SlideShare a Scribd company logo
1 of 12
NEW ALGORITHMS FOR SECURE OUTSOURCING OF
LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS.
Abstract—With the rapid development in availability of cloud services, the
techniques for securely outsourcing the prohibitively expensive computations to
untrusted servers are getting more and more attentions in the scientific community.
In this paper, we investigate secure outsourcing for large-scale systems of linear
equations, which are the most popular problems in various engineering disciplines.
For the first time, we utilize the sparse matrix to propose a new secure outsourcing
algorithm of large-scale linear equations in the fully malicious model. Compared
ith the state-of-the-art algorithm, the proposed algorithm only requires (optimal)
one round communication (while the algorithm requires L rounds of interactions
between the client and cloud server, where L denotes the number of iteration in
iterative methods). Furthermore, the client in our algorithm can detect the
misbehavior of cloud server with the (optimal) probability 1. Therefore, our
proposed algorithm is superior in both efficiency and checkability. We also
provide the experimental evaluation that demonstrates the efficiency and
effectiveness of our algorithm.
EXISTING SYSTEM:
There are also plenty of research work on the securely outsourcing computations in
the past decades. Abadi first proved the impossibility of secure outsourcing an
exponential computation while locally doing only polynomial time work.
Therefore, it is meaningful only to consider outsourcing expensive polynomial
time computations. The theoretical computer science community has devoted
considerable attention to the problem of how to securely outsource different kinds
of expensive computations. Atallah et al. presented a framework for secure
outsourcing of scientific computations such as matrix multiplications and
quadrature. However, the solution used the disguise technique and thus allowed
leakage of private information. Atallah and Li investigated the problem of
computing the edit distance between two sequences and presented an efficient
protocol to securely outsource sequence comparisons to two servers. Recently,
Blanton et al. proposed a more efficient scheme for secure outsourcing sequence
comparisons. Benjamin and Atallah addressed the problem of secure outsourcing
for widely applicable linear algebra computations. However, the proposed
protocols required the expensive operations of homomorphic encryptions. Atallah
and Frikken further studied this problem and gave improved protocols based on
Shamir’s secret sharing. Some other works also used Shamir’s secret sharing to
perform homomorphic computations over cloud. Trivially, the protocols based on
secret sharing require at least two non-colluding servers. Wang et al. presented
efficient mechanisms for secure outsourcing of linear programming computations.
However, the solution requires matrix-matrix operations (cubic-time computational
burden). Recently, Wang et al. proposed a secure outsourcing mechanism for
solving large-scale systems of linear equations based on the iterative methods.
However, it requires multi-round interactions between the client and the cloud
server and thus is impractical.
PROPOSED SYSTEM:
In this paper, we propose a new secure outsourcing algorithm for large-scale
systems of linear equations Ax = b. Our proposed algorithm works with a single
cloud server and the server is assumed to be lazy, curious, and dishonest (fully
malicious model). Compared with the state-of-the-art algorithm , the proposed
algorithm is superior in both efficiency and checkability. Our contributions are
three folds: 1) For the first time, we utilize the sparse matrix to investigate securely
outsourcing for large-scale systems of linear equations. Our algorithm is suitable
for any nonsingular dense matrix A. However, in algorithm , A must be a strictly
diagonally dominant matrix for convergence. 2) Our proposed algorithm only
requires (optimal) 1 round communication between the client C and server S, while
algorithm requires L interactions due to the iterative method. 3) In the proposed
algorithm, the client C can detect the misbehavior of server S with the (optimal)
probability 1. Surprisingly, we use neither the complicated knowledge proof
techniques nor the boolean garbled circuits.
Module 1
Cloud Computing
Cloud computing refers to both the applications delivered as services over the
Internet and the hardware and systems software in the datacenters that provide
those services. There are four basic cloud delivery models, as outlined by NIST
(Badger et al., 2011), based on who provides the cloud services. The agencies may
employ one model or a combination of different models for efficient and optimized
delivery of applications and business services. These four delivery models are: (i)
