Privacy preserving outsourcing algorithm for two-point linear boundary value problems

One of a powerful application in the age of cloud computing is the outsourcing of scientific computations to cloud computing which makes cloud computing a very powerful computing paradigm, where the customers with limited computing resource and storage devices can outsource the sophisticated computa...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Nedal (Author), Sultan, Laman R. (Author), Lomte, Santosh (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2019-11-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02147 am a22003133u 4500
001 ijeecs18580_13128
042 |a dc 
100 1 0 |a Mohammed, Nedal  |e author 
100 1 0 |e contributor 
700 1 0 |a Sultan, Laman R.  |e author 
700 1 0 |a Lomte, Santosh  |e author 
245 0 0 |a Privacy preserving outsourcing algorithm for two-point linear boundary value problems 
260 |b Institute of Advanced Engineering and Science,   |c 2019-11-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18580 
520 |a One of a powerful application in the age of cloud computing is the outsourcing of scientific computations to cloud computing which makes cloud computing a very powerful computing paradigm, where the customers with limited computing resource and storage devices can outsource the sophisticated computation workloads into powerful service providers. One of scientific computations problem is Two-Point Boundary Value Problems(BVP) is a basic engineering and scientific problem, which has application in various domains. In this paper, we propose a privacy-preserving, verifiable and efficient algorithm for Two-Point Boundary Value Problems in outsourcing paradigm. We implement the proposed schema on the customer side laptop and using AWS compute domain elastic compute cloud (EC2) for the cloud side. 
540 |a Copyright (c) 2019 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Cloud computing, secure computation outsourcing, verifiable computing, secure and privacy boundary value problem. 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 16, No 2: November 2019; 1065-1069 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v16.i2 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18580/13128 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/18580/13128  |z Get fulltext