensure customer’s data privacy and provide a better availability, the reports of privacy breach and service outage have been apparent in last few years [3] [4] [5]. Figure 1: Cloud Computing Architecture Example This paper presents the secure outsourcing mechanism for linear programming (LP) in the cloud computing environment. Linear programming is an algorithmic and computational tool which captures the first order effects of various system parameters that should be optimized, and is essential to the engineering optimization. It has been widely used in various engineering disciplines that analyze and optimize real world systems, such as - packet routing, flow control, power management of data centers, etc. Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645 www.ijmer.com 1397 | Page II. RELATED WORK General secure computation outsourcing that fulfills all the aforementioned requirements, such as input/output privacy and correctness/soundness guarantee has been shown feasible in theory by Gennaro et al. [6]. However, it is currently not practical due to the huge computation complexity. Atallah et al. explore a list of work [7][8] for securely outsourcing specific applications. The customized solutions are expected to be very efficient than the general way of constructing the circuits. In [7], they give the first investigation of secure outsourcing of numerical and scientific computation. Later on in [8] and [9], Atallah et al. give two protocol designs for both secure sequence comparison outsourcing and the secure algebraic computation outsourcing. However, both protocols use heavy cryptographic primitive such as homomorphic encryptions [10] and/or oblivious transfer [11] and do not scale well for large problem set. Hohenberger et al. [12] provide protocols for secure outsourcing of modular exponentiation, which is considered as prohibitively expensive in most public-key cryptography operations. Recently, Atallah [13] et al. give a provably secure protocol for secure outsourcing matrix multiplications based on secret sharing [14]. Another large existing list of work that relates to ours is Secure Multi-party Computation (SMC), first introduced by Yao [15] and later extended by Goldreich et al. [16] and many others. Very recently, Wang et al. [17] give the first study of secure outsourcing of linear programming in cloud computing. Their solution is based on the problem transformation, and has the advantage of bringing customer savings without introducing substantial overhead on cloud. However, those techniques involve cubic time computational burden matrix-matrix operations, which the weak customer in our case is not necessarily able to handle for large-scale problems. III. PROPOSED WORK Our proposed mechanism consists of three phases: A. Problem Transformation In this phase, the cloud customer would initialize a randomized key generation algorithm and prepare the LE problem into some encrypted form K via key K. Transformation and encryption operations will be needed when necessary. The customer who has coefficient vector “b” and seeks solution “x” satisfying Ax = b cannot directly starts the ProbSolve with cloud, since such interaction may expose the private information on final result x. Thus, we still need a transformation technique to allow the customer to properly hide such information first. The customer picks a random vector r n R as his secret keying material, the new LE problem is written as: Ay= ' b ------------ (1) Where y = x + r and ' b = b + Ar. Equation (1) can be rewritten as follows: ')(1_ . CyTy kK  ------------ (2) Where T= RD .1 , 1'   Dc . ' b , and A= D + R. The whole procedure of “ProbTransform” is summarized in the following Algorithm 1. Algorithm1: Data: original problem =(A,b) Result: transformed problem as shown in Equation (2) Step 1: Pick random r n R Step 2: Compute 1 b =b+Ar, and 1 c = 1 D . 1 b Step 3: Replace tuple (x,c) in Equation (2) with (y=x+r, 1 c ) Return transformed problem as Equation (2). B. Problem Solving In this phase, the cloud customer would use the encrypted form K of LE to start the computation outsourcing process. In case of using the iterative methods, the protocol ends when the solution within the required accuracy is found. After the problem transformation step, now we are ready to describe the phase of “ProbSolve”. The purpose of the protocol is to let the customer securely harness the cloud for the most expensive computation, i.e., the matrix-vector multiplication T. )(K y in Eq. (2) for each algorithm iteration, k = 1, 2,……L. assume without loss of generality that our main protocol of solving LE works over integers. All arithmetic is modular with respect to the modulus “N” of the homomorphic encryption, and the modulus is large enough to contain the answer. For the first iteration, the customer starts
