Secure and Practical Outsourcing of Linear Programming in Cloud Computing.

Slides:



Advertisements
Similar presentations
Abstract There is significant need to improve existing techniques for clustering multivariate network traffic flow record and quickly infer underlying.
Advertisements

Types and components of computer systems
Operating System Security
多媒體網路安全實驗室 Towards Secure and Effective Utilization over Encrypted Cloud Data 報告人 : 葉瑞群 日期 :2012/05/09 出處 :IEEE Transactions on Knowledge and Data Engineering.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Computer Basics An overview of computer hardware ICT Tools: Computer Basics.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Minimum Cost Blocking Problem in Multi-path Wireless Routing Protocols.
DATA DYNAMICS AND PUBLIC VERIFIABILITY CHECKING WITHOUT THIRD PARTY AUDITOR GUIDED BY PROJECT MEMBERS: Ms. V.JAYANTHI M.E Assistant Professor V.KARTHIKEYAN.
HARDWARE SPECIFICATION Librarian Machines: (used for Management and Circulation, etc) Component Minimum Specification Recommended Specification Processor.
A Framework for Mining Signatures from Event Sequences and Its Applications in Healthcare Data.
Privacy-Preserving Public Auditing for Secure Cloud Storage
BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform.
Improving Network I/O Virtualization for Cloud Computing.
m-Privacy for Collaborative Data Publishing
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
The Four Parts of a Computer. Definition of a Computer A computer is an electronic device used to process data, converting the data into information that.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Identity-Based Distributed Provable Data Possession in Multi-Cloud Storage.
Privacy Preserving Delegated Access Control in Public Clouds.
Anomaly Detection via Online Over-Sampling Principal Component Analysis.
Abstract With the advent of cloud computing, data owners are motivated to outsource their complex data management systems from local sites to the commercial.
Privacy Preserving Back- Propagation Neural Network Learning Made Practical with Cloud Computing.
Participatory Privacy: Enabling Privacy in Participatory Sensing
Preventing Private Information Inference Attacks on Social Networks.
Presenting By CH . MADHURI(12QU1D5806) Under the supervision of
Supporting Privacy Protection in Personalized Web Search.
Under The Guidance of Smt. Ch.Ratna Kumari Asst.Professor Submitted by M Ravi Kumar Roll No:10021F0006 M.C.A.
m-Privacy for Collaborative Data Publishing
Attribute-Based Encryption With Verifiable Outsourced Decryption.
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
Introduction To Computers
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Load Rebalancing for Distributed File Systems in Clouds.
Guided By: Prof. Rajarshree Karande JSPM’S IMPERIAL COLLEGE OF ENGINEERING & RESEARCH WAGHOLI, PUNE Group MemberRoll No. Abhijeet Aralgundkar03.
CAPTCHA AS GRAPHICAL PASSWORDS—A NEW SECURITY PRIMITIVE BASED ON HARD AI PROBLEMS ASHWINI B.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
BY. Secured Data Transmission through Network handles hiding a secret message with in an image in such a way that others cannot discern the presence or.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Maitrayee Mukerji. INPUT MEMORY PROCESS OUTPUT DATA INFO.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
PRESENTED BY. Keywords Firewall : Any barrier that is intended to thwart the spread of a destructive agent. Computer Definition : A system designed to.
CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring.
BY S.S.SUDHEER VARMA (13NT1D5816)
Advanced Higher Computing Science
HOW IT WORKS ….
Searchable Encryption in Cloud
Security Using Armstrong Numbers and Authentication using Colors
Under the Guidance of V.Rajashekhar M.Tech Assistant Professor
Towards Scalable Traffic Management in Cloud Data Centers
Under Guidance- Internal Guide- Ms. Shruti T.V
EXTRACTING SPREAD-SPECTRUM HIDDEN DATA FROM DIGITAL MEDIA
ABSTRACT   Recent work has shown that sink mobility along a constrained path can improve the energy efficiency in wireless sensor networks. Due to the.
STEGANOGRAPHY.
WEB BASED CENTRAL LIBRARY
Department Of Computer Science Engineering
Cloud Computing By P.Mahesh
NYMBLE: BLOCKING MISBEHAVING USERS IN ANONYMIZING NETWORKS
Confidentiality and Privacy Controls
Computer Hardware.
ONLINE SECURE DATA SERVICE
Helen: Maliciously Secure Coopetitive Learning for Linear Models
Computer Electronic device Accepts data - input
Practice Management & Patient Health Record sharing system
Presentation transcript:

Secure and Practical Outsourcing of Linear Programming in Cloud Computing

Abstract  Cloud Computing has great potential of providing robust computational power to the society at reduced cost.  It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner.  Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation.

