SlideShare a Scribd company logo
NEW ALGORITHMS FOR SECURE OUTSOURCING OF
LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS.
Abstract—With the rapid development in availability of cloud services, the
techniques for securely outsourcing the prohibitively expensive computations to
untrusted servers are getting more and more attentions in the scientific community.
In this paper, we investigate secure outsourcing for large-scale systems of linear
equations, which are the most popular problems in various engineering disciplines.
For the first time, we utilize the sparse matrix to propose a new secure outsourcing
algorithm of large-scale linear equations in the fully malicious model. Compared
ith the state-of-the-art algorithm, the proposed algorithm only requires (optimal)
one round communication (while the algorithm requires L rounds of interactions
between the client and cloud server, where L denotes the number of iteration in
iterative methods). Furthermore, the client in our algorithm can detect the
misbehavior of cloud server with the (optimal) probability 1. Therefore, our
proposed algorithm is superior in both efficiency and checkability. We also
provide the experimental evaluation that demonstrates the efficiency and
effectiveness of our algorithm.
EXISTING SYSTEM:
There are also plenty of research work on the securely outsourcing computations in
the past decades. Abadi first proved the impossibility of secure outsourcing an
exponential computation while locally doing only polynomial time work.
Therefore, it is meaningful only to consider outsourcing expensive polynomial
time computations. The theoretical computer science community has devoted
considerable attention to the problem of how to securely outsource different kinds
of expensive computations. Atallah et al. presented a framework for secure
outsourcing of scientific computations such as matrix multiplications and
quadrature. However, the solution used the disguise technique and thus allowed
leakage of private information. Atallah and Li investigated the problem of
computing the edit distance between two sequences and presented an efficient
protocol to securely outsource sequence comparisons to two servers. Recently,
Blanton et al. proposed a more efficient scheme for secure outsourcing sequence
comparisons. Benjamin and Atallah addressed the problem of secure outsourcing
for widely applicable linear algebra computations. However, the proposed
protocols required the expensive operations of homomorphic encryptions. Atallah
and Frikken further studied this problem and gave improved protocols based on
Shamir’s secret sharing. Some other works also used Shamir’s secret sharing to
perform homomorphic computations over cloud. Trivially, the protocols based on
secret sharing require at least two non-colluding servers. Wang et al. presented
efficient mechanisms for secure outsourcing of linear programming computations.
However, the solution requires matrix-matrix operations (cubic-time computational
burden). Recently, Wang et al. proposed a secure outsourcing mechanism for
solving large-scale systems of linear equations based on the iterative methods.
However, it requires multi-round interactions between the client and the cloud
server and thus is impractical.
PROPOSED SYSTEM:
In this paper, we propose a new secure outsourcing algorithm for large-scale
systems of linear equations Ax = b. Our proposed algorithm works with a single
cloud server and the server is assumed to be lazy, curious, and dishonest (fully
malicious model). Compared with the state-of-the-art algorithm , the proposed
algorithm is superior in both efficiency and checkability. Our contributions are
three folds: 1) For the first time, we utilize the sparse matrix to investigate securely
outsourcing for large-scale systems of linear equations. Our algorithm is suitable
for any nonsingular dense matrix A. However, in algorithm , A must be a strictly
diagonally dominant matrix for convergence. 2) Our proposed algorithm only
requires (optimal) 1 round communication between the client C and server S, while
algorithm requires L interactions due to the iterative method. 3) In the proposed
algorithm, the client C can detect the misbehavior of server S with the (optimal)
probability 1. Surprisingly, we use neither the complicated knowledge proof
techniques nor the boolean garbled circuits.
Module 1
Cloud Computing
Cloud computing refers to both the applications delivered as services over the
Internet and the hardware and systems software in the datacenters that provide
those services. There are four basic cloud delivery models, as outlined by NIST
(Badger et al., 2011), based on who provides the cloud services. The agencies may
employ one model or a combination of different models for efficient and optimized
delivery of applications and business services. These four delivery models are: (i)
Private cloud in which cloud services are provided solely for an organization and
