Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review

Abstract

Cloud computing provides immense computing power with reduced cost. User can outsource their vast computational work to the cloud and use massive computational power, storage, software, network etc. Despite all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data. Outsourcing and computation compromises the security of data being stored on cloud computing. Considering cloud as insecure platform a system must be designed that protects data by encryption and as well as produces correct result without any cheating resilience with the help of result verification. In this paper, we study the secure outsourcing and computation of linear programming by capturing the effects of arguments which are of first order and that provides practical efficiency. To achieve efficiency linear programming conditions are implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The parameters of LP are owned by the customer. For validating the obtained output of computation, we use duality theorem of linear programming that derives the required condition that the result must fulfil.

Authors and Affiliations

Shephali Singh, Puneet Sharma, Dr. Deepak Arora

Keywords

Related Articles

Applying Mathematical Model to Determine Location Facilities Storage Optimally With Integrated Logistic System Of Supply Chain For the Industrial Area of The People

High logistics costs of Indonesia led to lower competitiveness of production Indonesia. To overcome this problem needs to be done implementation of logistics integrated and supply chain of input-output system of producti...

Design And Analysis of Fibre Reinforced Composite Ceiling Fan Blade

With the increasing energy crisis in the present and future generations facing in the society, there is a need to reduce and optimize the energy. Though wide range of researches is being done in the areas of alternate en...

Security Implementation on EAV model using Negative database and Shuffling.

This Paper presents an improvised security mechanism for EAV (Entity Attribute Value) data model. EAV data model for data storage has been used in various information systems now days as it gives an advantage of data fle...

Analysis of Pseudo-range Measurements Observed in NavIC Receiver

The Indian Regional Navigation Satellite System (IRNSS), also known as NavIC- Navigation with Indian Constellation provides real time positioning and timing services. The NavIC receivers are placed in different regions....

Comparative Study between Various PAPR Reduction Technique

This paper presents the comparative study between various PAPR reduction technique such as partial transmit sequence, DFT spreading, Clipping and filtering. The peak to average power ratio of the time domain envelope is...

Download PDF file
  • EP ID EP391074
  • DOI 10.9790/9622-0704066468.
  • Views 139
  • Downloads 0

How To Cite

Shephali Singh, Puneet Sharma, Dr. Deepak Arora (2017). Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review. International Journal of engineering Research and Applications, 7(4), 64-68. https://europub.co.uk/articles/-A-391074