Food & Beverages

2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138) IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR)www.ijrar.org 820 A Novel Method to Optimize the Computation Overhead in Clou

Description
In the current days cloud computing plays a very important role in almost all aspects of real time environments like mnc companies, colleges, hospitals, industries and IT companies. As we all know that almost all the cloud servers are storing and
Published
of 11
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Share
Transcript
   © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)   IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org  820 A Novel Method to Optimize the Computation Overhead in Cloud Computing by Using Linear Programming PAVANI  VELLALACHERVU #1 , PROF. I. RAMESH BABU   #2   #1  Assistant Professor, Dept of IT, Vignan ’s  Nirula Institute of Technology and Science for Women, Peda Palakaluru Road, Peda Palakaluru, Andhra Pradesh -522005. #2  Professor, Dept of CSE, Acharya Nagarjuna University,   NH16, Nagarjuna Nagar, Guntur, Andhra Pradesh 522510. ABSTRACT In the current days cloud computing plays a very important role in almost all aspects of real time environments like mnc companies, colleges, hospitals, industries and IT companies. As we all know that almost all the cloud servers are storing and accessing the data in a plain text rather than in an encrypted manner, so there is no form of security in the primitive cloud servers. If we assume that some cloud servers are using cryptography techniques in order to give security for the data, but there is a lot of time complexity for processing number of iterations and cycles to convert into cipher text. In order to reduce the time complexity for data storage in the cloud,in this proposed thesis we mainly try to implement the problem of linear programming (LP) for both public or private cloud service providers ,which is owned by the customer to provide security for their out sourced data. Specifically, by formulating private/Public LP problem as a set of matrices/vectors, we develop efficient privacy-preserving problem transformation techniques, which allow customers to transform the srcinal LP into some random one while protecting sensitive input/output information. Key Words: Cloud Computing, Cryptography, Time Complexity, Linear Programming, Privacy Preserving, Cloud Service Providers.   © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)   IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org  821 I.   Introduction   In current days cloud computing is one among the several domain for storing the data remotely in unknown machines which users do not own .Even though cloud domain has achieved a lot of users interest in storing and accessing the data to and from the remote server not from their local machines, it still face some problem in maintain the data in a secure way. As we all know there are several service providers who are giving cloud service for personal and enterprise usage like Google Drive, Siliconhouse.net, Box, Google, Microsoft,Drivehq and Drop Box. Hence by using these service providers users try to enjoy the benefits of data storage and accessing from the remote machines rather than concentrating on the acknowledgement of that remote machines [1].The main limitation for the current cloud servers is as all the data is stored on remote servers, no appropriate data user is concentrated with authentication of their sensitive data whether valid users are accessing this information or any un-authorized users try to access this data [2].This motivated me to propose a secure cloud in which data should not be accessed by un- authorized users who don’t have access privileges and one should have control over their data which is uploaded into the remote cloud servers. Figure. 1. Define Some Cloud Service Providers for Accessing and Storing the Data in Remote Systems From the above figure 1, we can clearly find out various cloud service providers who try to give facility of storing and accessing the data remote manner rather than from the local machines. As we all know that each and every service provider try to provide the main facility like try to store the user data based on their individual request and also try to provide a wide range of storage options based on the individual request. As many of them are showing their interest over cloud storage but still there is a problem like data is stored in the normal way or in the form of plain text without any encrypted manner. So as the data which is uploaded in the cloud is not stored in our own PC rather than it will be stored in a remote PC, there is no level of achieving data security in the current cloud service providers. This mainly motivated me to design and develop a novel facility like encryption of data   © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)   IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org  822 before it is stored into the cloud server and restricting un-authorized users not to access this server.And also for a real time experience drivehq service provider is taken as back end storage cloud for storing the encrypted data into the cloud[3] Although a normal cryptography technique can provide security for the data in terms of encrypting the plain text data into cipher text and also decrypting the cipher text data into plain text by authorized users.It still remains a problem like time complexity and computation overhead for converting plain text of data into cipher text during data upload and cipher text to plain text during data download.Hence it motivated me to adopt the problem of Linear Programming in which a random of two or more polynomial equations are taken by the data owner during data upload.Here the data owner try to choose the values for the polynomial equation and he try to encrypt the data and the same values need to be substituted by the valid data users in order to decrypt the data in a plain text manner.As we all know that for a single polynomial equation there are multiple outcomes with different parameters.So if an un- authorized user who don’t know the exact values try to substitu te his own values and then system will not allow that file to be downloaded[4]. II.   