CFP last date
20 May 2024
Reseach Article

An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing

by M. Madhura, R. Santosh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 43 - Number 7
Year of Publication: 2012
Authors: M. Madhura, R. Santosh
10.5120/6118-8318

M. Madhura, R. Santosh . An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing. International Journal of Computer Applications. 43, 7 ( April 2012), 36-39. DOI=10.5120/6118-8318

@article{ 10.5120/6118-8318,
author = { M. Madhura, R. Santosh },
title = { An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 43 },
number = { 7 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 36-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume43/number7/6118-8318/ },
doi = { 10.5120/6118-8318 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:32:50.273891+05:30
%A M. Madhura
%A R. Santosh
%T An Efficient and Secure Nonlinear Programming Outsourcing in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 43
%N 7
%P 36-39
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing provides a appropriate on-demand network access to a shared pool of configurable computing resources which could be rapidly deployed with much more great efficiency and with minimal overhead to management. This paper deals with the secure outsourcing of nonlinear programming. It provides a practical mechanism design which fulfils input/output privacy, cheating resilience, and efficiency. In the proposed approach practical efficiency is achieved by explicit decomposition of NLP into NLP solvers running on the cloud and private NLP parameters owned by the customer. When compared to the general circuit representation the resulting flexibility allows exploring appropriate security/efficiency trade-off via higher-level abstraction of NLP computations. It is possible to construct a set of effective privacy-preserving transformation techniques for any problem, by framing a private data possessed by the client for NLP problem as a combination of matrices and vectors, which allow customers to transform original NLP problem into some arbitrary value while defending sensitive input or output information. To confirm the computational result, the fundamental duality theorem of NLP computation should be explored and then derive the essential and adequate constraints that a accurate result must satisfy. Such a result verification mechanism is very competent and suffers close-to-zero extra cost on both cloud server and customers. .

References
  1. Cong Wang, Kui Ren, and Jia Wang, Secure and Practical Outsourcing of Linear Programming in Cloud Computing, Illinois Institute of Technology.
  2. Gentry C. 2009 Fully homomorphic encryption using ideal lattices. In STOC, 169-178.
  3. Smart N. P. and Vercauteren F. 2009 Fully homomorphic encryption with relatively small key and ciphertext sizes.
  4. Atallah M. and Frikken K. 2010 Securely outsourcing linear algebra computations. In Proceedings of ASIACCS, 48–59.
  5. Luenberger D. and Ye Y. 2008 Linear and Nonlinear Programming. 3rd ed.
  6. Coppersmith D. and Winograd S. 1987 Matrix multiplication via arithmetic progressions. In Proceedings of STOC'87, 1–6.
  7. Shamir A. 1979 How to share a secret. In Communications of ACM, vol. 22, no. 11, 612–613.
  8. Yu S. , Wang C. , Ren K. , Lou W. 2010 Achieving secure, scalable, and fine-grained access control in cloud computing. In Proceedings of IEEE INFOCOM'10.
  9. Li J. and Atallah M. J. 2006 Secure and private collaborative linear programming. In Proceedings of Collaborate Communication.
Index Terms

Computer Science
Information Sciences

Keywords

Non-linear Programming Cloud Computing Privacy Preservation Information Security Outsourcing