CFP last date
22 April 2024
Reseach Article

Secure and Practical Outsourcing of Linear Programming in Cloud Computing: A Survey

by V. Sudarsan Rao, N. Satyanarayana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 159 - Number 4
Year of Publication: 2017
Authors: V. Sudarsan Rao, N. Satyanarayana
10.5120/ijca2017912903

V. Sudarsan Rao, N. Satyanarayana . Secure and Practical Outsourcing of Linear Programming in Cloud Computing: A Survey. International Journal of Computer Applications. 159, 4 ( Feb 2017), 1-4. DOI=10.5120/ijca2017912903

@article{ 10.5120/ijca2017912903,
author = { V. Sudarsan Rao, N. Satyanarayana },
title = { Secure and Practical Outsourcing of Linear Programming in Cloud Computing: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2017 },
volume = { 159 },
number = { 4 },
month = { Feb },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume159/number4/26986-2017912903/ },
doi = { 10.5120/ijca2017912903 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:04:48.831078+05:30
%A V. Sudarsan Rao
%A N. Satyanarayana
%T Secure and Practical Outsourcing of Linear Programming in Cloud Computing: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 159
%N 4
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

How to protect the data that is processed and generated by the customers, is becoming the major concern in the present day situation. Various engineering, computing and optimization techniques are being used to solve this problem. The investigation has been performed for secure outsourcing of problem for the large-scale systems. In this paper, the essential terms involved in the cloud security has been presented. Whereas, the privacy cheating discouragement ”Seccloud”, is used for achieving the greater aspects of security. Although the cloud computing is being used to outsource large-scale computations to the cloud, data privacy has become a major issue. In this paper, the modern cryptographic techniques in secure outsourcing along with the research work, which has been proposed in past years, has been presented. Based on some drawback measures, the identification of the problem in the current scenario has been done. This paper also discusses about the motivation towards the problem and our future research directions.

References
  1. M. Atallah and K. Frikken, Securely outsourcing linear algebra computations, in Proc. 5th ACM Symp. Inf., Comput. Commun. Security, 2010, pp. 48?59.
  2. M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. H. Spafford, Secure outsourcing of scientific computations, Adv. Comput., vol. 54, pp. 215?272, Jan. 2002.
  3. M. J. Atallah and J. Li, Secure outsourcing of sequence comparisons, Int. J. Inf. Secur., vol. 4, no. 4, pp. 277?287, Oct. 2005.
  4. Peeter Laud, Alisa Pankova, On the (Im)possibility of Privately Outsourcing Linear Programming, ACM, (CCSW’13), November 8, 2013.
  5. D. Benjamin and M. J. Atallah, Private and cheating-free outsourcing of algebraic computations, in Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST), Oct. 2008, pp. 240?245.
  6. C.Wang, K. Ren, J.Wang and Q.Wang, Harnessing the cloud for securely outsourcing large-scale systems of linear equations, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1172?1181, Jun. 2013.
  7. C. Wang, K. Ren and J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in Proc. 30th IEEE Int. Conf. Comput. Commun. (INFOCOM), Apr. 2011, pp. 820?828.
  8. Cong wang, kui Ren, Harnessing the cloud for securely solving large scale systems of linear equations, Distributed computing systems (ICDCS), 2011 31st International conference on 20-24 june 2011.
  9. Lifei wei, Haojin Zhu, security and privacy for storage and computation in cloud computing, information sciences 258 (2014) 371-386.
  10. Xiaofeng Chen, Xinyi Huang, New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations, IEEE transactions on information forensics and security, vol. 10, no. 1, january 2015.
  11. Cong Wang, Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming, IEEE transactions on computers, vol. 65, no. 1, january 2016.
  12. P. Mell and T. Grance, Draft nist working definition of cloud computing, Referenced on Jan. 23rd, 2010 Online at http://csrc.nist.gov/groups/SNS/cloud-computing/index.html, 2010.
  13. S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations, in Proc. of TCC, 2005, pp. 264?282.
  14. R. Gennaro, C. Gentry and B. Parno, Non-interactive verifiable computing: Outsourcing computation to untrusted workers, in Proc. of CRYPTO, Aug. 2010.
  15. C. Gentry, Computing arbitrary functions of encrypted data, Commun. ACM, vol. 53, no. 3, pp. 97?105, 2010.
  16. P. Golle and I. Mironov, Uncheatable distributed computations, in Proc. of CT-RSA, 2001, pp. 425?440.
  17. S. Yu, C. Wang, K. Ren and W. Lou, Achieving secure, scalable, and fine-grained access control in cloud computing, in Proc. of IEEE INFOCOM?10, San Diego, CA, USA, March 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Confidential Data Secure Outsourcing Algorithms Problem Optimization Cloud Computing