are managed by the organization or a third party. These services may exist off-site.
(ii) Public cloud in which cloud services are available to the public and owned by
an organization selling the cloud services, for example, Amazon cloud service. (iii)
Community cloud in which cloud services are shared by several organizations for
supporting a specific community that has shared concerns (e.g., mission, security
requirements, policy, and compliance considerations). These services may be
managed by the organizations or a third party and may exist offsite. A Special case
of Community cloud is The Government or G-Cloud. This type of cloud
computing is provided by one or more agencies (service provider role), for use by
all, or most, government agencies (user role). (iv) Hybrid cloud which is a
composition of different cloud computing infrastructure (public, private or
community). An example for hybrid cloud is the data stored in private cloud of a
travel agency that is manipulated by a program running in the public cloud.
Module 2
Outsourcing
In business, outsourcing involves the contracting out of a business process to
another party (compare business process outsourcing). Outsourcing sometimes
involves transferring employees and assets from one firm to another, but not
always. Outsourcing is also the practice of handing over control of public
services to for-profit corporations. Outsourcing includes both foreign and domestic
contracting,[5] and sometimes includes offshoring (relocating a business function to
another country). Financial savings from lower international labor rates can
provide a major motivation for outsourcing/offshoring. The opposite of
outsourcing, insourcing, entails bringing processes handled by third-party firms in-
house, and is sometimes accomplished via vertical integration. However, a
business can provide a contract service to another business without necessarily
insourcing that business process. Two organizations may enter into a contractual
agreement involving an exchange of services and payments. Outsourcing is said to
help firms to perform well in their core competencies and mitigate shortage of skill
or expertise in the areas where they want to outsource. Outsourcing can offer
greater budget flexibility and control. Outsourcing lets organizations pay for only
the services they need, when they need them. It also reduces the need to hire and
train specialized staff, brings in fresh engineering expertise, and reduces capital
and operating expenses.
Module 3
Security Model
We consider an outsourcing computation architecture in which an honest while
resources-constrained client C wants to outsource an expensive computation task F
: D → M to a cloud server S, as illustrated in Fig. 1. Trivially, S is not fully trusted
by C. Without loss of generality, we say that (C, S) correctly implements F if F(x)
= CS(x) for ∀ x ∈ D, where CS means that C is given oracle access to S that
records all of its computation over time. Golle and Mironov [29] first introduced
the “lazy-buthonest” model for the inversion of one-way function class of
outsourcing computations. As a rational economic agent, S will try to minimize the
amount of work it needs to perform in order to retrieve the payment, while it will
honestly provide the computation results to C. It is reasonable to assume that S is
honest in this kind of outsourcing computation model. Actually, given an invalid
computation result, C can detect it immediately with probability 1 since the
verification of the result is equivalent to compute the one-way functions. Another
well-known model is the “honest-but-curious” model (originally called the semi-
honest model), firstly introduced by Goldreich et al.. In this model, both the parties
are guaranteed to properly execute a prescribed protocol, but, at the end of it, one
party can use its own view of the execution to infer about the other’s input.
Therefore, S will also honestly send the computation results to C. However, S will
try his best to retrieve some sensitive information such as the secret input/output of
C. Note that the computation results (i.e., the output of S) are different from the
output of C (i.e., the real computation aim of C). We can view S in the above two
models as a passive adversary. In many applications, we must consider the case
that S is an active attacker. For example, S can intentionally send a computationally
indistinguishable (invalid) result to C. That is, S may be not only lazy and curious,
but also dishonest. This is the strongest adversarial model, and we name it the
“fully malicious model.” It seems to be very difficult to design secure and efficient
outsourcing algorithms for generic computations in the full malicious model.
Hohenberger and Lysyanskaya first introduced a weaker model called “two
untrusted program model” for outsourcing exponentiations modulo a large prime.
