SlideShare a Scribd company logo
SECURE AND PRACTICAL
OUTSOURCING OF LINEAR
PROGRAMMING IN CLOUD COMPUTING
CONTENTS
INTRODUCTION
WHAT IS CLOUD COMPUTING ?
WHY WE NEED CLOUD
COMPUTING ?
WHAT IS SECURITY ?
WHY WE NEED SECURITY IN
CLOUD COMPUTING ?
LINEAR PROGRAMMING
WHY LINEAR PROGRAMMING IN
CLOUD COMPUTING ?
EXISTING SYSTEM
DISADVANTAGES
PROPOSED SYSTEM
ADVANTAGES
MECHANISM
HARDWARE REQUIREMENTS
SOFTWARE REQUIREMENTS
IMPLEMENTATIONS
SAMPLE SCREENS
INTRODUCTION
✦Cloud computing enables customers with limited computational resources to
outsource their large computation workloads to the cloud, and economically
enjoy the massive computational power, bandwidth, storage, and even
appropriate software that can be shared in a pay-‐per-‐use manner.
✦Security is the primary obstacle that prevents the wide adoption of this
promising computing model, especially for customers when their confidential
data are consumed and produced during the computation.
✦Treating the cloud as an intrinsically insecure computing platform from the
viewpoint of the cloud customers.
✦The resulting flexibility allows us to explore appropriate security/efficiency trade off
via higher level abstraction of LP(Linear Programming) computations than the
general circuit representation.
WHAT IS CLOUD?
The term Cloud refers to a Network or Internet.
In other words, we can say that Cloud is
something,
which is present at remote location.
Cloud can provide services over network, i.e.,
on public networks or on private networks, i.e.,
WAN, LAN and so on .
Applications such as e-mail, web conferencing,
customer relationship management (CRM),
all run in cloud.
WHAT IS CLOUD
COMPUTING?
Cloud Computing provides us a means
by which we can access the applications
as utilities, over the Internet. It allows us
to create, configure, and customize
applications online.
Cloud computing provides a variety of
computing resources , from servers and
storage to enterprise applications such as
email, security, backup/DR, voice, all
delivered over the Internet
The Cloud delivers a hosting environment that is
Flexible,
Immediate,
Scalable,
Secure.
Available while saving corporations money, time and
resources.
With Cloud Computing users can access database
resources via the internet from anywhere for as long
as they need without worrying about any
maintenance or management of actual resources.
BASIC CONCEPTS
There are certain services and models
working behind the scene making the
cloud computing feasible and accessible
to end users. Following are the working
models for cloud computing:
1. DEPLOYMENT MODELS
2. SERVICE MODELS
DEPLOYMENT MODELS
Deployment models define
the type of access to the
cloud, i.e., how the cloud is
located? Cloud can have
any of the four types of
access: Public, Private,
Hybrid and Community.
PUBLICCLOUD The Public Cloud allows systems and services to
be easily accessible to the general public. Public cloud may
be less secure because of its openness, e.g., e-mail.
PRIVATECLOUDThe Private Cloud allows systems and services
to be accessible within an organization. It offers increased
security because of its private nature.
COMMUNITYCLOUD The Community Cloud allows systems and
services to be accessible by group of organizations.
HYBRIDCLOUD The Hybrid Cloud is mixture of public and
private cloud. However, the critical activities are performed
using private cloud while the non-critical activities are
performed using public cloud.
SERVICE MODELS
Service Models are the reference
models on which the Cloud
Computing is based. These can be
categorized into three basic service
models as listed below:
1.Infrastructureasa Service(IaaS)
2. Platformasa Service(PaaS)
3. Softwareasa Service(SaaS)
Infrastructure as a Service (IaaS)
IaaS is the delivery of technology infrastructure as
an on demand scalable service.
IaaS provides access to fundamental resources
such as physical machines, virtual machines,
virtual storage, etc.
• Usually billed based on usage
• Usually multi tenant virtualized environment
• Can be coupled with Managed Services for OS
and application support
IaaS Examples
Platformas a Service (PaaS)
PaaS provides the runtime environment for
applications, development & deployment tools,
etc.
PaaS provides all of the facilities required to
support the complete life cycle of building and
delivering web applications and services entirely
from the Internet.
Typically applications must be developed with a
particular platform in mind
• Multi tenant environments
• Highly scalable multi tier architecture
PaaS Examples
Software as a Service (SaaS)
SaaS model allows to use software
applications as a service to end users.
SaaS is a software delivery methodology
that provides licensed multi-tenant
access to software and its functions
remotely as a Web-based service.
Usually billed based on usage