Existing System ->Despite the tremendous benefits, outsourcing computation to the commercial public cloud is also depriving customers’ direct control over the systems that consume and produce their data during the computation. -> On the one hand, the outsourced computation workloads often contain sensitive information, such as the business financial records, proprietary research data, or personally identifiable health information etc.

Proposed System  The outsourced computation workloads often contain sensitive information, such as the business financial records, proprietary research data, or personally identifiable health information etc.  To combat against unauthorized information leakage, sensitive data have to be encrypted before outsourcing so as to provide end to- end data confidentiality assurance in the cloud and beyond.  The operational details inside the cloud are not transparent enough to customers. As a result, there do exist various motivations for cloud server to behave unfaithfully and to return incorrect results.  They may behave beyond the classical semi honest model

MODULE & DESCRITPION  Mechanism Design Framework  Basic Techniques  Enhanced Techniques via Affine Mapping  Result Verification

Mechanism Design Framework  We propose to apply problem transformation for mechanism design.  The general framework is adopted from a generic approach, while our instantiation is completely different and novel.  In this framework, the process on cloud server can be represented by algorithm ProofGen and the process on customer can be organized into three algorithms (KeyGen, ProbEnc, ResultDec). These four algorithms are summarized below and will be instantiated later.

Basic Technique KeyGen(1k) → {K}. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. KeyGen(1k) → {K}. This is a randomized key generation algorithm which takes a system security parameter k, and returns a secret key K that is used later by customer to encrypt the target LP problem. ProbEnc(K,_) → {_K}. This algorithm encrypts the input tuple _ into _K with the secret key K. According to problem transformation, the encrypted input _K has the same form as _, and thus defines the problem to be solved in the cloud. ProbEnc(K,_) → {_K}. This algorithm encrypts the input tuple _ into _K with the secret key K. According to problem transformation, the encrypted input _K has the same form as _, and thus defines the problem to be solved in the cloud.

Basic Technique-2 ProofGen(_K) → {(y, )}. This algorithm arguments a generic solver that solves the problem _K to produce both the output y and a proof. The output y later decrypts to x, and is used later by the customer to verify the correctness of y or x. ProofGen(_K) → {(y, )}. This algorithm arguments a generic solver that solves the problem _K to produce both the output y and a proof. The output y later decrypts to x, and is used later by the customer to verify the correctness of y or x. ResultDec(K,_, y, ) → {x, ⊥ }. This algorithm may choose to verify either y or x via the proof. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation faithfully. ResultDec(K,_, y, ) → {x, ⊥ }. This algorithm may choose to verify either y or x via the proof. In any case, a correct output x is produced by decrypting y using the secret K. The algorithm outputs ⊥ when the validation fails, indicating the cloud server was not performing the computation faithfully.

Enhanced Techniques via Affine Mapping  To enhance the security strength of LP outsourcing, we must be able to change the feasible region of original LP and at the same time hide output vector x during the problem input encryption.  We propose to encrypt the feasible region of _ by applying an affine mapping on the decision variables x.  This design principle is based on the following observation: ideally, if we can arbitrarily transform the feasible area of problem _ from one vector space to another and keep the mapping.  Function as the secret key, there is no way for cloud server to learn the original feasible area information.  Further, such a linear mapping also serves the important purpose of output hiding.

Result Verification  We have been assuming the server is honestly performing the computation, while being interested learning information of original LP problem.  However, such semi honest model is not strong enough to capture the adversary behaviors in the real world.  In many cases, especially when the computation on the cloud requires a huge amount of computing resources, there exists strong financial incentives for the cloud server.

CONCLUSIONS  We formalize the problem of securely outsourcing LP computations in cloud computing, and provide such a practical mechanism design which fulfills input/output privacy, cheating resilience, and efficiency.  By explicitly decomposing LP computation outsourcing into public LP solvers and private data, our mechanism design is able to explore appropriate security/efficiency tradeoffs via higher level LP computation than the general circuit representation.  We develop problem transformation techniques that enable customers to secretly transform the original LP into some arbitrary one while protecting sensitive input/output information.

Hardware Requirements  Processor - Pentium –III  Speed GHz  RAM MB  Hard Disk - 20 GB  Floppy Drive MB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA

Software Requirements  OperatingSystem:Windows95/98/2000/XP  Application Server: Tomcat5.0/6.X Front End : HTML, Java, Jsp, Ajax  Scripts : JavaScript.  Server side Script: Java Server Pages.  Database : Mysql  Database Connectivity : JDBC.