14-04-2012, 08:57 PM
please send cloud computing project to my mail
abcdefgopal5u[at]gmail.com
14-04-2012, 08:57 PM
please send cloud computing project to my mail abcdefgopal5u[at]gmail.com
16-04-2012, 11:27 AM
to get information about the topic "secure and practical outsourcing of linear programming in cloud computing" related topic refer the link bellow https://seminarproject.net/Thread-secure...l-2011-ppt
18-09-2012, 01:31 PM
Secure and Practical Outsourcing of Linear Programming in Cloud Computing
Secure and Practical Outsourcing.doc (Size: 2.8 MB / Downloads: 49) INTRODUCTION Cloud computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud. It economically enjoys the massive computational power, bandwidth, storage and even appropriate software that can be shared in a pay-per-use manner. Cloud computing is the delivery of computing as a service rather than a product. These services are broadly divided into 3 categories: Infrastructure-as-a-Service, Platform as-a-Service and Software-as-a-Service. In Infrastructure as a Service (IaaS), cloud providers offer computers – as physical or more often as virtual machines, raw (block) storage, firewalls, load balancers, and networks. In the Platform as-a-Service (PaaS) model, cloud providers deliver a computing platform and/or solution stack typically including operating system, programming language execution environment, database and web server. Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers. In Software-as-a-Service (SaaS) model, cloud providers install and operate application software in the cloud and cloud users access the software from cloud clients. The cloud users do not manage the cloud infrastructure and platform on which the application is running. This eliminates the need to install and run the application on the cloud user's own computers simplifying maintenance and support. End users access cloud based applications through a web browser or a light weight desktop or mobile application while the business software and data are stored on servers at a remote location. Cloud application providers strive to give the same or better service and performance than if the software programs were installed locally on end-user computers. FEASIBILITY STUDY The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. There are three dimensions of feasibility study which are as follows, • Economical Feasibility • Technical Feasibility • Operational Feasibility EXISTING SYSTEM Despite the tremendous benefits, outsourcing computation to the commercial public cloud is also depriving customers’ direct control over the systems that consume and produce their data during the computation, which inevitably brings in new security concerns and challenges towards this promising computing model. The operational details inside the cloud are not transparent enough to customers. As a result, there do exist various motivations for cloud server to behave unfaithfully and to return incorrect results. The data that is stored in the cloud can easily be viewed and accessed by the outsiders. They may also alter the data. Thus, the cloud is not secure from the viewpoint of customers. Without providing a mechanism for secure computation outsourcing, i.e., to protect the sensitive input and output information of the workloads and to validate the integrity of the computation result, it would be hard to expect cloud customers to turn over control of their workloads from local machines to cloud solely based on its economic savings and resource flexibility. PROPOSED SYSTEM The outsourced information contains information that belongs vital part of an organization like secrecy, security etc. The outsourced information is encrypted and stored into the cloud. Then it is decrypted from the cloud. Linear programming solution is used to solve this problem. To validate the computational result, the duality theorem of linear programming is used. Such a result verification mechanism is extremely efficient for outsourcing in the cloud. Background on linear programming A problem is formulated as a mathematical programming problem that seeks the values for a set of decision variables to minimize (or maximize) an objective function representing the cost subject to a set of constraints. The linear programming requires an objective function and the constraints. The constraints that are in the form of linear equations or inequalities. The constraints in the form of inequality equation can be expressed as equality constraints by introducing a non-negative slack or surplus variable. A linear programming problem can be modeled as follows, A function z = c1 x1 + c2 x2 is to be maximized or minimized subject to constraints, PROJECT DESCRIPTION The outsourced information is encrypted and stored into the cloud. Outsiders can view only the encrypted form of the information and not the original data or information. The text information or a file or an image can be encrypted and stored in the cloud. The administrator uploads the file using the e-mail id and password into the cloud. The users first register their details and using the e-mail id and password can login and download the file. The user must know the e-mail id of the uploaded user (administrator) for unlocking the file. After the file is unlocked the file/image is ready to download. The page includes file name, key, downloading limit which shows the maximum number of times that the file can be downloaded, downloading the image/file. The speed of the file downloading is also displayed. While clicking the download button, a dialog box is opened where the file can be opened or saved. The user details are maintained by the administrator. Linear programming solution is used for the correctness of the outsourced information. |
|