In the two untrusted program model, there are two non-colluding servers S1 and S2
and we assume at most one of them is adversarial while we cannot know which
one. Besides, the misbehavior of the dishonest server can be detected with an
overwhelming probability. Recently, Canetti et al. introduced the so-called
“refereed delegation of computation model,” where the outsourcer delegates the
computation to n servers under the assumption that at least one of the servers is
honest. Trivially, two untrusted program model can be viewed as a special case of
refereed delegation of computation model for n = 2.
Module 4
New outsourcing algorithm of linear equations
A. High Description The problem for securely outsourcing large-scale systems of
linear equations can be formulated as follows: The client C seeks for the solution
to a large-scale system of linear equations Ax = b, where A ∈ Rn×n is a real
coefficient matrix with rank n, and b ∈ Rn is a coefficient vector. Due to the lack
of computing resources, C could be infeasible to carry out such expensive
computation as O(nρ ) for 2 < ρ ≤ 3 locally. Therefore, C will outsource the
computation workloads to cloud server S in a pay-per-use manner. In this paper,
we only focus on general nonsingular dense matrices A, while our proposed
solution is also applicable to sparse matrices. While for the case of (extremely)
sparse matrices, C may be able to compute the solution of linear equations
efficiently with other methods. In this section, we propose a new algorithm LE for
securely outsourcing large-scale systems of linear equations in the fully malicious
model. That is, the computation is delegated to only one server who may be lazy,
curious, and dishonest. Our main trick is that we use two random sparse matrices
to hide A. More precisely, C chooses two random sparse matrices M,N ∈ Rn×n
and computes T = MAN. Due to the random blinding technique, we can prove that
the proposed outsourcing algorithm satisfies the privacy for A, b and the solution
x. Besides, it does not require any special encryption techniques with the
homomorphic property. We argue that the complexity to compute T is O(n2) since
both M and N are sparse matrices. Our proposed algorithm only requires one round
communication between C and S. Furthermore, C can detect the misbehavior of S
with the probability 1. The computational complexity for the verification is still
O(n2). This is due to the observation that it requires at most n2 multiplications to
compute Ty for any (even totally dense) matrix T and any coefficient vector y.
CONCLUSIONS
In this paper, we propose an efficient outsource-secure algorithm for large-scale
systems of linear equations, which are the most basic and expensive operations in
many engineering disciplines. The proposedalgorithm is suitable for
any nonsingular dense matrix even in the strongest adversarial model (a.k.a. fully
malicious model). Furthermore, our algorithm is superior in both efficiency and
checkability than the state-of-the-art algorithm .
REFERENCES
[1] M. J. Atallah and K. B. Frikken, “Securely outsourcing linear algebra
computations,” in Proc. 5th ACM Symp. Inf., Comput. Commun. Secur.
(ASIACCS), 2010, pp. 48–59.
[2] M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an
oracle,” in Proc. 19th Annu. ACM Symp. Theory Comput. (STOC), 1987, pp. 195–
203.
[3] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure
outsourcing of scientific computations,” Adv. Comput., vol. 54, pp. 215–272, Jan.
2002.
[4] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J.
Inf. Secur., vol. 4, no. 4, pp. 277–287, Oct. 2005.
[5] M. Blanton, “Improved conditional E-payments,” in Applied Cryptography and
Network Security (Lecture Notes in Computer Science), vol. 5037. Berlin,
Germany: Springer-Verlag, 2008, pp. 188–206.
[6] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of
algebraic computations,” in Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST),
Oct. 2008, pp. 240–245.
[7] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, “Locally random
reductions: Improvements and applications,” J. Cryptol., vol. 10, no. 1, pp. 17–36,
Dec. 1997.
[8] M. Benzi, “Preconditioning techniques for large linear systems: A survey,” J.
Comput. Phys., vol. 182, no. 2, pp. 418–477, Nov. 2002.
[9] M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, “Multi-prover
interactive proofs: How to remove intractability assumptions,” in Proc. ACM
Symp. Theory Comput. (STOC), 1988, pp. 113–131.
[10] S. Benabbas, R. Gennaro, and Y. Vahlis, “Verifiable delegation of
computation over large datasets,” in Advances in Cryptology (Lecture Notes in
Computer Science), vol. 6841. Berlin, Germany: Springer-Verlag, 2011, pp. 111–
131.
[11] M. Blanton, M. J. Atallah, K. B. Frikken, and Q. Malluhi, “Secure and
efficient outsourcing of sequence comparisons,” in Computer Security (Lecture
Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012,
pp. 505–522.