Related Work In this section we will mainly discuss about the preliminary information which is carried out in order to prove the performance of our proposed optimizing the computation overhead in cloud computing by using the problem of linear programming. Preliminaries In this section we try to find out the basic preliminaries that are required for developing our proposed application. They are as follows: For any cloud service providers that may be public/private or hybrid cloud, they are mainly 3 entities like:   1.   Data Owner Entity 2.   Cloud Server Entity and 3.   Data User/Search User Entity. Let us discuss about these three entities in details with some assumptions for each and every individual entity The data owner is one who may be an individual or sometimes an enterprise, who try to outsource a set of valuable or sensitive documents P = (P1, P2, . . . , Pn) in a plain text format into the cloud server. Here ‘P’ indicates the  documents are in plain text manner.   © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)   IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org  823   Once the documents are uploaded into the cloud server the documents need to be converted into encrypted manner in order to give security for the data. So the plain text documents need to convert into encrypted manner. E= (E1, E2, . . . , En) to the cloud server. Here we can see all the documents are labeled[5] with a letter ‘E’ and if there are multiple documents to be uploaded into the server, we distinguish them with letters like E1,E2….E n. H ere the letter ‘E’ is nothing but all documents are stored in the form of encrypted manner and those documents may be multiple,so the letters E1,E2and so on En indicates ‘n’ documents into the cloud server  [6]. The next main entity in cloud computing domain is the cloud server, which has the capability to accept, store and provide access permissions for the end users in a secure manner. Initially the cloud data owner try to encrypt the data and upload those encrypted files into the cloud server, this cloud server will then check the index of documents and arrange all those documents in an indexed manner to avoid redundancy [7]. Figure. 2. Demonstrate the Preliminary Entities in the Cloud Service Provider The last entity in the cloud data storage is the end user or search user who wishes to download the files from the cloud server by giving valid inputs for searching the files and then download those files in a secure manner[8],[9]. This entity has mainly 3steps to be performed for downloading the Encrypted documents from the cloud server[10]. Step 1:  Initially if the search user wants to download the data from the cloud server, he needs to register into the application and get approval from the cloud admin. Step 2:  Once the end user is registered and got login approval from the cloud admin, then he/she need to enter his valid login credentials and then try to enter into their account. Once they enter into his/her account, the   © 2019 IJRAR May 2019, Volume 6, Issue 2 www.ijrar.org (E-ISSN 2348-1269, P- ISSN 2349-5138)   IJRAR19K2411 International Journal of Research and Analytical Reviews (IJRAR) www.ijrar.org  824 search user need to enter the valid encrypted search keyword in order to download the data from the cloud server[11]. Step 3:  In this step, the cloud user send valid request for file download from his account and this will be reached to the data owner who uploaded that documents into the cloud server. Here the cloud owner is one who is having total permissions to allow or ignore the file download access by the end user. If he allow the access key, the search user can access the file in a plain text manner. If not the search user cant able to access the file in a plain text manner. Here the data owner is one who encrypted data by using polynomial based encryption and hence those parameters need to be informed to the valid end users. If the data user receives those parameters from the owner, then only he can access the data in a plain text manner. If the parameters are not correctly substituted the data cannot be displayed in plain text manner. In our proposed thesis we try to set access limit of value”3”.If the number of wrong attempts reach by 3 ,then the data user account will be automatically blocked. Hence the valid users only can access the data in plain text manner and all un-authorized users will be blocked after their 3 wrong attempts[12]. III. Proposed Linear Programming to Optimize the Computation Overhead in the Cloud Computing In this section we mainly define about the proposed Linear Programming Method to optimize the computational overhead in the cloud computing. Assumptions and Notations Here in this section we try to introduce notations which are used in this current thesis Initially the data owner/customer who want to upload their data into the cloud server Assume the set of documents P = (P1, P2, . . . , Pn) in a plain text format
Search
Related Search
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x