• Usually multi tenant environment
• Highly scalable architecture
SaaS Examples
Simplifying CloudComputing
Complex processes are integrated into cloud.
LINEAR PROGRAMMING
Linear programming is a widely used mathematical modeling
technique to determine the optimum allocation of scarce
resources among competing demands. Resources typically
include raw materials, manpower, machinery, time, money and
space.
The technique is very powerful and found especially useful
because of its application to many different types of real business
problems in areas like finance, production, sales and distribution,
personnel, marketing and many more areas of management.
As its name implies, the linear programming model consists of
linear objectives and linear constraints, which means that the
variables in a model have a proportionate relationship. For
example, an increase in manpower resource will result in an
increase in work output.
WHY CLOUD COMPUTING ?
✦Cloud Computing is very much useful to a smaller
companies to generate similar savings and
capabilities on its own.
✦Many of the issues blamed on the cloud in large
enterprises - security, integration, compliance and
so on - often cause fewer problems in small
companies that can't properly deal with them
anyway.
MAIN REASONS WHY CLOUD COMPUTING IS BETTER FOR SMALL
BUSINESSES
ECONOMIES OF SCALE
ENTERPRISE CLASS FUNCTIONALITY
MONEY MATTERS
INFRASTRUCTURE APPLICATIONS
SECURITY PROBLEM
COMPLIANCE
RELIABILITY
1.Economies of scale: This one's obvious. The larger
the company, the easier it can generate economies of
scale on its own. Small companies, by definition, have
more limited resources. Anything that can give them
access to scale in purchasing and pricing is a big win!
2.Enterprise-class functionality. Big companies have
the heft to create the custom functionality they need.
Small companies simply don't have the resources to do
that. In the cloud, though, they can leverage
development, maintenance and upgrades across many,
many small businesses... And, increasingly, consumers
as well.
3.Money Matters. Startups and small companies are
often under capitalized and pay-as-you-go cloud
computing solutions typically don't require lots of upfront
cash. Even if they don't end up saving much as the
monthly fees add up over the long run, avoiding capital
expenditures can be a make-or-break issue for cash-
strapped small businesses.
Reasons why cloudcomputing
4.Infrastructure vs. Applications. For the enterprise, cloud
computing often means complex Infrastructure as a Service
(IaaS) projects that have to be installed and integrated into a
company's existing systems. For smaller companies, cloud
computing often means complete cloud-based Software as a
Service (SaaS) applications and application suites. No IT
required.
5.Security Problems. I'm not saying security isn't important
to small businesses (though many don't take it as seriously
as they should). I'm saying that while security in the cloud
may still be shaky by enterprise standards, it's almost always
far better than what small businesses are able to provide for
themselves.
6.Compliance. Because you don't necessarily know
where your data is stored in the cloud, IaaS can cause
confusion as to whether it complies with local, national
and international regulations. That's a huge issue for
multinational corporations, less so for most small
businesses.
7.Reliability. The cloud is more reliable than most
people think. When widely used cloud services and
applications have outages, it makes national news.
When an individual company - large or small - has a
similar problem, they work hard to make sure you never
even hear about it. The bottom line, though, is that even
accounting for network connectivity hiccups, the cloud
is probably a lot more reliable than what small
businesses can afford to provide for themselves.
WHAT IS SECURITY ?
Security is the degree of resistance to, or protection
from, harm. It applies to any vulnerable and
valuable asset, such as a person, community,
nation, or organisation.
✦Cryptography
✦Redundancy
✦Disposal
✦Transfer security
✦Firewalling
What exactly firewall does is:
It isolates the virtual machines . Brilliantly
filters addresses and ports
 Prevents Denial-of-Service (DoS)
Detects external security assessment
measures
Whysecurity is needin cloud computing?
"The Notorious Nine," the top nine cloud
computing threats has been identified by the
CSA (Cloud Security Alliance).The report reflects
the current consensus among industry experts
surveyed by CSA, focusing on threats specifically
related to the shared, on-demand nature of cloud
computing.
The top most threats to the cloud computing are :
✦Data Breaches
✦Data Loss
✦Account or Service Traffic Hijacking
✦Insecure Interfaces and APIs
✦Denial of service
✦Malicious insiders
