SlideShare a Scribd company logo
Secure Optimization Computation Outsourcing in Cloud Computing: A Case
Study of Linear Programming
Abstract:
Cloud computing enables an economically promising paradigm of computation
outsourcing. However, how to protect customers confidential data processed and
generated during the computation is becoming the major security concern.
Focusing on engineering computing and optimization tasks, this paper
investigates secure outsourcing of widely applicable linear programming (LP)
computations. Our mechanism design explicitly decomposes LP computation
outsourcing into public LP solvers running on the cloud and private LP parameters
owned by the customer. The resulting flexibility allows us to explore appropriate
security/efficiency tradeoff via higher-level abstraction of LP computation than
the general circuit representation. Specifically, by formulating private LP problem
as a set of matrices/vectors, we develop efficient privacy-preserving problem
transformation techniques, which allow customers to transform the original LP
into some random one while protecting sensitive input/output information. To
validate the computation result, we further explore the fundamental duality
theorem of LP and derive the necessary and sufficient conditions that correct
results must satisfy. Such result verification mechanism is very efficient and incurs
close-to-zero additional cost on both cloudserver and customers. Extensive
security analysis and experiment results show the immediate practicability of our
mechanism design.

More Related Content

DOCX
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
PPTX
Projects on Cloud Computing
PDF
Distributed in memory processing of all k nearest neighbor queries
PDF
Data compression, data security, and machine learning
PDF
Modeling of multiversion concurrency control
PDF
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
PDF
Google Cloud infrastructure in Conrad Connect by Google & waylay
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Projects on Cloud Computing
Distributed in memory processing of all k nearest neighbor queries
Data compression, data security, and machine learning
Modeling of multiversion concurrency control
Dotnet modeling and optimizing the performance- security tradeoff on d-ncs u...
Google Cloud infrastructure in Conrad Connect by Google & waylay

What's hot (7)

PPTX
Cloud computing
PPTX
PhD Thesis in Sdn Projects
PPTX
Computer Architecture Seminar
PPTX
MATLAB Simulink Research Help
PPTX
MATLAB Thesis for Students
PPTX
PhD Thesis Network Simulator Projects
Cloud computing
PhD Thesis in Sdn Projects
Computer Architecture Seminar
MATLAB Simulink Research Help
MATLAB Thesis for Students
PhD Thesis Network Simulator Projects
Ad

Viewers also liked (14)

PPTX
android technology presentation
PPTX
Braingate technology
PPTX
Android technology _seminar_ ppt
PPTX
BRAIN GATE
PPTX
Android OS Presentation
PDF
Report on google glass(in pdf)
PPT
Brain gate
PPTX
My presentation on Android in my college
PPT
Android seminar-presentation
PPTX
Brain gate
PPTX
Android ppt
PPTX
Brain gate
PDF
Google glass ppt
PPT
android technology presentation
Braingate technology
Android technology _seminar_ ppt
BRAIN GATE
Android OS Presentation
Report on google glass(in pdf)
Brain gate
My presentation on Android in my college
Android seminar-presentation
Brain gate
Android ppt
Brain gate
Google glass ppt
Ad

Similar to Secure optimization computation outsourcing in cloud computing a case study of linear programming (20)

PDF
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Secure optimization computation outsourcing in cloud computing a case study o...
PDF
Data Security in Cloud Computing Using Linear Programming
PDF
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
PDF
Harnessing the cloud for securely outsourcing large scale systems of linear e...
DOCX
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
DOCX
Harnessing the cloud for securely outsourcing
DOCX
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equat...
DOCX
NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUAT...
DOCX
New algorithms for secure outsourcing of
PDF
Lm2519942003
PDF
Lm2519942003
PDF
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
PDF
A tutorial on secure outsourcing of large scalecomputation for big data
Secure Outsourcing of Linear Programming in Cloud Computing Environment: A Re...
Secure optimization computation outsourcing in cloud computing a case study o...
Secure optimization computation outsourcing in cloud computing a case study o...
Data Security in Cloud Computing Using Linear Programming
Secure Outsourcing Mechanism for Linear Programming in Cloud Computing
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
Harnessing the cloud for securely outsourcing large scale systems of linear e...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Harnessing the cloud for securely outsourcing
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equat...
NEW ALGORITHMS FOR SECURE OUTSOURCING OF LARGE-SCALE SYSTEMS OF LINEAR EQUAT...
New algorithms for secure outsourcing of
Lm2519942003
Lm2519942003
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
A tutorial on secure outsourcing of large scalecomputation for big data

