Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 4
Abstract
Cloud computing provides immense computing power with reduced cost. User can outsource their vast computational work to the cloud and use massive computational power, storage, software, network etc. Despite all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data. Outsourcing and computation compromises the security of data being stored on cloud computing. Considering cloud as insecure platform a system must be designed that protects data by encryption and as well as produces correct result without any cheating resilience with the help of result verification. In this paper, we study the secure outsourcing and computation of linear programming by capturing the effects of arguments which are of first order and that provides practical efficiency. To achieve efficiency linear programming conditions are implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The parameters of LP are owned by the customer. For validating the obtained output of computation, we use duality theorem of linear programming that derives the required condition that the result must fulfil.
Authors and Affiliations
Shephali Singh, Puneet Sharma, Dr. Deepak Arora
Impact of Initialization shapes on the Performance ofWaveform Optimization
This paper aims to examine the effect of initialization for the shape of waveform that can be used in multicarrier systems such asOrthogonal Frequency-Division Multiplexing (OFDM) and Filter Bank Multi-Carrier (FBMC)for...
Analysis and Improvement of the Steering Characteristics of an ATV
The main objective is to analyze the steering characteristics of an ATV (All Terrain vehicles) in order to improve the maneuverability of the vehicle. It is found that in our last year’s BAJA buggy the vehicle oversteerd...
General Summary of Cryptography
Cryptographic mechanisms are an important security component of an operating system in securing the system itself and its communication paths. Indeed in many situations cryptography is the only tool that can solve a part...
A Bivariate Exponential distribution model for growth hormone response to repeated maximal cycle ergometer exercise at different pedaling rates.
In this paper, we introduce the bivariate exponential distribution model approach to probability modeling. Our results leads to exponential model characterization of many well known life time model to the development of...
A 0.6-V 2-nA CMOS Current Reference Circuit
This paper proposes a 0.6-V current reference circuit for use in ultra-low-power applications. In a conventional resistorlessbeta-multiplier current reference circuit, a MOSFET that operates in the strong inversion and t...