✦Abuse,
✦Insufficient due diligence
Outsourcing computation to the commercial
public cloud is also depriving customers’ direct
control over the systems that consume and
produce their data during the computation, which
inevitably brings in new security concerns and
challenges towards this promising computing
model.Theoutsourced computation
workloads often contain sensitive
information, such as
✦The business financial records,
✦Proprietary research data,
✦Personally identifiable health information
etc.
EXISTING SYSTEM
✦ End to end data confidentiality
✦unauthorised information leakage
✦sensitive data have to be encrypted before
outsourcing
How ever,Ordinary data encryption techniques in
essence prevent cloud from performing any meaningful
operation of the underlying plaintext data making the
computation over encrypted data a very hard problem.
There are huge financial incentives for the cloud to be
“lazy” if the customers cannot tell
✦The correctness of the output
✦Possible software bugs
✦Hardware failures,
even outsider attacks might also affect the quality of the
computed results.
DISADVANTAGES
PROPOSED SYSTEM
Our Linear Programming outsourcing
scheme which
provides a complete outsourcing solution for not
only the privacy protection of problem
input/output, but also its efficient result
checking. We start from a secure LP outsourcing
design framework.
ADVANTAGES
✦Optimal solution using LP problems.
✦Better security on both uploading and
downloading.
✦Integrating mathematical implementation
in encryption
Software and
Hardware Specifications
SOFTWARE SPECIFICATION:
Operating
System
: Windows XP,7,8
Software
Protocol
IDE
: JAVA(JDK 1.6.0)
: TCP/IP
: NetBeans,Xampp
12
HARDWARE SPECIFICATION:
Processor
Speed
RAM
Hard Disk
General
:Pentium-IV, dual core
:1.1GHz,3.4GHz
:512MB,1GB
:40GB,320GB
:Keyboard,Monitor,Mouse
Mechanism Design Framework
These four algorithms are summarised below :
•KeyGen(1k ) → {K }. This is a randomized key generation algorithm which takes a system security
parameter k, and returns a secret key K that is used later by customer to encrypt the target LP
problem.
• ProbEnc(K, Φ) → {ΦK }. This algorithm encrypts the input tuple Φinto ΦK with the secret key
K. According to problem transformation, the encrypted input ΦK has the same form as Φ, and thus
defines the problem to be solved in the cloud.
•ProofGen(ΦK ) → {(y, Γ)}. This algorithm augments a generic solver that solves the problem ΦK to
produce both the output y and a proof Γ. The output y later decrypts to x, and Γ is used later by the
customer to verify the correctness of y or x .
•Result Dec (K, Φ, y, Γ) → {x, ⊥}. This algorithm may choose to verify either y or x via the proof Γ. In
any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥
when the validation fails, indicating the cloud server was not performing the computation faithfully.
Finding File
Encrypt the
File
Send to Cloud
Server
Decrypt the File
Give Solution / Verification
key Response to Customer
Architecture of secure outsourcing linear programming problems
in Cloud Computing.
IMPLEMENTATION
✦ Finding File
✦Encrypt the File
✦Send to Cloud Server
✦Decrypt the File
✦Give Solution /
Verification key
✦Response to Customer
Finding File & Encrypt the File
★ADMIN LOGIN
★IMAGE
UPLOAD
Send to Cloud Server & Decrypt theFile
★CLIENT DETAILS
★FILE ENCRYPTION &
DECRYPTION
Give Solution / Verification key
Linear programming process where the
optimal solution gets solved and verified
★USER LOGIN
★FILE SEARCH
Response toCustomer
★IMAGE
SEARCHENGINE
★FILE DOWNLOAD
CONCLUSION
✦The problem of securely outsourcing LP computations in cloud computing,
and provide such a practical mechanism design which fulfils input/output
privacy, cheating resilience, and efficiency.
✦By explicitly decomposing LP computation outsourcing into public LP solvers
and private data, our mechanism design is able to explore appropriate
security/efficiency trade offs via higher level LP computation than the
general circuit representation.
✦This develops problem transformation techniques that enable customers to
secretly transform the original LP into some arbitrary one while protecting
sensitive input/ output information.
REFERENCES
http://www.chennaisunday.com/Java%202011%20Base%2
0Paper/Secure%20and%20Practical%20Outsourcing%20of%
20Linear%20Programming%20in%20Cloud%20Computing.p
df
https://www.youtube.com/watch?v=N4p0vfMMst8
https://en.wikipedia.org/wiki/Linear_programming
https://www.google.co.in/search?q=cloud+computing+wikip
edia&oq=cloud+computing+wkiped&gs_l=psy-
ab.3.0.0i13k1l3j0i22i30k1.293486.328770.0.331770.70.32.10
.0.0.0.459.5863.0j17j5j2j2.26.0....0...1.1.64.psy-
ab..36.34.5637...0j33i21k1j0i131i46k1j46i131k1j0i131k1j0i13i
30k1.cE7DXnpoX28
https://www.youtube.com/watch?v=N4p0vfMMst8
http://www.cloudsecurityalliance.org
THANKYOU