More from ieeepondy (20)

PDF
Demand aware network function placement
PDF
Service description in the nfv revolution trends, challenges and a way forward
PDF
Spatial related traffic sign inspection for inventory purposes using mobile l...
PDF
Standards for hybrid clouds
PDF
Rfhoc a random forest approach to auto-tuning hadoop's configuration
PDF
Resource and instance hour minimization for deadline constrained dag applicat...
PDF
Reliable and confidential cloud storage with efficient data forwarding functi...
PDF
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
PDF
Scalable cloud–sensor architecture for the internet of things
PDF
Scalable algorithms for nearest neighbor joins on big trajectory data
PDF
Robust workload and energy management for sustainable data centers
PDF
Privacy preserving deep computation model on cloud for big data feature learning
PDF
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
PDF
Protection of big data privacy
PDF
Power optimization with bler constraint for wireless fronthauls in c ran
PDF
Performance aware cloud resource allocation via fitness-enabled auction
PDF
Performance limitations of a text search application running in cloud instances
PDF
Performance analysis and optimal cooperative cluster size for randomly distri...
PDF
Predictive control for energy aware consolidation in cloud datacenters
PDF
Over flow multi site aware big data management for scientific workflows on cl...
Demand aware network function placement
Service description in the nfv revolution trends, challenges and a way forward
Spatial related traffic sign inspection for inventory purposes using mobile l...
Standards for hybrid clouds
Rfhoc a random forest approach to auto-tuning hadoop's configuration
Resource and instance hour minimization for deadline constrained dag applicat...
Reliable and confidential cloud storage with efficient data forwarding functi...
Rebuttal to “comments on ‘control cloud data access privilege and anonymity w...
Scalable cloud–sensor architecture for the internet of things
Scalable algorithms for nearest neighbor joins on big trajectory data
Robust workload and energy management for sustainable data centers
Privacy preserving deep computation model on cloud for big data feature learning
Pricing the cloud ieee projects, ieee projects chennai, ieee projects 2016,ie...
Protection of big data privacy
Power optimization with bler constraint for wireless fronthauls in c ran
Performance aware cloud resource allocation via fitness-enabled auction
Performance limitations of a text search application running in cloud instances
Performance analysis and optimal cooperative cluster size for randomly distri...
Predictive control for energy aware consolidation in cloud datacenters
Over flow multi site aware big data management for scientific workflows on cl...

Recently uploaded (20)

PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PPT
Chapter 6 Design in software Engineeing.ppt
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PPTX
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
PPTX
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
anatomy of limbus and anterior chamber .pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
436813905-LNG-Process-Overview-Short.pptx
PPTX
web development for engineering and engineering
PPTX
Internship_Presentation_Final engineering.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Practice Questions on recent development part 1.pptx
PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Chapter 6 Design in software Engineeing.ppt
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Road Safety tips for School Kids by a k maurya.pptx
The-Looming-Shadow-How-AI-Poses-Dangers-to-Humanity.pptx
24AI201_AI_Unit_4 (1).pptx Artificial intelligence
OOP with Java - Java Introduction (Basics)
anatomy of limbus and anterior chamber .pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
436813905-LNG-Process-Overview-Short.pptx
web development for engineering and engineering
Internship_Presentation_Final engineering.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
CH1 Production IntroductoryConcepts.pptx
Geodesy 1.pptx...............................................
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Practice Questions on recent development part 1.pptx
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx

Secure optimization computation outsourcing in cloud computing a case study of linear programming

  • 1. Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming Abstract: Cloud computing enables an economically promising paradigm of computation outsourcing. However, how to protect customers confidential data processed and generated during the computation is becoming the major security concern. Focusing on engineering computing and optimization tasks, this paper investigates secure outsourcing of widely applicable linear programming (LP) computations. Our mechanism design explicitly decomposes LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. The resulting flexibility allows us to explore appropriate security/efficiency tradeoff via higher-level abstraction of LP computation than the general circuit representation. Specifically, by formulating private LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the original LP into some random one while protecting sensitive input/output information. To validate the computation result, we further explore the fundamental duality theorem of LP and derive the necessary and sufficient conditions that correct results must satisfy. Such result verification mechanism is very efficient and incurs close-to-zero additional cost on both cloudserver and customers. Extensive security analysis and experiment results show the immediate practicability of our mechanism design.