Private cloud in which cloud services are provided solely for an organization and
are managed by the organization or a third party. These services may exist off-site.
(ii) Public cloud in which cloud services are available to the public and owned by
an organization selling the cloud services, for example, Amazon cloud service. (iii)
Community cloud in which cloud services are shared by several organizations for
supporting a specific community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). These services may be
managed by the organizations or a third party and may exist offsite. A Special case
of Community cloud is The Government or G-Cloud. This type of cloud
computing is provided by one or more agencies (service provider role), for use by
all, or most, government agencies (user role). (iv) Hybrid cloud which is a
composition of different cloud computing infrastructure (public, private or
community). An example for hybrid cloud is the data stored in private cloud of a
travel agency that is manipulated by a program running in the public cloud.
Module 2
Outsourcing
In business, outsourcing involves the contracting out of a business process to
another party (compare business process outsourcing). Outsourcing sometimes
involves transferring employees and assets from one firm to another, but not
always. Outsourcing is also the practice of handing over control of public
services to for-profit corporations. Outsourcing includes both foreign and domestic
contracting,[5] and sometimes includes offshoring (relocating a business function to
another country). Financial savings from lower international labor rates can
provide a major motivation for outsourcing/offshoring. The opposite of
outsourcing, insourcing, entails bringing processes handled by third-party firms in-
house, and is sometimes accomplished via vertical integration. However, a
business can provide a contract service to another business without necessarily
insourcing that business process. Two organizations may enter into a contractual
agreement involving an exchange of services and payments. Outsourcing is said to
help firms to perform well in their core competencies and mitigate shortage of skill
or expertise in the areas where they want to outsource. Outsourcing can offer
greater budget flexibility and control. Outsourcing lets organizations pay for only
the services they need, when they need them. It also reduces the need to hire and
train specialized staff, brings in fresh engineering expertise, and reduces capital
and operating expenses.
Module 3
Security Model
We consider an outsourcing computation architecture in which an honest while
resources-constrained client C wants to outsource an expensive computation task F
: D → M to a cloud server S, as illustrated in Fig. 1. Trivially, S is not fully trusted
by C. Without loss of generality, we say that (C, S) correctly implements F if F(x)
= CS(x) for ∀ x ∈ D, where CS means that C is given oracle access to S that
records all of its computation over time. Golle and Mironov [29] first introduced
the “lazy-buthonest” model for the inversion of one-way function class of
outsourcing computations. As a rational economic agent, S will try to minimize the
amount of work it needs to perform in order to retrieve the payment, while it will
honestly provide the computation results to C. It is reasonable to assume that S is
honest in this kind of outsourcing computation model. Actually, given an invalid
computation result, C can detect it immediately with probability 1 since the
verification of the result is equivalent to compute the one-way functions. Another
well-known model is the “honest-but-curious” model (originally called the semi-
honest model), firstly introduced by Goldreich et al.. In this model, both the parties
are guaranteed to properly execute a prescribed protocol, but, at the end of it, one
party can use its own view of the execution to infer about the other’s input.
Therefore, S will also honestly send the computation results to C. However, S will
try his best to retrieve some sensitive information such as the secret input/output of
C. Note that the computation results (i.e., the output of S) are different from the
output of C (i.e., the real computation aim of C). We can view S in the above two
models as a passive adversary. In many applications, we must consider the case
that S is an active attacker. For example, S can intentionally send a computationally
indistinguishable (invalid) result to C. That is, S may be not only lazy and curious,
but also dishonest. This is the strongest adversarial model, and we name it the
“fully malicious model.” It seems to be very difficult to design secure and efficient
outsourcing algorithms for generic computations in the full malicious model.
Hohenberger and Lysyanskaya first introduced a weaker model called “two
untrusted program model” for outsourcing exponentiations modulo a large prime.