More Related Content

What's hot

Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering Algorithm
IOSR Journals
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
tsysglobalsolutions
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DA
Susanne Braun
 
J41046368
J41046368J41046368
J41046368
IJERA Editor
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
Editor IJCATR
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2
Abdullaziz Tagawy
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
IJERA Editor
 
Angel
AngelAngel
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : NotesTuring Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
Subhajit Sahu
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregatorsIAEME Publication
 
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDMCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
ijccsa
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs
Waqas Nawaz
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
IRJET Journal
 
Taking r to its limits. 70+ tips
Taking r to its limits. 70+ tipsTaking r to its limits. 70+ tips
Taking r to its limits. 70+ tips
Ilya Shutov
 
New emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demandNew emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demand
Sebastian Contreras
 
Deep Learning for Time Series Data
Deep Learning for Time Series DataDeep Learning for Time Series Data
Deep Learning for Time Series Data
Arun Kejariwal
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 

What's hot (17)

Performance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering AlgorithmPerformance Analysis of Different Clustering Algorithm
Performance Analysis of Different Clustering Algorithm
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Eventual Consistency - JUG DA
Eventual Consistency - JUG DAEventual Consistency - JUG DA
Eventual Consistency - JUG DA
 
J41046368
J41046368J41046368
J41046368
 
Journal paper 1
Journal paper 1Journal paper 1
Journal paper 1
 
Service performance and analysis in cloud computing extened 2
Service performance and analysis in cloud computing   extened 2Service performance and analysis in cloud computing   extened 2
Service performance and analysis in cloud computing extened 2
 
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
 
Angel
AngelAngel
Angel
 
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : NotesTuring Lecture - The Computer Science of Concurrency - The Early Years : Notes
Turing Lecture - The Computer Science of Concurrency - The Early Years : Notes
 
Query evaluation over network of data aggregators
Query evaluation over network of data aggregatorsQuery evaluation over network of data aggregators
Query evaluation over network of data aggregators
 
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDMCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUD
 
(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs(Icca 2014) shortest path analysis in social graphs
(Icca 2014) shortest path analysis in social graphs
 
A Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud ComputingA Review: Metaheuristic Technique in Cloud Computing
A Review: Metaheuristic Technique in Cloud Computing
 
Taking r to its limits. 70+ tips
Taking r to its limits. 70+ tipsTaking r to its limits. 70+ tips
Taking r to its limits. 70+ tips
 
New emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demandNew emulation based approach for probabilistic seismic demand
New emulation based approach for probabilistic seismic demand
 
Deep Learning for Time Series Data
Deep Learning for Time Series DataDeep Learning for Time Series Data
Deep Learning for Time Series Data
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 

Viewers also liked

Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
CloudTechnologies
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
Nexgen Technology
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
Pratik Poddar
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
Nexgen Technology
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
Pvrtechnologies Nellore
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
Finalyearprojects Toall
 

Viewers also liked (7)

Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
IDENTITY-BASED ENCRYPTION WITH OUTSOURCED REVOCATION IN CLOUD COMPUTING
 
Identity Based Encryption
Identity Based EncryptionIdentity Based Encryption
Identity Based Encryption
 
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
IDENTITY-BASED PROXY-ORIENTED DATA UPLOADING AND REMOTE DATA INTEGRITY CHECKI...
 
Identity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computingIdentity based encryption with outsourced revocation in cloud computing
Identity based encryption with outsourced revocation in cloud computing
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
IEEE Presentation
IEEE PresentationIEEE Presentation
IEEE Presentation
 

Similar to New algorithms for secure outsourcing of

Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
IJMER
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcing
IMPULSE_TECHNOLOGY
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Muthu Samy
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
IOSR Journals
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
SANTHOSHKUMARKL1
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONShakas Technologies
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
nexgentechnology
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
nexgentech15
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
nexgentechnology
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
Nexgen Technology
 
D04573033
D04573033D04573033
D04573033
IOSR-JEN
 
Assignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced DatabasesAssignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced Databases
Nicole Adams
 
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB... AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
Nexgen Technology
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Editor IJCATR
 

Similar to New algorithms for secure outsourcing of (20)

Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud ComputingSecure Outsourcing Mechanism for Linear Programming in Cloud Computing
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
 
Harnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcingHarnessing the cloud for securely outsourcing
Harnessing the cloud for securely outsourcing
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear ProgrammingData Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATIONSPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial InterpolationSpace-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
SPACE-EFFICIENT VERIFIABLE SECRET SHARING USING POLYNOMIAL INTERPOLATION
 
D04573033
D04573033D04573033
D04573033
 
Assignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced DatabasesAssignment As A Location-Based Service In Outsourced Databases
Assignment As A Location-Based Service In Outsourced Databases
 
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB... AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
AN EFFICIENT ALGORITHM FOR THE BURSTING OF SERVICE-BASED APPLICATIONS IN HYB...
 
