Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 4
Abstract
Cloud computing provides immense computing power with reduced cost. User can outsource their vast computational work to the cloud and use massive computational power, storage, software, network etc. Despite all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data. Outsourcing and computation compromises the security of data being stored on cloud computing. Considering cloud as insecure platform a system must be designed that protects data by encryption and as well as produces correct result without any cheating resilience with the help of result verification. In this paper, we study the secure outsourcing and computation of linear programming by capturing the effects of arguments which are of first order and that provides practical efficiency. To achieve efficiency linear programming conditions are implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The parameters of LP are owned by the customer. For validating the obtained output of computation, we use duality theorem of linear programming that derives the required condition that the result must fulfil.
Authors and Affiliations
Shephali Singh, Puneet Sharma, Dr. Deepak Arora
Sizing of a Grid-Tied Solar System for a Residential Buildings in Jordan
Grid-Tied solar systems is now used in commercial and residential buildings. It is a demanding task to integrate the renewable energy resources into the power grid. The main objective of this paper is to present an analy...
Fusion Enhanced Image Stitching Using Dct and Dchwt
Image fusion is the process by which two or more images are combined into a single image retaining the important features from each of the original images. In this paper, output of SURF and SIFT are used as input images...
A Comparative Study of Optical Character Recognition for Printed and Handwritten Tamil Text
This paper compares the methodologies for recognizing printed Tamil text document with handwritten Tamil text. Each of the preprocessing phases uses various techniques. But both the techniques are used to extract the fea...
Project Teams For Traditional And AgileProjects: Why Are They Different?
Traditional projects and Agile projects require different approaches to systematically structure and develop project teams. Agile projectteams, as compared to traditional teams, question assumptionsroutinely, innovate, p...
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ri...