In the two untrusted program model, there are two non-colluding servers S1 and S2
and we assume at most one of them is adversarial while we cannot know which
one. Besides, the misbehavior of the dishonest server can be detected with an
overwhelming probability. Recently, Canetti et al. introduced the so-called
“refereed delegation of computation model,” where the outsourcer delegates the
computation to n servers under the assumption that at least one of the servers is
honest. Trivially, two untrusted program model can be viewed as a special case of
refereed delegation of computation model for n = 2.
Module 4
New outsourcing algorithm of linear equations
A. High Description The problem for securely outsourcing large-scale systems of
linear equations can be formulated as follows: The client C seeks for the solution
to a large-scale system of linear equations Ax = b, where A ∈ Rn×n is a real
coefficient matrix with rank n, and b ∈ Rn is a coefficient vector. Due to the lack
of computing resources, C could be infeasible to carry out such expensive
computation as O(nρ ) for 2 < ρ ≤ 3 locally. Therefore, C will outsource the
computation workloads to cloud server S in a pay-per-use manner. In this paper,
we only focus on general nonsingular dense matrices A, while our proposed
solution is also applicable to sparse matrices. While for the case of (extremely)
sparse matrices, C may be able to compute the solution of linear equations
efficiently with other methods. In this section, we propose a new algorithm LE for
securely outsourcing large-scale systems of linear equations in the fully malicious
model. That is, the computation is delegated to only one server who may be lazy,
curious, and dishonest. Our main trick is that we use two random sparse matrices
to hide A. More precisely, C chooses two random sparse matrices M,N ∈ Rn×n
and computes T = MAN. Due to the random blinding technique, we can prove that
the proposed outsourcing algorithm satisfies the privacy for A, b and the solution
x. Besides, it does not require any special encryption techniques with the
homomorphic property. We argue that the complexity to compute T is O(n2) since
both M and N are sparse matrices. Our proposed algorithm only requires one round
communication between C and S. Furthermore, C can detect the misbehavior of S
with the probability 1. The computational complexity for the verification is still
O(n2). This is due to the observation that it requires at most n2 multiplications to
compute Ty for any (even totally dense) matrix T and any coefficient vector y.
CONCLUSIONS
In this paper, we propose an efficient outsource-secure algorithm for large-scale
systems of linear equations, which are the most basic and expensive operations in
many engineering disciplines. The proposedalgorithm is suitable for
any nonsingular dense matrix even in the strongest adversarial model (a.k.a. fully
malicious model). Furthermore, our algorithm is superior in both efficiency and
checkability than the state-of-the-art algorithm .
REFERENCES
[1] M. J. Atallah and K. B. Frikken, “Securely outsourcing linear algebra
computations,” in Proc. 5th ACM Symp. Inf., Comput. Commun. Secur.
(ASIACCS), 2010, pp. 48–59.
[2] M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an
oracle,” in Proc. 19th Annu. ACM Symp. Theory Comput. (STOC), 1987, pp. 195–
203.
[3] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure
outsourcing of scientific computations,” Adv. Comput., vol. 54, pp. 215–272, Jan.
2002.
[4] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J.
Inf. Secur., vol. 4, no. 4, pp. 277–287, Oct. 2005.
[5] M. Blanton, “Improved conditional E-payments,” in Applied Cryptography and
Network Security (Lecture Notes in Computer Science), vol. 5037. Berlin,
Germany: Springer-Verlag, 2008, pp. 188–206.
[6] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of
algebraic computations,” in Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST),
Oct. 2008, pp. 240–245.
[7] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, “Locally random
reductions: Improvements and applications,” J. Cryptol., vol. 10, no. 1, pp. 17–36,
Dec. 1997.
[8] M. Benzi, “Preconditioning techniques for large linear systems: A survey,” J.
Comput. Phys., vol. 182, no. 2, pp. 418–477, Nov. 2002.
[9] M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, “Multi-prover
interactive proofs: How to remove intractability assumptions,” in Proc. ACM
Symp. Theory Comput. (STOC), 1988, pp. 113–131.
[10] S. Benabbas, R. Gennaro, and Y. Vahlis, “Verifiable delegation of
computation over large datasets,” in Advances in Cryptology (Lecture Notes in
Computer Science), vol. 6841. Berlin, Germany: Springer-Verlag, 2011, pp. 111–
131.
[11] M. Blanton, M. J. Atallah, K. B. Frikken, and Q. Malluhi, “Secure and
efficient outsourcing of sequence comparisons,” in Computer Security (Lecture
Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012,
pp. 505–522.