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
Providing a multi-objective scheduling tasks by Using PSO algorithm for cost ...
 

More from nexgentech15

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in a
nexgentech15
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolution
nexgentech15
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
nexgentech15
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
nexgentech15
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
nexgentech15
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
nexgentech15
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
nexgentech15
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
nexgentech15
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
nexgentech15
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
nexgentech15
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
nexgentech15
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
nexgentech15
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system
nexgentech15
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limited
nexgentech15
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
nexgentech15
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
nexgentech15
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
nexgentech15
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
nexgentech15
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
nexgentech15
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
nexgentech15
 

More from nexgentech15 (20)

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in a
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolution
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limited
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
 
A computational dynamic trust model
A computational dynamic trust modelA computational dynamic trust model
A computational dynamic trust model
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 

Recently uploaded

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 

Recently uploaded (20)

MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 

New algorithms for secure outsourcing of

  • 1. NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUATIONS. Abstract—With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attentions in the scientific community. In this paper, we investigate secure outsourcing for large-scale systems of linear equations, which are the most popular problems in various engineering disciplines. For the first time, we utilize the sparse matrix to propose a new secure outsourcing algorithm of large-scale linear equations in the fully malicious model. Compared ith the state-of-the-art algorithm, the proposed algorithm only requires (optimal) one round communication (while the algorithm requires L rounds of interactions between the client and cloud server, where L denotes the number of iteration in iterative methods). Furthermore, the client in our algorithm can detect the misbehavior of cloud server with the (optimal) probability 1. Therefore, our proposed algorithm is superior in both efficiency and checkability. We also provide the experimental evaluation that demonstrates the efficiency and effectiveness of our algorithm.
  • 2. EXISTING SYSTEM: There are also plenty of research work on the securely outsourcing computations in the past decades. Abadi first proved the impossibility of secure outsourcing an exponential computation while locally doing only polynomial time work. Therefore, it is meaningful only to consider outsourcing expensive polynomial time computations. The theoretical computer science community has devoted considerable attention to the problem of how to securely outsource different kinds of expensive computations. Atallah et al. presented a framework for secure outsourcing of scientific computations such as matrix multiplications and quadrature. However, the solution used the disguise technique and thus allowed leakage of private information. Atallah and Li investigated the problem of computing the edit distance between two sequences and presented an efficient protocol to securely outsource sequence comparisons to two servers. Recently, Blanton et al. proposed a more efficient scheme for secure outsourcing sequence comparisons. Benjamin and Atallah addressed the problem of secure outsourcing for widely applicable linear algebra computations. However, the proposed protocols required the expensive operations of homomorphic encryptions. Atallah and Frikken further studied this problem and gave improved protocols based on Shamir’s secret sharing. Some other works also used Shamir’s secret sharing to
  • 3. perform homomorphic computations over cloud. Trivially, the protocols based on secret sharing require at least two non-colluding servers. Wang et al. presented efficient mechanisms for secure outsourcing of linear programming computations. However, the solution requires matrix-matrix operations (cubic-time computational burden). Recently, Wang et al. proposed a secure outsourcing mechanism for solving large-scale systems of linear equations based on the iterative methods. However, it requires multi-round interactions between the client and the cloud server and thus is impractical. PROPOSED SYSTEM: In this paper, we propose a new secure outsourcing algorithm for large-scale systems of linear equations Ax = b. Our proposed algorithm works with a single cloud server and the server is assumed to be lazy, curious, and dishonest (fully malicious model). Compared with the state-of-the-art algorithm , the proposed algorithm is superior in both efficiency and checkability. Our contributions are three folds: 1) For the first time, we utilize the sparse matrix to investigate securely outsourcing for large-scale systems of linear equations. Our algorithm is suitable for any nonsingular dense matrix A. However, in algorithm , A must be a strictly diagonally dominant matrix for convergence. 2) Our proposed algorithm only requires (optimal) 1 round communication between the client C and server S, while
