Abstract
:Cloud Computing has great potential of
providing robust computational power to the society at reduced cost. It enables
customers with limited computational resources to outsource their large
computation workloads to the cloud, and economically enjoy the massive
computational power, bandwidth, storage, and even appropriate software that can
be shared in a pay-per-use manner. Despite the tremendous benefits,
security is the primary obstacle that prevents the wide adoption of this promising computing model,
especially for customers when their
confidential data are consumed and produced during the computation. Treating the cloud as an
intrinsically insecure computing
platform from the viewpoint of the cloud customers, we must design mechanisms that not
only protect sensitive information by enabling computations with encrypted
data, but also protect customers
from malicious behaviors by enabling the
validation of the computation result. Such a mechanism of general secure computation outsourcing
was recently shown to be feasible
in theory, but to design mechanisms that are practically efficient remains a very challenging
problem. Focusing on engineering
computing and optimization tasks, this
paper investigates secure outsourcing of widely applicable linear programming (LP) computations.
In order to achieve practical
efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into
public LP solvers running on the
cloud and private LP parameters owned by the customer. The resulting flexibility allows us to
explore appropriate security/ efficiency
tradeoff via higher-level abstraction of LP computations than the general circuit
representation. In particular, by formulating private data owned by the
customer for LP problem as a set
of matrices and vectors, we are able to develop a set of efficient privacy-preserving problem
transformation techniques, which
allow customers to transform original LP problem into some arbitrary one while protecting
sensitive input/output information. To
validate the computation result, we further explore the fundamental duality theorem of LP
computation and derive the
necessary and sufficient conditions that correct result must satisfy. Such
result verification mechanism is extremely efficient and incurs close-to-zero additional
cost on both cloud server and customers.
Extensive security analysis and experiment results show the immediate practicability of
our mechanism design.
DHS Projects is developing all latest IEEE Projects & for Phd, M.Tech, ME, B.Tech, BE, MCA, MSc IT / CS / EC students in various domains. We are developing the projects in NS2, Java, J2EE, J2ME, Android, Dot Net C#, ASP.Net & Embedded SystemTechnologies. We are the developers and assure the students will get excellent and quality projects from us which will help them to score high mark in their exams. If you want to develop your base papers please email to us we can develop it.
Subscribe to:
Post Comments (Atom)
IEEE 2023: WEB SECURITY OR CYBER CRIME
IEEE 2023: Machine Learning and Software-Defined Networking to Detect DDoS Attacks in IOT Networks Abstract: In an era marked by the r...
-
IEEE 2020: APPLICATION OF BLOCK CHAINING TECHNOLOGY IN FINANCE AND ACCOUNTING FIELD Abstract: Block chaining technology is a distr...
-
IEEE 2021: Convolution Neural Network model to detect and classify Tuberculosis (TB) manifestation in X-ray ABSTRACT: In developing...
No comments:
Post a Comment