More Related Content

What's hot

Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmIOSR Journals
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DASusanne Braun
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2Abdullaziz Tagawy
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...IJERA Editor
 
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : NotesTuring Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : NotesSubhajit Sahu
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregatorsIAEME Publication
 
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDMCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDijccsa
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphsWaqas Nawaz
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingIRJET Journal
 
Taking r to its limits. 70+ tips
Taking r to its limits. 70+ tipsTaking r to its limits. 70+ tips
Taking r to its limits. 70+ tipsIlya Shutov
 
New emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demandNew emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demandSebastian Contreras
 
Deep Learning for Time Series Data
Deep Learning for Time Series DataDeep Learning for Time Series Data
Deep Learning for Time Series DataArun Kejariwal
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 

What's hot (17)

Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering Algorithm
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DA
 
J41046368
J41046368J41046368
J41046368
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
 
Angel
AngelAngel
Angel
 
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : NotesTuring Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregators
 
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDMCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
 
Taking r to its limits. 70+ tips
Taking r to its limits. 70+ tipsTaking r to its limits. 70+ tips
Taking r to its limits. 70+ tips
 
New emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demandNew emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demand
 
Deep Learning for Time Series Data
Deep Learning for Time Series DataDeep Learning for Time Series Data
Deep Learning for Time Series Data
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 

Viewers also liked

Deployability
DeployabilityDeployability
DeployabilityLen Bass
 
Energy Efficiency in Large Scale Systems
Energy Efficiency in Large Scale SystemsEnergy Efficiency in Large Scale Systems
Energy Efficiency in Large Scale SystemsJerry Sheehan
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity securityLen Bass
 
Acm Tech Talk - Decomposition Paradigms for Large Scale Systems
Acm Tech Talk - Decomposition Paradigms for Large Scale SystemsAcm Tech Talk - Decomposition Paradigms for Large Scale Systems
Acm Tech Talk - Decomposition Paradigms for Large Scale SystemsVinayak Hegde
 
Designing Ultra Large Scale Systems List
Designing Ultra Large Scale Systems ListDesigning Ultra Large Scale Systems List
Designing Ultra Large Scale Systems ListCrafitti Consulting
 
Architectural Tactics for Large Scale Systems
Architectural Tactics for Large Scale SystemsArchitectural Tactics for Large Scale Systems
Architectural Tactics for Large Scale SystemsLen Bass
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESNexgen Technology
 
Principles of microservices velocity
Principles of microservices   velocityPrinciples of microservices   velocity
Principles of microservices velocitySam Newman
 

Viewers also liked (8)

Deployability
DeployabilityDeployability
Deployability
 
Energy Efficiency in Large Scale Systems
Energy Efficiency in Large Scale SystemsEnergy Efficiency in Large Scale Systems
Energy Efficiency in Large Scale Systems
 
Architecting for the cloud elasticity security
Architecting for the cloud elasticity securityArchitecting for the cloud elasticity security
Architecting for the cloud elasticity security
 
Acm Tech Talk - Decomposition Paradigms for Large Scale Systems
Acm Tech Talk - Decomposition Paradigms for Large Scale SystemsAcm Tech Talk - Decomposition Paradigms for Large Scale Systems
Acm Tech Talk - Decomposition Paradigms for Large Scale Systems
 
Designing Ultra Large Scale Systems List
Designing Ultra Large Scale Systems ListDesigning Ultra Large Scale Systems List
Designing Ultra Large Scale Systems List
 
Architectural Tactics for Large Scale Systems
Architectural Tactics for Large Scale SystemsArchitectural Tactics for Large Scale Systems
Architectural Tactics for Large Scale Systems
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
 
Principles of microservices velocity
Principles of microservices   velocityPrinciples of microservices   velocity
Principles of microservices velocity
 

Similar to NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS.

Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingIJMER
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingIMPULSE_TECHNOLOGY
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmIOSR Journals
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingIOSR Journals
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONShakas Technologies
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolationnexgentechnology
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharingnexgentech15
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolationnexgentechnology
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONNexgen Technology
 
Assignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced DatabasesAssignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced DatabasesNicole Adams
 
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB... AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...Nexgen Technology
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Editor IJCATR
 

Similar to NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS. (20)

Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcing
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
D04573033
D04573033D04573033
D04573033
 
Assignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced DatabasesAssignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced Databases
 
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB... AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
 

More from Nexgen Technology

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...Nexgen Technology
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...Nexgen Technology
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennaiNexgen Technology
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Nexgen Technology
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Nexgen Technology
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Nexgen Technology
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Nexgen Technology
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Nexgen Technology
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Nexgen Technology
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Nexgen Technology
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...Nexgen Technology
 

More from Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
 

Recently uploaded

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS.

  • 1. NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS. Abstract—With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientific community. In this paper, we investigate secure outsourcing for large-scale systems of linear equations, which are the most popular problems in various engineering disciplines. For the first time, we utilize the sparse matrix to propose a new secure outsourcing algorithm of large-scale linear equations in the fully malicious model. Compared ith the state-of-the-art algorithm, the proposed algorithm only requires (optimal) one round communication (while the algorithm requires L rounds of interactions between the client and cloud server, where L denotes the number of iteration in iterative methods). Furthermore, the client in our algorithm can detect the misbehavior of cloud server with the (optimal) probability 1. Therefore, our proposed algorithm is superior in both efficiency and checkability. We also provide the experimental evaluation that demonstrates the efficiency and effectiveness of our algorithm.
  • 2. EXISTING SYSTEM: There are also plenty of research work on the securely outsourcing computations in the past decades. Abadi first proved the impossibility of secure outsourcing an exponential computation while locally doing only polynomial time work. Therefore, it is meaningful only to consider outsourcing expensive polynomial time computations. The theoretical computer science community has devoted considerable attention to the problem of how to securely outsource different kinds of expensive computations. Atallah et al. presented a framework for secure outsourcing of scientific computations such as matrix multiplications and quadrature. However, the solution used the disguise technique and thus allowed leakage of private information. Atallah and Li investigated the problem of computing the edit distance between two sequences and presented an efficient protocol to securely outsource sequence comparisons to two servers. Recently, Blanton et al. proposed a more efficient scheme for secure outsourcing sequence comparisons. Benjamin and Atallah addressed the problem of secure outsourcing for widely applicable linear algebra computations. However, the proposed protocols required the expensive operations of homomorphic encryptions. Atallah and Frikken further studied this problem and gave improved protocols based on Shamir’s secret sharing. Some other works also used Shamir’s secret sharing to
