Cloud computing provides immense computing power with reduced cost. User can outsource their vast computational work to the cloud and use massive computational power, storage, software, network etc. Despite all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data. Outsourcing and computation compromises the security of data being stored on cloud computing. Considering cloud as insecure platform a system must be designed that protects data by encryption and as well as produces correct result without any cheating resilience with the help of result verification. In this paper, we study the secure outsourcing and computation of linear programming by capturing the effects of arguments which are of first order and that provides practical efficiency. To achieve efficiency linear programming conditions are implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The parameters of LPare owned by the customer. For validating the obtained output of computation, we use duality theorem of linear programming that derives the required condition that the result must fulfil.
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
ith the rapid development of cloud computing, the privacy security incidents occur frequently, especially
data security issues. Cloud users would like to upload their sensitive information to cloud service providers
in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to
securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for
cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional
homomorphic encryption schemes with many limitations, which are not suitable for cloud computing
applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also
prove the correctness and security of our protocols, and analyze the advantages and performance by comparing
with some latest works.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
Using Grid Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared networks of configurable computing resources, without the burden of local data storage and maintenance. In this project based on the dynamic secrets proposed design an encryption scheme for SG wireless communication, named as dynamic secret-based encryption (DSE). Dynamic encryption key (DEK) is updated by XOR the previous DEK with current DS. In this project based on the dynamic secrets proposed design an encryption scheme for SG wireless communication, named as dynamic secret-based encryption (DSE). The basic idea of dynamic secrets is to generate a series of secrets from unavoidable transmission errors and other random factors in wireless communications In DSE, the previous packets are coded as binary values 0 and 1 according to whether they are retransmitted due to channel error. This 0/1 sequence is called as retransmission sequence (RS) which is applied to generate dynamic secret (DS). Dynamic encryption key (DEK) is updated by XOR the previous DEK with current DS
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the roposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Proposed system for data security in distributed computing in using triple d...IJECEIAES
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user’s personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data.
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
Attribute-based encryption (ABE) can be used for the encryption of data with attributes and logs. Instead of encrypting each part of a log with the keys of all recipients, it is possible to encrypt the log only with attributes which match recipient’s attributes. This primitive can also be used for broadcast encryption in order to decrease the number of keys used. Here the access control will be given with the keys and the attributes. The outsourcing computation cost will be comparatively less when compared to the existing system. The data will be shared between the two users if and only if the key matches. In addition, for the first time, we propose an outsourced ABE construction which provides check ability of the outsourced computation results in an efficient way. The performance analysis has been proven this method to be more secured.
DIVISION AND REPLICATION OF DATA IN GRID FOR OPTIMAL PERFORMANCE AND SECURITYijgca
Using Grid Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared networks of configurable computing resources, without the burden of local data storage and maintenance. In this project based on the dynamic secrets proposed design an encryption scheme for SG wireless communication, named as dynamic secret-based encryption (DSE). Dynamic encryption key (DEK) is updated by XOR the previous DEK with current DS. In this project based on the dynamic secrets proposed design an encryption scheme for SG wireless communication, named as dynamic secret-based encryption (DSE). The basic idea of dynamic secrets is to generate a series of secrets from unavoidable transmission errors and other random factors in wireless communications In DSE, the previous packets are coded as binary values 0 and 1 according to whether they are retransmitted due to channel error. This 0/1 sequence is called as retransmission sequence (RS) which is applied to generate dynamic secret (DS). Dynamic encryption key (DEK) is updated by XOR the previous DEK with current DS
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
RSDC (Reliable Scheduling Distributed in Cloud Computing)IJCSEA Journal
