Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review

Abstract

Cloud computing provides immense computing power with reduced cost. User can outsource their vast computational work to the cloud and use massive computational power, storage, software, network etc. Despite all these benefits there are still few obstacles in cloud computing regarding confidentiality and integrity of data. Outsourcing and computation compromises the security of data being stored on cloud computing. Considering cloud as insecure platform a system must be designed that protects data by encryption and as well as produces correct result without any cheating resilience with the help of result verification. In this paper, we study the secure outsourcing and computation of linear programming by capturing the effects of arguments which are of first order and that provides practical efficiency. To achieve efficiency linear programming conditions are implemented. The LP computation are done explicitly decomposing LP problem that are run on cloud. The parameters of LP are owned by the customer. For validating the obtained output of computation, we use duality theorem of linear programming that derives the required condition that the result must fulfil.

Authors and Affiliations

Shephali Singh, Puneet Sharma, Dr. Deepak Arora

Keywords

Related Articles

Impact of Initialization shapes on the Performance ofWaveform Optimization

This paper aims to examine the effect of initialization for the shape of waveform that can be used in multicarrier systems such asOrthogonal Frequency-Division Multiplexing (OFDM) and Filter Bank Multi-Carrier (FBMC)for...

Analysis and Improvement of the Steering Characteristics of an ATV

The main objective is to analyze the steering characteristics of an ATV (All Terrain vehicles) in order to improve the maneuverability of the vehicle. It is found that in our last year’s BAJA buggy the vehicle oversteerd...

General Summary of Cryptography

Cryptographic mechanisms are an important security component of an operating system in securing the system itself and its communication paths. Indeed in many situations cryptography is the only tool that can solve a part...

A Bivariate Exponential distribution model for growth hormone response to repeated maximal cycle ergometer exercise at different pedaling rates.

In this paper, we introduce the bivariate exponential distribution model approach to probability modeling. Our results leads to exponential model characterization of many well known life time model to the development of...

A 0.6-V 2-nA CMOS Current Reference Circuit

This paper proposes a 0.6-V current reference circuit for use in ultra-low-power applications. In a conventional resistorlessbeta-multiplier current reference circuit, a MOSFET that operates in the strong inversion and t...

Download PDF file
  • EP ID EP391074
  • DOI 10.9790/9622-0704066468.
  • Views 103
  • Downloads 0

How To Cite

Shephali Singh, Puneet Sharma, Dr. Deepak Arora (2017). Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Review. International Journal of engineering Research and Applications, 7(4), 64-68. https://europub.co.uk/articles/-A-391074