More Related Content

What's hot

Zimory White Paper: The Cloud's Slow European Take-off
Zimory White Paper: The Cloud's Slow European Take-offZimory White Paper: The Cloud's Slow European Take-off
Zimory White Paper: The Cloud's Slow European Take-off
Zimory
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
Ajay844
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & ratingAmit Puri
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
Faimin Khan
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
Nazneen Sheikh
 
Agenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembraAgenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembra
Zeleno d.o.o.
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
elysiumtechnologies
 
Zimory White Paper: Challenges Implementing an IaaS Cloud Exchange
Zimory White Paper: Challenges Implementing an IaaS Cloud ExchangeZimory White Paper: Challenges Implementing an IaaS Cloud Exchange
Zimory White Paper: Challenges Implementing an IaaS Cloud Exchange
Zimory
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
Sudsanguan Ngamsuriyaroj
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
Awesome Developers UG
 
Cloud_Network_Whitepaper_1123_LowRes
Cloud_Network_Whitepaper_1123_LowResCloud_Network_Whitepaper_1123_LowRes
Cloud_Network_Whitepaper_1123_LowResDarren Szukalski
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
Michael Yung
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsMourad ZEROUKHI
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...HCL Infosystems
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
Sonovate
 
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...Maria Spínola
 

What's hot (18)

Zimory White Paper: The Cloud's Slow European Take-off
Zimory White Paper: The Cloud's Slow European Take-offZimory White Paper: The Cloud's Slow European Take-off
Zimory White Paper: The Cloud's Slow European Take-off
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Public cloud: A Review
Public cloud: A ReviewPublic cloud: A Review
Public cloud: A Review
 
Vendor classification & rating
Vendor classification & ratingVendor classification & rating
Vendor classification & rating
 
The Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research PaperThe Nist definition of cloud computing cloud computing Research Paper
The Nist definition of cloud computing cloud computing Research Paper
 
Cloud computing – an emerging paradigm
Cloud computing – an emerging paradigmCloud computing – an emerging paradigm
Cloud computing – an emerging paradigm
 
Agenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembraAgenda EuroCloud dogodka 14.septembra
Agenda EuroCloud dogodka 14.septembra
 
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014  - Cloud Computing Project Title and AbstractFinal Year IEEE Project 2013-2014  - Cloud Computing Project Title and Abstract
Final Year IEEE Project 2013-2014 - Cloud Computing Project Title and Abstract
 
Zimory White Paper: Challenges Implementing an IaaS Cloud Exchange
Zimory White Paper: Challenges Implementing an IaaS Cloud ExchangeZimory White Paper: Challenges Implementing an IaaS Cloud Exchange
Zimory White Paper: Challenges Implementing an IaaS Cloud Exchange
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud security and adoption
Cloud security and adoptionCloud security and adoption
Cloud security and adoption
 
How to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud ComputingHow to Cloud - The Ultimate Guide to Cloud Computing
How to Cloud - The Ultimate Guide to Cloud Computing
 
Cloud_Network_Whitepaper_1123_LowRes
Cloud_Network_Whitepaper_1123_LowResCloud_Network_Whitepaper_1123_LowRes
Cloud_Network_Whitepaper_1123_LowRes
 
Cloud Computing - Benefits and Risks
Cloud Computing - Benefits and RisksCloud Computing - Benefits and Risks
Cloud Computing - Benefits and Risks
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...Transcending  IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
Transcending IT Planetary Boundaries: Future of cloud, By Pradeep Gupta, Cha...
 
QuickView #5 - Cloud
QuickView #5 - CloudQuickView #5 - Cloud
QuickView #5 - Cloud
 
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...
An Essential Guide to Possibilities and Risks of Cloud Computing: A Pragmatic...
 

Similar to CLOUD COMPUTING -DETAILED APPROACH

Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
Niloufer Tamboly CISSP, CPA, CIA, CISA, CFE
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
Mark Hinkle
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud ComputingImane SBAI
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
Tanmoy Barman
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
IndSightsResearchSG
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud ComputingAbdul Aslam
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid Cloud
TD Web Services
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
CloudSmartz
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
Epoch Universal, Inc.
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Tushar Jain
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
dailytimeupdate.com
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
Embotics Corp.
 
IBM Cloud
IBM Cloud IBM Cloud
IBM Cloud
AniaPaplaCardenal
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paper
Assem mousa
 
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
RapidValue
 
Cloud computing implementation practically using vmware
Cloud computing implementation practically using vmwareCloud computing implementation practically using vmware
Cloud computing implementation practically using vmware
sameer sardar
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
RapidScale
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
Go4hosting Web Hosting Provider
 

Similar to CLOUD COMPUTING -DETAILED APPROACH (20)

Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
INTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTINGINTRODUCTION TO CLOUD COMPUTING
INTRODUCTION TO CLOUD COMPUTING
 
bishu pdf1
bishu pdf1bishu pdf1
bishu pdf1
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
Cloud Computing
 Cloud Computing Cloud Computing
Cloud Computing
 
The beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid CloudThe beneficiaries in Hybrid Cloud
The beneficiaries in Hybrid Cloud
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate futureCloud computing _ key the Ultimate future
Cloud computing _ key the Ultimate future
 
Cloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the CloudCloud Myths and Realities: The Truth About Moving to the Cloud
Cloud Myths and Realities: The Truth About Moving to the Cloud
 
IBM Cloud
IBM Cloud IBM Cloud
IBM Cloud
 
cloud of things paper
cloud of things papercloud of things paper
cloud of things paper
 
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
The Adoption of Cloud Technology by Enterprises - A Whitepaper by RapidValue ...
 
Cloud computing implementation practically using vmware
Cloud computing implementation practically using vmwareCloud computing implementation practically using vmware
Cloud computing implementation practically using vmware
 
Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?Multitenant, Dedicated or Hybrid - Which cloud to choose?
Multitenant, Dedicated or Hybrid - Which cloud to choose?
 