In this paper we will present a reliable scheduling algorithm in cloud computing environment. In this algorithm we create a new algorithm by means of a new technique and with classification and considering request and acknowledge time of jobs in a qualification function. By evaluating the previous algorithms, we understand that the scheduling jobs have been performed by parameters that are associated with a failure rate. Therefore in the roposed algorithm, in addition to previous parameters, some other important parameters are used so we can gain the jobs with different scheduling based on these parameters. This work is associated with a mechanism. The major job is divided to sub jobs. In order to balance the jobs we should calculate the request and acknowledge time separately. Then we create the scheduling of each job by calculating the request and acknowledge time in the form of a shared job. Finally efficiency of the system is increased. So the real time of this algorithm will be improved in comparison with the other algorithms. Finally by the mechanism presented, the total time of processing in cloud computing is improved in comparison with the other algorithms.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Proposed system for data security in distributed computing in using triple d...IJECEIAES
Cloud computing is considered a distributed computing paradigm in which resources are provided as services. In cloud computing, the applications do not run from a user’s personal computer but are run and stored on distributed servers on the Internet. The resources of the cloud infrastructures are shared on cloud computing on the Internet in the open environment. This increases the security problems in security such as data confidentiality, data integrity and data availability, so the solution of such problems are conducted by adopting data encryption is very important for securing users data. In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. From the comparative study it was found that the Rivest Shamir Adlemen (3kRSA) algorithm outperforms that triple data encryption standard (3DES) algorithm with respect to the complexity, and output bytes. The main drawback of the 3kRSA algorithm is its computation time, while 3DES is faster than that 3kRSA. This is useful for storing large amounts of data used in the cloud computing, the key distribution and authentication of the asymmetric encryption, speed, data integrity and data confidentiality of the symmetric encryption are also important also it enables to execute required computations on this encrypted data.
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Harnessing the cloud for securely outso...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Harnessing the cloud for securely outsourcing large scale systems of linear e...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
SECURE OUTSOURCED CALCULATIONS WITH HOMOMORPHIC ENCRYPTIONacijjournal
With the rapid development of cloud computing, the privacy security incidents occur frequently, especially data security issues. Cloud users would like to upload their sensitive information to cloud service providers in encrypted form rather than the raw data, and to prevent the misuse of data. The main challenge is to securely process or analyze these encrypted data without disclosing any useful information, and to achieve
the rights management efficiently. In this paper, we propose the encrypted data processing protocols for cloud computing by utilizing additively homomorphic encryption and proxy cryptography. For the traditional homomorphic encryption schemes with many limitations, which are not suitable for cloud computing applications. We simulate a cloud computing scenario with flexible access control and extend the original
homomorphic cryptosystem to suit our scenario by supporting various arithmetical calculations. We also prove the correctness and security of our protocols, and analyze the advantages and performance by comparing with some latest works.
Attribute-Based Encryption for Access of Secured Data in Cloud StorageIJSRD
Cloud security is the most critical task while considering its working environment, i.e. outsourced, distributed and utility based. In such cases making the users data confidential, increases the trust over the system. Also the security procedure does not make the availability affected in any ways. The users of these kind of systems is always retained the services and securities preliminaries with respect to the data itself. As the cloud user can access its data frequently and if here some encryption is used which requires decryption and the repetitive process continues to increase the overheads. It requires some mechanism in which encryption is performed and if the user requires to perform some operations on secure file without decrypting it can be fulfilled. Thus homomorphic encryption lets the user facilitates about the performing operations on encrypted data which reduces the complexity of confidentiality operations. Also to prevent Cloud Servers from being able to learn both the data file contents and user access privilege information used to generate key along with the fastest access of secured data by using Attribute-based encryption (ABE).
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
Fog computing is an extended version of Cloud computing. It minimizes the latency by incorporating Fog servers as intermediates between Cloud Server and users. It also provides services similar to Cloud like Storage, Computation and resources utilization and security.Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on the heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, the Internet of Things (IoT) devices isrequired to quickly process a large amount of data. The Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low- cost authentication protocols. Lots of researchers have proposed authentication protocols with varied efficiencies.As a part of our contribution, we propose a protocol to ensure data integrity which is best suited for fog computing environment.
