KUET Institutional Repository

A Study on Secure Outsourcing of Large Scale Computations to Cloud

Show simple item record

dc.contributor.advisor Hashem, Prof. Dr. M.M.A.
dc.contributor.author Ferdush, Jannatul
dc.date.accessioned 2019-01-13T09:59:18Z
dc.date.available 2019-01-13T09:59:18Z
dc.date.copyright 2018
dc.date.issued 2018-11
dc.identifier.other ID 1607551
dc.identifier.uri http://hdl.handle.net/20.500.12228/485
dc.description This thesis is submitted to the Department of Computer Science and Engineering, Khulna University of Engineering & Technology in partial fulfillment of the requirements for the degree of Master of Science in Engineering in Computer Science and Engineering, November 2018. en_US
dc.description Cataloged from PDF Version of Thesis.
dc.description Includes bibliographical references (pages 36-39).
dc.description.abstract At present, cloud computing has become the most prominent field for the clients which make them relax to outsource their expensive computations. Based on a pay-per-use model, a client without enough computational power can easily outsource large scale computational tasks to a cloud. But this relaxation also brings some anxious like as data confidentiality, storage overhead and trustworthiness of cloud and so on. To relief from these threats, a perfect cloud outsourcing protocol is needed. A cloud outsourcing system is perfect if it can minimize the client’s overhead as well as it has trust. So, the problem is how a client can send his overload task to cloud by privacy preserving and verifiable way. Since mathematical computations always have contribution on various scientific and engineering tasks, we are motivated to design a secure, efficient and verifiable cloud outsourcing protocol for some large-scale mathematical computations such as lyapunov equation, linear regression. Lyapunov equation needs for stability analysis. It is applied to the power system analysis also. To solve it by cloud, we use affine transformation that actually transfers the problem linearly. These transformation computes in a such way that from transferred result original result can be found. Linear regression is studied for with constrained and without constrained. Unconstrained linear regression that is studied here in two ways. First of all, it is studied by hiding its dimension and then transferred the problem by random permutation. Because of increasing dimension, efficiency of this method is decreasing but increased security. It is the trade off between efficiency and security. Second, for transforming it, we use the idea of chaotic map and frobenius matrix. Chaotic map is one of the most used random number generation algorithms and it has some advantages using frobenius matrix over diagonal matrix. At last, constrained linear regression outsourcing is done by affine mapping like as lyapunov equation. Actually, We proposed protocols for outsourcing these problems and studied these protocols in a privacy preserving, efficient and verifiable way. Real cloud is also invoked and a comparison between real and simulation cloud is also showed. Theoretical and experimental results confirm the effectiveness and efficiency of our protocols. en_US
dc.description.statementofresponsibility Jannatul Ferdush
dc.format.extent 43 pages
dc.language.iso en_US en_US
dc.publisher Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh en_US
dc.rights Khulna University of Engineering & Technology (KUET) thesis/dissertation/internship reports are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subject Cloud Computing en_US
dc.subject Outsourcing en_US
dc.subject Secure Outsourcing en_US
dc.subject Cloud Outsourcing System en_US
dc.subject Encryption Schema en_US
dc.title A Study on Secure Outsourcing of Large Scale Computations to Cloud en_US
dc.type Thesis en_US
dc.description.degree Master of Science in Engineering in Computer Science and Engineering
dc.contributor.department Department of Computer Science and Engineering


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search KUET IR


Advanced Search

Browse

My Account

Statistics