Myths About Cloud Computing
Myths About Cloud ComputingMyths About Cloud Computing
Myths About Cloud Computing
 

Recently uploaded

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 

Recently uploaded (20)

Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 

CLOUD COMPUTING -DETAILED APPROACH

  • 1. SECURE AND PRACTICAL OUTSOURCING OF LINEAR PROGRAMMING IN CLOUD COMPUTING
  • 2. CONTENTS INTRODUCTION WHAT IS CLOUD COMPUTING ? WHY WE NEED CLOUD COMPUTING ? WHAT IS SECURITY ? WHY WE NEED SECURITY IN CLOUD COMPUTING ? LINEAR PROGRAMMING WHY LINEAR PROGRAMMING IN CLOUD COMPUTING ? EXISTING SYSTEM DISADVANTAGES PROPOSED SYSTEM ADVANTAGES MECHANISM HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTS IMPLEMENTATIONS SAMPLE SCREENS
  • 3. INTRODUCTION ✦Cloud computing enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-‐per-‐use manner. ✦Security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. ✦Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers. ✦The resulting flexibility allows us to explore appropriate security/efficiency trade off via higher level abstraction of LP(Linear Programming) computations than the general circuit representation.
  • 4. WHAT IS CLOUD? The term Cloud refers to a Network or Internet. In other words, we can say that Cloud is something, which is present at remote location. Cloud can provide services over network, i.e., on public networks or on private networks, i.e., WAN, LAN and so on . Applications such as e-mail, web conferencing, customer relationship management (CRM), all run in cloud.
  • 5. WHAT IS CLOUD COMPUTING? Cloud Computing provides us a means by which we can access the applications as utilities, over the Internet. It allows us to create, configure, and customize applications online. Cloud computing provides a variety of computing resources , from servers and storage to enterprise applications such as email, security, backup/DR, voice, all delivered over the Internet
  • 6. The Cloud delivers a hosting environment that is Flexible, Immediate, Scalable, Secure. Available while saving corporations money, time and resources. With Cloud Computing users can access database resources via the internet from anywhere for as long as they need without worrying about any maintenance or management of actual resources.
  • 7. BASIC CONCEPTS There are certain services and models working behind the scene making the cloud computing feasible and accessible to end users. Following are the working models for cloud computing: 1. DEPLOYMENT MODELS 2. SERVICE MODELS
  • 8. DEPLOYMENT MODELS Deployment models define the type of access to the cloud, i.e., how the cloud is located? Cloud can have any of the four types of access: Public, Private, Hybrid and Community.
  • 9.
  • 10. PUBLICCLOUD The Public Cloud allows systems and services to be easily accessible to the general public. Public cloud may be less secure because of its openness, e.g., e-mail. PRIVATECLOUDThe Private Cloud allows systems and services to be accessible within an organization. It offers increased security because of its private nature. COMMUNITYCLOUD The Community Cloud allows systems and services to be accessible by group of organizations. HYBRIDCLOUD The Hybrid Cloud is mixture of public and private cloud. However, the critical activities are performed using private cloud while the non-critical activities are performed using public cloud.
  • 11. SERVICE MODELS Service Models are the reference models on which the Cloud Computing is based. These can be categorized into three basic service models as listed below: 1.Infrastructureasa Service(IaaS) 2. Platformasa Service(PaaS) 3. Softwareasa Service(SaaS)
  • 12. Infrastructure as a Service (IaaS) IaaS is the delivery of technology infrastructure as an on demand scalable service. IaaS provides access to fundamental resources such as physical machines, virtual machines, virtual storage, etc. • Usually billed based on usage • Usually multi tenant virtualized environment • Can be coupled with Managed Services for OS and application support
  • 14. Platformas a Service (PaaS) PaaS provides the runtime environment for applications, development & deployment tools, etc. PaaS provides all of the facilities required to support the complete life cycle of building and delivering web applications and services entirely from the Internet. Typically applications must be developed with a particular platform in mind • Multi tenant environments • Highly scalable multi tier architecture