SECURE THIRD PARTY AUDITOR (TPA) FOR ENSURING DATA INTEGRITY IN FOG COMPUTINGIJNSA Journal
Fog computing is an extended version of Cloud computing. It minimizes the latency by incorporating Fog servers as intermediates between Cloud Server and users. It also provides services similar to Cloud like Storage, Computation and resources utilization and security.Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on the heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, the Internet of Things (IoT) devices isrequired to quickly process a large amount of data. The Significance of enterprise data and increased access rates from low-resource terminal devices demands for reliable and low- cost authentication protocols. Lots of researchers have proposed authentication protocols with varied efficiencies.As a part of our contribution, we propose a protocol to ensure data integrity which is best suited for fog computing environment.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Harnessing the Cloud for Securely...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Harnessing the cloud for securely outsourcing large scale systems of linear e...Muthu Samy
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Similar to Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review (20)
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Cosmetic shop management system project report.pdf
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review
1. Shephali Singh .et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 4, ( Part -6) April 2017, pp.64-68
www.ijera.com DOI: 10.9790/9622-0704066468 64 | P a g e
Secure Outsourcing of Linear Programming in Cloud Computing
Environment: A Review
Shephali Singh1
,Puneet Sharma2
,Dr. Deepak Arora3
Department of Computer Science & Engineering, Amity University, Lucknow
ABSTRACT
Cloud computing provides immense computing power with reduced cost. User can outsource their vast
computational work to the cloud and use massive computational power, storage, software, network etc. Despite
all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data.
Outsourcing and computation compromises the security of data being stored on cloud computing. Considering
cloud as insecure platform a system must be designed that protects data by encryption and as well as produces
correct result without any cheating resilience with the help of result verification. In this paper, we study the
secure outsourcing and computation of linear programming by capturing the effects of arguments which are of
first order and that provides practical efficiency. To achieve efficiency linear programming conditions are
implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The
parameters of LPare owned by the customer. For validating the obtained output of computation, we use duality
theorem of linear programming that derives the required condition that the result must fulfil.
Keywords: Cloud Computing, Data Security, Duality theorem, Linear Programming and Outsourcing.
I. INTRODUCTION
On demand network access is provided by
cloud computing such as computing resources and
storage of data with more efficiency and less
management overhead. The cloud computing has
advantage of computational outsourcing where the
strength of user is not restrained to its resources or
devices. The outsourcing of workloads into cloud
provides customer huge computing resources
without huge investments in hardware or software
purchase. With all these advantages comes the
concern of security of cloud platform. The main
concern is with the security of data stored in cloud.
The outsourced data may contain crucial
information such as financial records, research
data, military information, personal records etc.
The leakage or modification of these data may lead
to inevitable changes or problems.
To protect the data outsourced on cloud,
encryption of sensitive data must be done. Before
outsourcing the data should be encrypted so as to
maintain confidentiality of data stored in cloud.
Other than encryption, the cloud itself is sometimes
not very faithful which may lead to incorrect
results. Though it is possible that software bugs,
hardware failure or even outsider attack may
decrease the result quality. From the viewpoint of
customer the cloud is insecure. It would be difficult
for customer to give their workin control of cloud
from the local machine without the assurance of
security of their data i.e. to save valuable I/P and
O/P information and verify the correctness of
result.Cryptographic and computer recent
researches have lead to advancement in “safe
outsourcing costly computations” (e.g. [1]-[5]).
The working of secure computation in cloud has
been found to be feasible in theory [6] by Yao’s
garbled circuits [7] and Gentry’s research work on
fully homomorphic encryption (FHE) algorithm [8]
that represents the computation on Boolean circuit
as the combination of encryption that can be
assessed with the help of inputs that are encrypted.
But using this method will be not so practical due
to high complexity and large Boolean circuits.
Other outsourcing computation method include
sequence comparison, matrix multiplication etc. It
is still hard to apply them practically in large
problems. In these heavy cloud side cryptography
computation [3], complexity related to
communication [8] are involved.