  • 4. algorithm requires L interactions due to the iterative method. 3) In the proposed algorithm, the client C can detect the misbehavior of server S with the (optimal) probability 1. Surprisingly, we use neither the complicated knowledge proof techniques nor the boolean garbled circuits. Module 1 Cloud Computing Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the datacenters that provide those services. There are four basic cloud delivery models, as outlined by NIST (Badger et al., 2011), based on who provides the cloud services. The agencies may employ one model or a combination of different models for efficient and optimized delivery of applications and business services. These four delivery models are: (i) Private cloud in which cloud services are provided solely for an organization and are managed by the organization or a third party. These services may exist off-site. (ii) Public cloud in which cloud services are available to the public and owned by an organization selling the cloud services, for example, Amazon cloud service. (iii) Community cloud in which cloud services are shared by several organizations for supporting a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). These services may be
  • 5. managed by the organizations or a third party and may exist offsite. A Special case of Community cloud is The Government or G-Cloud. This type of cloud computing is provided by one or more agencies (service provider role), for use by all, or most, government agencies (user role). (iv) Hybrid cloud which is a composition of different cloud computing infrastructure (public, private or community). An example for hybrid cloud is the data stored in private cloud of a travel agency that is manipulated by a program running in the public cloud. Module 2 Outsourcing In business, outsourcing involves the contracting out of a business process to another party (compare business process outsourcing). Outsourcing sometimes involves transferring employees and assets from one firm to another, but not always. Outsourcing is also the practice of handing over control of public services to for-profit corporations. Outsourcing includes both foreign and domestic contracting,[5] and sometimes includes offshoring (relocating a business function to another country). Financial savings from lower international labor rates can provide a major motivation for outsourcing/offshoring. The opposite of outsourcing, insourcing, entails bringing processes handled by third-party firms in- house, and is sometimes accomplished via vertical integration. However, a
  • 6. business can provide a contract service to another business without necessarily insourcing that business process. Two organizations may enter into a contractual agreement involving an exchange of services and payments. Outsourcing is said to help firms to perform well in their core competencies and mitigate shortage of skill or expertise in the areas where they want to outsource. Outsourcing can offer greater budget flexibility and control. Outsourcing lets organizations pay for only the services they need, when they need them. It also reduces the need to hire and train specialized staff, brings in fresh engineering expertise, and reduces capital and operating expenses. Module 3 Security Model We consider an outsourcing computation architecture in which an honest while resources-constrained client C wants to outsource an expensive computation task F : D → M to a cloud server S, as illustrated in Fig. 1. Trivially, S is not fully trusted by C. Without loss of generality, we say that (C, S) correctly implements F if F(x) = CS(x) for ∀ x ∈ D, where CS means that C is given oracle access to S that records all of its computation over time. Golle and Mironov [29] first introduced the “lazy-buthonest” model for the inversion of one-way function class of
  • 7. outsourcing computations. As a rational economic agent, S will try to minimize the amount of work it needs to perform in order to retrieve the payment, while it will honestly provide the computation results to C. It is reasonable to assume that S is honest in this kind of outsourcing computation model. Actually, given an invalid computation result, C can detect it immediately with probability 1 since the verification of the result is equivalent to compute the one-way functions. Another well-known model is the “honest-but-curious” model (originally called the semi- honest model), firstly introduced by Goldreich et al.. In this model, both the parties are guaranteed to properly execute a prescribed protocol, but, at the end of it, one party can use its own view of the execution to infer about the other’s input. Therefore, S will also honestly send the computation results to C. However, S will try his best to retrieve some sensitive information such as the secret input/output of C. Note that the computation results (i.e., the output of S) are different from the output of C (i.e., the real computation aim of C). We can view S in the above two models as a passive adversary. In many applications, we must consider the case that S is an active attacker. For example, S can intentionally send a computationally indistinguishable (invalid) result to C. That is, S may be not only lazy and curious, but also dishonest. This is the strongest adversarial model, and we name it the “fully malicious model.” It seems to be very difficult to design secure and efficient outsourcing algorithms for generic computations in the full malicious model.