  • 16. Software as a Service (SaaS) SaaS model allows to use software applications as a service to end users. SaaS is a software delivery methodology that provides licensed multi-tenant access to software and its functions remotely as a Web-based service. Usually billed based on usage • Usually multi tenant environment • Highly scalable architecture
  • 18. Simplifying CloudComputing Complex processes are integrated into cloud.
  • 19. LINEAR PROGRAMMING Linear programming is a widely used mathematical modeling technique to determine the optimum allocation of scarce resources among competing demands. Resources typically include raw materials, manpower, machinery, time, money and space. The technique is very powerful and found especially useful because of its application to many different types of real business problems in areas like finance, production, sales and distribution, personnel, marketing and many more areas of management. As its name implies, the linear programming model consists of linear objectives and linear constraints, which means that the variables in a model have a proportionate relationship. For example, an increase in manpower resource will result in an increase in work output.
  • 20. WHY CLOUD COMPUTING ? ✦Cloud Computing is very much useful to a smaller companies to generate similar savings and capabilities on its own. ✦Many of the issues blamed on the cloud in large enterprises - security, integration, compliance and so on - often cause fewer problems in small companies that can't properly deal with them anyway. MAIN REASONS WHY CLOUD COMPUTING IS BETTER FOR SMALL BUSINESSES ECONOMIES OF SCALE ENTERPRISE CLASS FUNCTIONALITY MONEY MATTERS INFRASTRUCTURE APPLICATIONS SECURITY PROBLEM COMPLIANCE RELIABILITY
  • 21. 1.Economies of scale: This one's obvious. The larger the company, the easier it can generate economies of scale on its own. Small companies, by definition, have more limited resources. Anything that can give them access to scale in purchasing and pricing is a big win! 2.Enterprise-class functionality. Big companies have the heft to create the custom functionality they need. Small companies simply don't have the resources to do that. In the cloud, though, they can leverage development, maintenance and upgrades across many, many small businesses... And, increasingly, consumers as well. 3.Money Matters. Startups and small companies are often under capitalized and pay-as-you-go cloud computing solutions typically don't require lots of upfront cash. Even if they don't end up saving much as the monthly fees add up over the long run, avoiding capital expenditures can be a make-or-break issue for cash- strapped small businesses. Reasons why cloudcomputing
  • 22. 4.Infrastructure vs. Applications. For the enterprise, cloud computing often means complex Infrastructure as a Service (IaaS) projects that have to be installed and integrated into a company's existing systems. For smaller companies, cloud computing often means complete cloud-based Software as a Service (SaaS) applications and application suites. No IT required. 5.Security Problems. I'm not saying security isn't important to small businesses (though many don't take it as seriously as they should). I'm saying that while security in the cloud may still be shaky by enterprise standards, it's almost always far better than what small businesses are able to provide for themselves.
  • 23. 6.Compliance. Because you don't necessarily know where your data is stored in the cloud, IaaS can cause confusion as to whether it complies with local, national and international regulations. That's a huge issue for multinational corporations, less so for most small businesses. 7.Reliability. The cloud is more reliable than most people think. When widely used cloud services and applications have outages, it makes national news. When an individual company - large or small - has a similar problem, they work hard to make sure you never even hear about it. The bottom line, though, is that even accounting for network connectivity hiccups, the cloud is probably a lot more reliable than what small businesses can afford to provide for themselves.
  • 24. WHAT IS SECURITY ? Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, community, nation, or organisation. ✦Cryptography ✦Redundancy ✦Disposal ✦Transfer security ✦Firewalling What exactly firewall does is: It isolates the virtual machines . Brilliantly filters addresses and ports  Prevents Denial-of-Service (DoS) Detects external security assessment measures