  • 3. perform homomorphic computations over cloud. Trivially, the protocols based on secret sharing require at least two non-colluding servers. Wang et al. presented efficient mechanisms for secure outsourcing of linear programming computations. However, the solution requires matrix-matrix operations (cubic-time computational burden). Recently, Wang et al. proposed a secure outsourcing mechanism for solving large-scale systems of linear equations based on the iterative methods. However, it requires multi-round interactions between the client and the cloud server and thus is impractical. PROPOSED SYSTEM: In this paper, we propose a new secure outsourcing algorithm for large-scale systems of linear equations Ax = b. Our proposed algorithm works with a single cloud server and the server is assumed to be lazy, curious, and dishonest (fully malicious model). Compared with the state-of-the-art algorithm , the proposed algorithm is superior in both efficiency and checkability. Our contributions are three folds: 1) For the first time, we utilize the sparse matrix to investigate securely outsourcing for large-scale systems of linear equations. Our algorithm is suitable for any nonsingular dense matrix A. However, in algorithm , A must be a strictly diagonally dominant matrix for convergence. 2) Our proposed algorithm only requires (optimal) 1 round communication between the client C and server S, while
  • 4. algorithm requires L interactions due to the iterative method. 3) In the proposed algorithm, the client C can detect the misbehavior of server S with the (optimal) probability 1. Surprisingly, we use neither the complicated knowledge proof techniques nor the boolean garbled circuits. Module 1 Cloud Computing Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. There are four basic cloud delivery models, as outlined by NIST (Badger et al., 2011), based on who provides the cloud services. The agencies may employ one model or a combination of different models for efficient and optimized delivery of applications and business services. These four delivery models are: (i) Private cloud in which cloud services are provided solely for an organization and are managed by the organization or a third party. These services may exist off-site. (ii) Public cloud in which cloud services are available to the public and owned by an organization selling the cloud services, for example, Amazon cloud service. (iii) Community cloud in which cloud services are shared by several organizations for supporting a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). These services may be
  • 5. managed by the organizations or a third party and may exist offsite. A Special case of Community cloud is The Government or G-Cloud. This type of cloud computing is provided by one or more agencies (service provider role), for use by all, or most, government agencies (user role). (iv) Hybrid cloud which is a composition of different cloud computing infrastructure (public, private or community). An example for hybrid cloud is the data stored in private cloud of a travel agency that is manipulated by a program running in the public cloud. Module 2 Outsourcing In business, outsourcing involves the contracting out of a business process to another party (compare business process outsourcing). Outsourcing sometimes involves transferring employees and assets from one firm to another, but not always. Outsourcing is also the practice of handing over control of public services to for-profit corporations. Outsourcing includes both foreign and domestic contracting,[5] and sometimes includes offshoring (relocating a business function to another country). Financial savings from lower international labor rates can provide a major motivation for outsourcing/offshoring. The opposite of outsourcing, insourcing, entails bringing processes handled by third-party firms in- house, and is sometimes accomplished via vertical integration. However, a
  • 6. business can provide a contract service to another business without necessarily insourcing that business process. Two organizations may enter into a contractual agreement involving an exchange of services and payments. Outsourcing is said to help firms to perform well in their core competencies and mitigate shortage of skill or expertise in the areas where they want to outsource. Outsourcing can offer greater budget flexibility and control. Outsourcing lets organizations pay for only the services they need, when they need them. It also reduces the need to hire and train specialized staff, brings in fresh engineering expertise, and reduces capital and operating expenses. Module 3 Security Model We consider an outsourcing computation architecture in which an honest while resources-constrained client C wants to outsource an expensive computation task F : D → M to a cloud server S, as illustrated in Fig. 1. Trivially, S is not fully trusted by C. Without loss of generality, we say that (C, S) correctly implements F if F(x) = CS(x) for ∀ x ∈ D, where CS means that C is given oracle access to S that records all of its computation over time. Golle and Mironov [29] first introduced the “lazy-buthonest” model for the inversion of one-way function class of
  • 7. outsourcing computations. As a rational economic agent, S will try to minimize the amount of work it needs to perform in order to retrieve the payment, while it will honestly provide the computation results to C. It is reasonable to assume that S is honest in this kind of outsourcing computation model. Actually, given an invalid computation result, C can detect it immediately with probability 1 since the verification of the result is equivalent to compute the one-way functions. Another well-known model is the “honest-but-curious” model (originally called the semi- honest model), firstly introduced by Goldreich et al.. In this model, both the parties are guaranteed to properly execute a prescribed protocol, but, at the end of it, one party can use its own view of the execution to infer about the other’s input. Therefore, S will also honestly send the computation results to C. However, S will try his best to retrieve some sensitive information such as the secret input/output of C. Note that the computation results (i.e., the output of S) are different from the output of C (i.e., the real computation aim of C). We can view S in the above two models as a passive adversary. In many applications, we must consider the case that S is an active attacker. For example, S can intentionally send a computationally indistinguishable (invalid) result to C. That is, S may be not only lazy and curious, but also dishonest. This is the strongest adversarial model, and we name it the “fully malicious model.” It seems to be very difficult to design secure and efficient outsourcing algorithms for generic computations in the full malicious model.