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645 www.ijmer.com 1398 | Page the initial guess on the vector T ynyyy ),........2,1( )0()0()0()0(  , and then sends it to the cloud. The cloud server, in possession of the encrypted matrix Enc (T), computes the value Enc (T. )0( y ) by using the homomorphic property of the encryption: ------- (3) After receiving Enc (T. )0( y ) the customer decrypts and gets value T. )0( y Using his private key. He then updates the next approximation )1( y = T. )0( y + ' c via Equ (2). The protocol execution continues until the result converges, as shown in the following Algorithm 2. Algorithm 2: Data: Transformed problem with input 1 c and Enc (T) Result: Solution x to the original problem = (A, b) % L: Maximum number of iterations to be performed; %: Measurement of convergence point; Step 1: Customer picks N NZy )()0(  For (k<-0 to L) do Step 2: Customer sends )(k y to cloud Step 3: Cloud computes Enc (T )(k y ) via Equation (3) Step 4: Customer decrypts T )(k y via his private key If || )(k y - )1( k y || <=  then Step 5: break with convergence point )1( k y Step 6: return x= )1( k y - r C. Result Verification In this phase, the cloud customer would verify the encrypted result produced from the cloud server, using the randomized secret key K. A correct output “x” to the problem is produced by decrypting the encrypted output. When the validation fails, the customer output  , indicating the cloud server was cheating. IV. CONCLUSION Cloud Computing provides convenient on demand network access to a shared pool of configurable computing resources that can be rapidly deployed with the great efficiency and minimal management overhead. Focusing on the engineering and scientific computing problems, this proposed work investigates secure outsourcing for widely applicable large-scale systems of linear equations (LE), which are among the most popular algorithmic and computational tools in various engineering disciplines that analyze and optimize real-world systems. Our proposed work has three phases- problem transformation, problem solving and result verification. In problem transformation, the cloud customer would initialize a randomized key generation algorithm and prepare the LE problem into some encrypted form K via key K. Transformation and encryption operations will be needed when necessary. In problem solving, the cloud customer would use the encrypted form K of LE to start the computation outsourcing process. In case of using the iterative methods, the protocol ends when the solution within the required accuracy is found. In result verification, the cloud customer would verify the encrypted result produced from the cloud server, using the randomized secret key K.
  • 4. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.3, May-June. 2013 pp-1396-1399 ISSN: 2249-6645 www.ijmer.com 1399 | Page REFERENCES [1] M. Armbrust, A. Fox, R. Grifth, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. Above the clouds: A berkeley view of cloud computing. Technical report, University of California at Berkeley, February 2009. [2] P. Mell, T. Grance, “Draft NIST working definition of cloud computing”, Referenced on June. 3rd, 2009, online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2009. [3] Amazon.com, “Amazon s3 availablity event: July 20, 2008”, online at http://status.aws.amazon.com/s3-20080720.html, 2008. [4] M. Arrington, “Gmail Disaster: Reports of mass email deletions”, Online at http://www.techcrunch.com/2006/12/28/gmail- disasterreports-ofmass- email-deletions/, December 2006. [5] J. Kincaid, “MediaMax/TheLinkup Closes Its Doors”, Online at http://www.techcrunch.com/2008/-7/10/mediamaxthelinkup-closes- itsdorrs/, July 2008 [6] R. Gennaro, C. Gentry, and B. Parno, “Non-interactive verifiable computing: Outsourcing computation to untrusted workers,” in Proc. Of CRYPTO’10, Aug. 2010. [7] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure outsourcing of scientific computations,” Advances in Computers, vol. 54, pp. 216–272, 2001. [8] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J. Inf. Sec., vol. 4, no. 4, pp. 277–287, 2005 [9] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of algebraic computations,” in Proc. of 6th Conf. on Privacy, Security, and Trust (PST), 2008, pp. 240–245. [10] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Proc. of EUROCRYPT’99, 1999, pp. 223– 238. [11] S. Even, O. Goldreich, and A. Lempel, “A randomized protocol for signing contracts,” Commun ACM, vol. 28, no. 6, pp. 637–647, 1985. [12] S. Hohenberger and A. Lysyanskaya, “How to securely outsource cryptographic computations” in Proc. of TCC, 2005 pp. 264–282. [13] M. Atallah and K. Frikken, “Securely outsourcing linear algebra computations,” in Proc. of ASIACCS, 2010, pp. 48–59 [14] A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp. 612–613, 1979 [15] A. C.-C. Yao, “Protocols for secure computations (extended abstract),” in Proc. of FOCS’82, 1982, pp 160–164 [16] O. Goldreich, S. Micali, and A. Wigderson, “How to play any mental game or a completeness theorem for protocols with honest majority,” in Proc. of STOC’87, 1987, pp 218–229 [17] C. Wang, K. Ren, and J. Wang, “Secure and practical outsourcing of linear programming in cloud computing,” in Proc. of IEEE INFOCOM, 2011