  • 25. Whysecurity is needin cloud computing? "The Notorious Nine," the top nine cloud computing threats has been identified by the CSA (Cloud Security Alliance).The report reflects the current consensus among industry experts surveyed by CSA, focusing on threats specifically related to the shared, on-demand nature of cloud computing. The top most threats to the cloud computing are : ✦Data Breaches ✦Data Loss ✦Account or Service Traffic Hijacking ✦Insecure Interfaces and APIs ✦Denial of service ✦Malicious insiders ✦Abuse, ✦Insufficient due diligence
  • 26. Outsourcing computation to the commercial public cloud is also depriving customers’ direct control over the systems that consume and produce their data during the computation, which inevitably brings in new security concerns and challenges towards this promising computing model.Theoutsourced computation workloads often contain sensitive information, such as ✦The business financial records, ✦Proprietary research data, ✦Personally identifiable health information etc. EXISTING SYSTEM
  • 27. ✦ End to end data confidentiality ✦unauthorised information leakage ✦sensitive data have to be encrypted before outsourcing How ever,Ordinary data encryption techniques in essence prevent cloud from performing any meaningful operation of the underlying plaintext data making the computation over encrypted data a very hard problem. There are huge financial incentives for the cloud to be “lazy” if the customers cannot tell ✦The correctness of the output ✦Possible software bugs ✦Hardware failures, even outsider attacks might also affect the quality of the computed results. DISADVANTAGES
  • 28. PROPOSED SYSTEM Our Linear Programming outsourcing scheme which provides a complete outsourcing solution for not only the privacy protection of problem input/output, but also its efficient result checking. We start from a secure LP outsourcing design framework. ADVANTAGES ✦Optimal solution using LP problems. ✦Better security on both uploading and downloading. ✦Integrating mathematical implementation in encryption
  • 29. Software and Hardware Specifications SOFTWARE SPECIFICATION: Operating System : Windows XP,7,8 Software Protocol IDE : JAVA(JDK 1.6.0) : TCP/IP : NetBeans,Xampp 12 HARDWARE SPECIFICATION: Processor Speed RAM Hard Disk General :Pentium-IV, dual core :1.1GHz,3.4GHz :512MB,1GB :40GB,320GB :Keyboard,Monitor,Mouse
  • 30. Mechanism Design Framework These four algorithms are summarised below : •KeyGen(1k ) → {K }. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. • ProbEnc(K, Φ) → {ΦK }. This algorithm encrypts the input tuple Φinto ΦK with the secret key K. According to problem transformation, the encrypted input ΦK has the same form as Φ, and thus defines the problem to be solved in the cloud. •ProofGen(ΦK ) → {(y, Γ)}. This algorithm augments a generic solver that solves the problem ΦK to produce both the output y and a proof Γ. The output y later decrypts to x, and Γ is used later by the customer to verify the correctness of y or x . •Result Dec (K, Φ, y, Γ) → {x, ⊥}. This algorithm may choose to verify either y or x via the proof Γ. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation faithfully.
  • 31. Finding File Encrypt the File Send to Cloud Server Decrypt the File Give Solution / Verification key Response to Customer Architecture of secure outsourcing linear programming problems in Cloud Computing.
  • 32. IMPLEMENTATION ✦ Finding File ✦Encrypt the File ✦Send to Cloud Server ✦Decrypt the File ✦Give Solution / Verification key ✦Response to Customer
  • 33. Finding File & Encrypt the File ★ADMIN LOGIN ★IMAGE UPLOAD
  • 34. Send to Cloud Server & Decrypt theFile ★CLIENT DETAILS ★FILE ENCRYPTION & DECRYPTION
  • 35. Give Solution / Verification key Linear programming process where the optimal solution gets solved and verified
  • 38. CONCLUSION ✦The problem of securely outsourcing LP computations in cloud computing, and provide such a practical mechanism design which fulfils input/output privacy, cheating resilience, and efficiency. ✦By explicitly decomposing LP computation outsourcing into public LP solvers and private data, our mechanism design is able to explore appropriate security/efficiency trade offs via higher level LP computation than the general circuit representation. ✦This develops problem transformation techniques that enable customers to secretly transform the original LP into some arbitrary one while protecting sensitive input/ output information.