Here we look into effective methods of
outsourcing computations of linear programming
safely [9]. However ordinary encryption techniques
does not allow cloud to perform any operations of
the plaintext data, making it difficult to perform
computation over encrypted data. Linear
programming works on algorithm that finds the
first order effect of different parameters of system
that must give optimal solution to increase
efficiency. Its usage is in routing of packets, flow
control of network, data centres power
management etc. [10]. Since linear programming
problem requires lot computational resources and it
involves very sensitive data that is why it is
RESEARCH ARTICLE OPEN ACCESS
2. Olawale Simon O. A.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 4, ( Part -6) April 2017, pp.64-68
www.ijera.com DOI: 10.9790/9622-0704066468 65 | P a g e
decomposed and outsourced into LP problem
solvers that are public and executing on cloud and
LP parameters that are of customers and are
private. Vectors and matrices are used to transform
LP problems of customer. This transformations
makes privacy preserving techniques such as
matrix multiplication and affine mapping easily
applicable. This allows insecure input and output
data to be safe and secure. Other than this, the
duality theorem along with bit by bit formation of
LP problem derives basic conditions that are
required to be correct to satisfy the result. This
method to validate the result is very effective and
has very less appended overhead on the customer
cloud as well as server cloud.
Figure. 1: Pictorial representation of secure
outsourcing and computation of LP problem in
Cloud.
II. L
ITERATURE SURVEY
Researcher Gennaro et al. [5] has shown
literary working of secure computation
outsourcing. He has shown feasibility of input and
output privacy maintenance as well as correctness
and soundness of the result. However, it is not
practically sound method due to high computing
complexity. Later Atallah et al. did a list of works
[1] [3] [4] [8] for secure outsourcing computation.
The set of techniques used were string matching,
linear algebra, sorting etc. However, these
mechanism were not very efficient in securing
input and output information and did not confirmed
correctness of result, which is the main concern in
secure computation on cloud. Atallah et al. [3] [4]
gave two protocols later that were used for secure
sequence outsourcing and algebraic computation
outsourcing. Since these two protocols used
burdened cryptography algorithm like
homomorphic encryption [11]. Thus were not very
successful for large problem set due to huge
complexity. Based on above concept, Hohenberger
[2] defined secure outsourcing protocol of modular
exponentiation, which was taken to be a public key
cryptography method that was very expensive.
Latest, Atallah [8] et al. presented a safe
protocol based on secret key concept for secure
outsourcing that used matrix multiplication [12].
This mechanism performed very well due to
assumption of only one server and computation
effectiveness. The only lacking point is lot of
overhead because of message passing. Concluding,
these methods are still not efficient enough for
secure LP outsourcing computation.
Safe multiparty working was given by
Yao [6]. Two or more parties are allowed to
execute functions for obtaining result along with
preserving their input from each other. Result is
computed along with hiding the input from both the
parties individually. Basic SMC is efficient, Du and
Atallah et al. gave customized solution under SMC
context for problem such as scientific computation,
sequence comparison, statistical analysis etc. [13].
Though applying these concepts directly to the
cloud is problematic. The computational power of
customer and cloud was not similar which could
not be handled effectively, which is avoided in the
given design by shifting all computational load to
cloud only. The other problem is security
asymmetry because no party alone knows all
problem input, leading to difficulty in result
validation.
In SMC, Li and Atallah [14] gave a
solution to the participating parties to applyadditive
split of constraint matrix along with few
cryptographic techniquesthat are executed in each
step of simplex algorithm. The above method does
show practical performance for big size problem
and does not guarantee optimal solution. With the
same method, Toft [15] gave a secret key sharing
secure simplex algorithm that had less complexity
than other protocols. In [16], Vaidya formulated a
new improved simplex algorithm that worked on
safe scalar product and protocol comparisons.
Lately, Catrina et al. [17] gave a safe multiparty LP
using fixed point arithmetic. Some other works are
of Du [18] and Vaidya [19] who studies
distinguished approaches of matrix based
transformation to look inti privacy preserving
linear programming. Later, Bednarz et al. [20]
proved Du’s and Vaidya’s approach infeasible and
proposed to use permutation matrices. Recently,
Mangasarian gave two privacy protecting methods
of linear programming on vertical [21] and
horizontal divided [22] constraints
matrix.Although, many techniques were proposed
but all had computation asymmetry issues.
Cloud computing is not a very trustworthy
platform. It may behave unfaithfully during
computation which may lead to incorrect
3. Olawale Simon O. A.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 4, ( Part -6) April 2017, pp.64-68
www.ijera.com DOI: 10.9790/9622-0704066468 66 | P a g e
computation of result without the knowledge of the
customer. Detecting this is not an easy task that
when the data is being modified in cloud which
results in incorrect computation outsourcing.