  • 8. Hohenberger and Lysyanskaya first introduced a weaker model called “two untrusted program model” for outsourcing exponentiations modulo a large prime. In the two untrusted program model, there are two non-colluding servers S1 and S2 and we assume at most one of them is adversarial while we cannot know which one. Besides, the misbehavior of the dishonest server can be detected with an overwhelming probability. Recently, Canetti et al. introduced the so-called “refereed delegation of computation model,” where the outsourcer delegates the computation to n servers under the assumption that at least one of the servers is honest. Trivially, two untrusted program model can be viewed as a special case of refereed delegation of computation model for n = 2. Module 4 New outsourcing algorithm of linear equations A. High Description The problem for securely outsourcing large-scale systems of linear equations can be formulated as follows: The client C seeks for the solution to a large-scale system of linear equations Ax = b, where A ∈ Rn×n is a real coefficient matrix with rank n, and b ∈ Rn is a coefficient vector. Due to the lack of computing resources, C could be infeasible to carry out such expensive computation as O(nρ ) for 2 < ρ ≤ 3 locally. Therefore, C will outsource the
  • 9. computation workloads to cloud server S in a pay-per-use manner. In this paper, we only focus on general nonsingular dense matrices A, while our proposed solution is also applicable to sparse matrices. While for the case of (extremely) sparse matrices, C may be able to compute the solution of linear equations efficiently with other methods. In this section, we propose a new algorithm LE for securely outsourcing large-scale systems of linear equations in the fully malicious model. That is, the computation is delegated to only one server who may be lazy, curious, and dishonest. Our main trick is that we use two random sparse matrices to hide A. More precisely, C chooses two random sparse matrices M,N ∈ Rn×n and computes T = MAN. Due to the random blinding technique, we can prove that the proposed outsourcing algorithm satisfies the privacy for A, b and the solution x. Besides, it does not require any special encryption techniques with the homomorphic property. We argue that the complexity to compute T is O(n2) since both M and N are sparse matrices. Our proposed algorithm only requires one round communication between C and S. Furthermore, C can detect the misbehavior of S with the probability 1. The computational complexity for the verification is still O(n2). This is due to the observation that it requires at most n2 multiplications to compute Ty for any (even totally dense) matrix T and any coefficient vector y. CONCLUSIONS
  • 10. In this paper, we propose an efficient outsource-secure algorithm for large-scale systems of linear equations, which are the most basic and expensive operations in many engineering disciplines. The proposedalgorithm is suitable for any nonsingular dense matrix even in the strongest adversarial model (a.k.a. fully malicious model). Furthermore, our algorithm is superior in both efficiency and checkability than the state-of-the-art algorithm . REFERENCES [1] M. J. Atallah and K. B. Frikken, “Securely outsourcing linear algebra computations,” in Proc. 5th ACM Symp. Inf., Comput. Commun. Secur. (ASIACCS), 2010, pp. 48–59. [2] M. Abadi, J. Feigenbaum, and J. Kilian, “On hiding information from an oracle,” in Proc. 19th Annu. ACM Symp. Theory Comput. (STOC), 1987, pp. 195– 203. [3] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, “Secure outsourcing of scientific computations,” Adv. Comput., vol. 54, pp. 215–272, Jan. 2002.
  • 11. [4] M. J. Atallah and J. Li, “Secure outsourcing of sequence comparisons,” Int. J. Inf. Secur., vol. 4, no. 4, pp. 277–287, Oct. 2005. [5] M. Blanton, “Improved conditional E-payments,” in Applied Cryptography and Network Security (Lecture Notes in Computer Science), vol. 5037. Berlin, Germany: Springer-Verlag, 2008, pp. 188–206. [6] D. Benjamin and M. J. Atallah, “Private and cheating-free outsourcing of algebraic computations,” in Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST), Oct. 2008, pp. 240–245. [7] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, “Locally random reductions: Improvements and applications,” J. Cryptol., vol. 10, no. 1, pp. 17–36, Dec. 1997. [8] M. Benzi, “Preconditioning techniques for large linear systems: A survey,” J. Comput. Phys., vol. 182, no. 2, pp. 418–477, Nov. 2002. [9] M. Ben-Or, S. Goldwasser, J. Kilian, and A. Wigderson, “Multi-prover interactive proofs: How to remove intractability assumptions,” in Proc. ACM Symp. Theory Comput. (STOC), 1988, pp. 113–131. [10] S. Benabbas, R. Gennaro, and Y. Vahlis, “Verifiable delegation of computation over large datasets,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6841. Berlin, Germany: Springer-Verlag, 2011, pp. 111– 131.
  • 12. [11] M. Blanton, M. J. Atallah, K. B. Frikken, and Q. Malluhi, “Secure and efficient outsourcing of sequence comparisons,” in Computer Security (Lecture Notes in Computer Science), vol. 7459. Berlin, Germany: Springer-Verlag, 2012, pp. 505–522.