Efficient and verifiable outsourcing computation of large-scale nonlinear programming
-
1200
Downloads
-
2478
Views
Authors
Nedal M. Mohammed
- Department of Computer Science, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India.
Ali N. AL-Seadi
- Department of Computer Science, Thi-Qar University, Thi-Qar, Iraq.
Santosh S. Lomte
- Department of Computer Science, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India.
Poonam M. Rokade
- Department of Computer Science, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India.
Ahmed A. Hamoud
- Department of Mathematics, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad, India.
Abstract
Nonlinear programming (NLP) problems arise in various fields, such as transport, financial engineering, logistics, urban planning, supply chain management, and power system control. Solving large-scale NLPs are usually so computationally expensive for resource-constrained users within a feasible time. The cost-effective solution is computation outsourcing, but this raises security concerns such as the input and output privacy of the customers, and cheating behaviors of the cloud since NLP problems always carry sensitive information. In this paper, we develop a practical secure and verifiable schema for solving outsourcing large-scale (NLP) with the GRG method. Also, we apply approximate KKT conditions for verifying the optimality of the result returned by the GRG algorithm. We implement the proposed schema on the customer side laptop and using AWS compute domain elastic compute cloud (EC2) for the cloud side.
Share and Cite
ISRP Style
Nedal M. Mohammed, Ali N. AL-Seadi, Santosh S. Lomte, Poonam M. Rokade, Ahmed A. Hamoud, Efficient and verifiable outsourcing computation of large-scale nonlinear programming, Journal of Mathematics and Computer Science, 21 (2020), no. 4, 335--343
AMA Style
Mohammed Nedal M., AL-Seadi Ali N., Lomte Santosh S., Rokade Poonam M., Hamoud Ahmed A., Efficient and verifiable outsourcing computation of large-scale nonlinear programming. J Math Comput SCI-JM. (2020); 21(4):335--343
Chicago/Turabian Style
Mohammed, Nedal M., AL-Seadi, Ali N., Lomte, Santosh S., Rokade, Poonam M., Hamoud, Ahmed A.. "Efficient and verifiable outsourcing computation of large-scale nonlinear programming." Journal of Mathematics and Computer Science, 21, no. 4 (2020): 335--343
Keywords
- Cloud computing
- secure computation outsourcing
- verifiable computing
- security and privacy nonlinear programming problems
MSC
References
-
[1]
R. Andreani, G. Haeser, J. M. Martinez, On sequential optimality conditions for smooth constrained optimization, Optimization, 60 (2011), 627--641
-
[2]
E. B. Bajalinov, Linear-fractional programming theory, methods, applications and software, Springer Science & Business Media, Berlin (2013)
-
[3]
M. S. Bazaraa, H. D. Sherali, C. M. Shetty, Nonlinear programming: theory and algorithms, John Wiley & Sons, New York (2013)
-
[4]
D. P. Bertsekas, Nonlinear programming, Athena scientific, Belmont (1999)
-
[5]
J. Dutta, K. Deb, R. Tulshyan, R. Arora, Approximate KKT points and a proximity measure for termination, J. Glob. Optim., 56 (2013), 1463--1499
-
[6]
C. Gentry, Computing arbitrary functions of encrypted data, Comm. ACM, 53 (2010), 97--105
-
[7]
A. A. Hamoud, K. H. Hussain, N. M. Mohammed, K. P. Ghadle, Solving Fredholm integro-differential equations by using numerical techniques, Nonlinear Funct. Anal. Appl., 24 (2019), 533--542
-
[8]
A. A. Hamoud, N. M. Mohammed, K. P. Ghadle, A study of some effective techniques for solving Volterra-Fredholm integral equations, Dyn. Contin. Discrete Impuls. Syst. Ser. A Math. Anal., 26 (2019), 389--406
-
[9]
C. Hu, A. Alhothaily, A. Alrawais, X. Cheng, C. Sturtivant, H. Liu, A secure and verifiable outsourcing scheme for matrix inverse computation, IEEE INFOCOM'17 (Atlanta, GA, U.S.A.), 4 (2017), 2304--2312
-
[10]
K. H. Hussain, A. A. Hamoud, N. M. Mohammed, Some new uniqueness results for fractional integro-differential equations, Nonlinear Funct. Anal. Appl., 24 (2019), 827--836
-
[11]
J. Katz, Y. Lindell, Introduction to modern cryptography, CRC press, Boca Raton (2015)
-
[12]
A. Li, W. Du, Q. Li, Privacy-preserving outsourcing of large-scale nonlinear programming to the cloud, Int. Conf. Security Privacy Comm. Syst. (Springer), 2018 (2018), 569--587
-
[13]
D. G. Luenberger, Y. Ye, Linear and nonlinear programming, Springer, New York (2008)
-
[14]
N. M. Mohammed, S. S. Lomte, Recent advances on secure computations outsourcing in cloud computing, Asian J. Math. Comput. Res., 24 (2017), 192--205
-
[15]
N. M. Mohammed, S. S. Lomte, Secure computations outsourcing of mathematical optimization and linear algebra tasks: Survey, National Conference on Recent Innovation in Computer Science & Electronics, 2019 (2019), 6 pages
-
[16]
N. M. Mohammed, S. S. Lomte, Secure and efficient outsourcing of large scale linear fractional programming, Adv. Intel. Syst. Comput., 2020 (2020), 277--286
-
[17]
N. M. Mohammed, S. S. Lomte, Verifiable secure computation of linear fractional programming using certificate validation, Int. J. Power Electron. Drive Syst., 11 (2020), 284--290
-
[18]
N. M. Mohammed, L. Sultan, S. S. Lomte, Privacy preserving outsourcing algorithm for two-point linear boundary value problems, Indonesian J. Ele. Eng. Comput. Sci., 16 (2019), 1065--1069
-
[19]
J. B. Rosen, The gradient projection method for nonlinear programming. I: Linear constraints, J. Soc. Indust. Appl. Math., 8 (1960), 181--217
-
[20]
J. B. Rosen, The gradient projection method for nonlinear programming. II. Nonlinear constraints, J. Soc. Indust. Appl. Math., 9 (1961), 514--532
-
[21]
W. Shen, B. Yin, X. H. Cao, Y. Cheng, X. S. Shen, A distributed secure outsourcing scheme for solving linear algebraic equations in ad hoc clouds, IEEE Trans. Cloud Comput., 4 (2017), 415--430
-
[22]
R. Tulshyan, R. Arora, K. Deb, J. Dutta, Investigating EA solutions for approximate KKT conditions in smooth problems, Proceedings of Annual Conference on Genetic and Evolutionary Computation, 2010 (2010), 689--696
-
[23]
K. Zhou, J. Ren, CASO: Cost-aware secure outsourcing of general computational problems, IEEE Tran. Services Comput., 2018 (2018), 13 pages