Verifiable computation delegation has found huge
interest in theoretical computer science
communities where weak customers can find out
the correctness of computational result with the
help of powerful but not trusted servers with the
use of very less resources.Some of latest results and
outcome is specified by Glodwasser et al. [23].
Golle et al. [24], to defeat the untrusted servers
presented the idea to append pre-calculated results
along with the computation. In [25], Szada et al.
further worked on ringer scheme to defeat servers
that cannot be trusted.In [26] Du. Et al. gave a
mechanism for grid computing to find the cheating
done in outsourcing computation. Based on Merkle
tree the servers gives a commitment on the result
computed by it. This commitment is then used by
the customer followed by a sampling technique to
do result verification.
The above schemes looks into data and the
computed result by it that is prohibited in cloud
computing for security and safety of data. Thus it
becomes tough task to provide result verification as
well as input/output privacy. The introduction of
concept of duality of LP problem efficiently
performs the result validation, appending some
overhead on customer server as well as cloud
server.
Cong Wang [9], recently, gave an efficient
and feasible method for securely outsourcing linear
programming that will protect input/output and also
find cheating servers. The data that are outsourced
contains very insecure information such as medical
history, financial details, research related works
etc. To protect these important data and ensure its
confidentiality it is encrypted before being
outsourced to the cloud for computation. On the
other hand, the details of computation is not
transparent to user so there exists chances of cloud
to behave unfaithfully and produce wrong output.
Fully homomorphism encryption(FHE) scheme,
has been shown feasible in theory for secure
computation outsourcing
Computation outsourcing involves two
different parts, cloud customer and cloud server.
Cloud customer outsources LP problems to cloud
server for computation. The cloud server has huge
computing resources such as memory, storage and
processing power. The customer sends its LP
problem to CS after encrypting it with a secret key.
The CS then computes the solution with the help of
public LP solver running on the cloud and also
produces a correctness proof. The customer on
receiving the result verifies the result with the
appended proof and then decrypt the result. The
algorithm [27] is as follows:
KeyGen( ) {K}. It generates secret key K
as an output on taking input the parameter k.
This key K is used by the customer to perform
encryption.
ProbEnc(K,ɸ) { }. This step functions to
encrypt the input, tuple ɸ into , using the
secret key K.
ProofGen( ) {y,Γ}. This algorithm
provides solution of the LP problem to give
the output or result y and proof Γ.
ResultDec(K,ɸ,y,Γ) {x, }. Later the
algorithm checks either x or y with the given
proof Γ. The x is obtained by decrypting the
output y with the help of secret key K. The
output is returned if correctness of output is
not proved, that means the cloud has been
compromised.
Table 1: Comparison between different
mechanisms of secure outsourcing in cloud
computing.
4. Olawale Simon O. A.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 4, ( Part -6) April 2017, pp.64-68
www.ijera.com DOI: 10.9790/9622-0704066468 67 | P a g e
III. PERFORMANCE OVERVIEW
With respect to the mechanism of LP,
computation on side of customer consist of three
algorithm such as KeyGen, ProbEnc and
ResultDec. The complexity or overhead of
computation is of generation of key, encryption
operation and verification of result. The KeyGen
and ResultDec algorithm consist of generation of
random matrix along with multiplication of vector-
vector and matrix vector. O( ) is the complexity
of these two methods. The maximum time is
consumed by matrix-matrix multiplication in
ProbEnc algorithm. In cubic time method is used
for matrix multiplication with the complexity of
O( ). Other efficient methods are Strassen’s
algorithm [28] and Coppersmith Winograd
algorithm [29] having complexity of O( ) and
O( ) respectively.
The cloud server has to compute ProofGen
algorithm that consist of solving LP problem_K
that has been encrypted by the customer and
computing the proof of result. If the problem_K is
of normal case then the encrypted LP problem_K is
solved with duality theorem to find optimal
solution as the proof of result. The result proof is
given in LP solving problem, thus no extra
computation is required. In other case, an extra
auxiliary LP problem_K does not has optimal
solution. The LP is always computed at starting to
find out the practical solution, thus it incurs an
extra overhead.