  • 8. Hohenberger and Lysyanskaya first introduced a weaker model called “two untrusted program model” for outsourcing exponentiations modulo a large prime. In the two untrusted program model, there are two non-colluding servers S1 and S2 and we assume at most one of them is adversarial while we cannot know which one. Besides, the misbehavior of the dishonest server can be detected with an overwhelming probability. Recently, Canetti et al. introduced the so-called “refereed delegation of computation model,” where the outsourcer delegates the computation to n servers under the assumption that at least one of the servers is honest. Trivially, two untrusted program model can be viewed as a special case of refereed delegation of computation model for n = 2. Module 4 New outsourcing algorithm of linear equations A. High Description The problem for securely outsourcing large-scale systems of linear equations can be formulated as follows: The client C seeks for the solution to a large-scale system of linear equations Ax = b, where A ∈ Rn×n is a real coefficient matrix with rank n, and b ∈ Rn is a coefficient vector. Due to the lack of computing resources, C could be infeasible to carry out such expensive computation as O(nρ ) for 2 < ρ ≤ 3 locally. Therefore, C will outsource the
  • 9. computation workloads to cloud server S in a pay-per-use manner. In this paper, we only focus on general nonsingular dense matrices A, while our proposed solution is also applicable to sparse matrices. While for the case of (extremely) sparse matrices, C may be able to compute the solution of linear equations efficiently with other methods. In this section, we propose a new algorithm LE for securely outsourcing large-scale systems of linear equations in the fully malicious model. That is, the computation is delegated to only one server who may be lazy, curious, and dishonest. Our main trick is that we use two random sparse matrices to hide A. More precisely, C chooses two random sparse matrices M,N ∈ Rn×n and computes T = MAN. Due to the random blinding technique, we can prove that the proposed outsourcing algorithm satisfies the privacy for A, b and the solution x. Besides, it does not require any special encryption techniques with the homomorphic property. We argue that the complexity to compute T is O(n2) since both M and N are sparse matrices. Our proposed algorithm only requires one round communication between C and S. Furthermore, C can detect the misbehavior of S with the probability 1. The computational complexity for the verification is still O(n2). This is due to the observation that it requires at most n2 multiplications to compute Ty for any (even totally dense) matrix T and any coefficient vector y. CONCLUSIONS
  • 10. In this paper, we propose an efficient outsource-secure algorithm for large-scale systems of linear equations, which are the most basic and expensive operations in many engineering disciplines. The proposedalgorithm is suitable for any nonsingular dense matrix even in the strongest adversarial model (a.k.a. fully malicious model). Furthermore, our algorithm is superior in both efficiency and checkability than the state-of-the-art algorithm . REFERENCES [1] M. J. Atallah and K. B. Frikken, “Securely outsourcing linear algebra computations,” in Proc. 5th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2010, pp. 48–59. [2] M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” in Proc. 19th Annu. ACM Symp. Theory Comput. (STOC), 1987, pp. 195– 203. [3] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure outsourcing of scientific computations,” Adv. Comput., vol. 54, pp. 215–272, Jan. 2002.
  • 11. [4] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J. Inf. Secur., vol. 4, no. 4, pp. 277–287, Oct. 2005. [5] M. Blanton, “Improved conditional E-payments,” in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 5037. Berlin, Germany: Springer-Verlag, 2008, pp. 188–206. [6] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of algebraic computations,” in Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST), Oct. 2008, pp. 240–245. [7] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, “Locally random reductions: Improvements and applications,” J. Cryptol., vol. 10, no. 1, pp. 17–36, Dec. 1997. [8] M. Benzi, “Preconditioning techniques for large linear systems: A survey,” J. Comput. Phys., vol. 182, no. 2, pp. 418–477, Nov. 2002. [9] M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, “Multi-prover interactive proofs: How to remove intractability assumptions,” in Proc. ACM Symp. Theory Comput. (STOC), 1988, pp. 113–131. [10] S. Benabbas, R. Gennaro, and Y. Vahlis, “Verifiable delegation of computation over large datasets,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6841. Berlin, Germany: Springer-Verlag, 2011, pp. 111– 131.
  • 12. [11] M. Blanton, M. J. Atallah, K. B. Frikken, and Q. Malluhi, “Secure and efficient outsourcing of sequence comparisons,” in Computer Security (Lecture Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012, pp. 505–522.