Therefore in most of the cases, the
complexity of computation is similar i.e. O( )
[30], same as in case of normal LP problem.
Therefore, the more computation is performed on
cloud which provides customer huge computation
savings.
IV. ADVANTAGES AND
DISADVANTAGES
One of the most important advantage is
computational resources, the customer enjoys
resources of cloud server by outsourcing the
problem for computation. This saves capital
investment of customer in hardware and software.
It provides feature of correctness and soundness as
the mechanism decrypts the output and verifies the
result. Checks that if cloud has performed
unfaithfully. Computing original LP by itself is
more than the computation performed by customer.
The computation overhead on CS is in the
comparable time complexity of other practical
algorithm of LP problems.
The / [27], cloud efficiency,
representing total overhead of the computation
provides more than 30x savings.
Two different entities are involved in computation
outsourcing architecture, one is customer cloud and
the other is cloud server (CS) [9] [27]. The cloud
customer has a very huge amount of sensitive and
costly LP problems for being computed and
outsourced and the cloud server has enough
computing resources that provide computing
services like public LP solvers.
V. CONCLUSION
Cloud computing has been proved to
provide a lot of computation resources at less
expenses. It provides user with limited resources to
outsource their work or problem on cloud for
computation which has ample amount of resources
such as processing power, storage, bandwidth etc.
Although, cloud provides too many benefits but
security is a primary concern. The customer should
be able to trust the cloud for their sensitive and
confidential data being computed. Considering
cloud as not a secure platform, a mechanism must
be designed that not only protects user data but also
ensures that result being computed is correct and
verified.
This paper investigates about secure
outsourcing and computation of LP problem. To
attain efficiency LP problem is decomposed into
public LP solvers. These solvers run on cloud. The
resulting flexibility provides to find significant
security and efficiency trade off with help of higher
level abstraction of LP computation than the
general circuit level. The transformation of LP
problem in set of matrices and vector provides to
apply privacy preserving technique that helps to
change initial LP problem to an auxiliary one along
with preserving insecure input/output operation.
For verifying the computed output, fundamental
duality theorem of linear programming is explored
and necessary condition ae derived that should
satisfy the results correctness. Tending-to-zero
overhead is done by the mechanism on whole. The
main function of this mechanism is that, along with
security of data it also gives means to validate the
data and the result.
REFERENCES
[1]. M. J. Atallah, K.N. Pantazopoulos, J.R.
Rice, and E.H. Spafford, “Secure
Outsourcing of scientific computations”,
Adv. Comput., vol.54,pp. 216-272, 2001.
[2]. S. Hohenberger and A. Lysyanskaya,
“How to securely outsource cryptographic
computation”, in Proc. 2nd
Int. Conf.
Theory Cryptography, 2005, pp. 264-282.
[3]. M.J. Atallah and J. Li., “Secure
outsourcing of sequence comparisons,” in
Int. I. Inf. Sec., vol. 4, no. 4, pp. 277-287,
2005.
5. Olawale Simon O. A.et.al. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 4, ( Part -6) April 2017, pp.64-68
www.ijera.com DOI: 10.9790/9622-0704066468 68 | P a g e
[4]. D. Benjamin and M.J. Atallah, “Private
and cheating-free outsourcing of algebraic
computation,” in Proc. Int. Conf. Privacy,
Secur., Trust, 2008, pp. 240-245.
[5]. R. Gennaro, C. Gentry, and B. Parno,
“Non-interactive verifiable computing:
Outsourcing computation to untrusted
workers,” in Proc. 30th
Annu. Conf. Adv.
Cryptol., Aug. 2010, pp. 465-482.
[6]. A. C.-C. Yao, “Protocols for secure
computations (extended abstract),” in
Proc. of FOCS, 1982, pp. 160–164.
[7]. C. Gentry, “Fully homomorphic
encryption using ideal lattices,” in Proc of
STOC, 2009, pp. 169–178.
[8]. M. Atallah and K. Frikken, “Securely
outsourcing linear algebra computations,”
in Proc. of ASIACCS, 2010, pp. 48–59.
[9]. Cong Wang, Kui Ren, and Jia Wang,
“Secure and Practical Outsourcing of
Linear Programming in Cloud
Computing”, IEEE, 2011, pp. 820-821.
[10]. D. Luenberger and Y. Ye, Linear and
Nonlinear Programming, 3rd ed. Springer,
2008.
[11]. P. Paillier, “Public-key cryptosystems
based on composite degree residuosity
classes,” in Proc. 17th Int. Conf. Theory
Appl. Cryptographic Tech., 1999, pp.
223–238.
[12]. A. Shamir, “How to share a secret,”
Commun. ACM, vol. 22, no. 11, pp. 612–
613, 1979.
[13]. W.Du and M. J. Atallah, “Secure multi-
party computation problems and their
applications: A review and open
problems,” in Proc. New Secur. Paradigms
Workshop, 2001, pp. 13–22.
[14]. J. Li and M. J. Atallah, “Secure and
private collaborative linear programming,”
in Proc. Int. Conf. Collaborative Comput.,
2006, pp. 1–8.
[15]. T. Toft, “Solving linear programs using
multiparty computation,” in Proc. 13th Int.
Conf. Financial Cryptography Data
Security, 2009, pp. 90–107.
[16]. J. Vaidya, “A secure revised simplex
algorithm for privacy-preserving linear
programming,” in Proc. IEEE Int. Conf.
Adv. Inf. Netw. Appl., 2009, pp. 347–354.
[17]. O. Catrina and S. De Hoogh, “Secure
multiparty linear programming using
fixed-point arithmetic,” in Proc. 15th Eur.
Conf. Res. Comput. Security, 2010, pp.
134–150.
[18]. W. Du, “A study of several specific secure
two-party computation problems,” Ph.D.
dissertation, Comput. Sci. Dept., Purdue
Univ., West Lafayette, IN, USA, 2001.
[19]. J. Vaidya, “Privacy-preserving linear
programming,” in Proc. 24th ACM Symp.
Appl. Comput., 2009, pp. 2002–2007.
[20]. A. Bednarz, N. Bean, and M. Roughan,
“Hiccups on the road to privacy-
preserving linear programming,” in Proc.
ACM Workshop Privacy Electron. Soc.,
2009, pp. 117–120.
[21]. O. L. Mangasarian, “Privacy-preserving
linear programming,” Optim. Lett., vol. 5,
pp. 165–172, 2011.
[22]. O. L. Mangasarian, “Privacy-preserving
horizontally partitioned linear programs,”
Optim. Lett., vol. 6, no. 3, pp. 431–436,
2012.
[23]. S. Goldwasser, Y. Kalai, and G.
Rothblum, “Delegating computation:
interactive proofs for muggles,” in Proc.
40th Annu. ACM Symp. Theory Comput.,
2008, pp. 113–122.
[24]. P. Golle and I. Mironov, “Uncheatable
distributed computations,” in Proc. Conf.
Topics Cryptol.: The Cryptographer’s
Track RSA, 2001, pp. 425–440.
[25]. D. Szajda, B. G. Lawson, and J. Owen,
“Hardening functions for large scale
distributed computations,” in Proc. IEEE
Symp. Secur. Privacy, 2003, pp. 216–224.
[26]. D. Szajda, B. G. Lawson, and J. Owen,
“Hardening functions for large scale
distributed computations,” in Proc. IEEE
Symp. Secur. Privacy, 2003, pp. 216–224.
[27]. Cong Wang, Kui Ren, and Jia Wang,
“Secure Optimization Computation
Outsourcing in Cloud Computing: A Case
Study of Linear Programming”, in IEEE
transactions on computers, vol. 65, No. 1,
January 2016, pp. 219.
[28]. V. Strassen, “Gaussian elimination is not
optimal,” Numer. Math., vol. 13, pp. 354–
356, 1969.
[29]. D. Coppersmith and S. Winograd, “Matrix
multiplication via arithmetic
progressions,” in Proc. 19th Annu. ACM
Symp. Theory Comput., 1987, pp. 1–6.
[30]. D. Luenberger and Y. Ye, Linear and
Nonlinear Programming, 3rd ed. New
York, NY, USA: Springer, 2008.