Protected Data Using Hybrid Algorithm in Cloud


  • K Kalaiselvi
  • N Jayashri
  • G Saraswathi





Hybrid algorithms, secure outsourcing, result decryption, problem encryption, key generation, proof generation.


Cloud computing providing confidentiality over the insensitive data was the major issue related to security. It verifies the data owned by the server through linear computations. The proposed work enables security and efficiency using the cryptographic techniques of hybrid algorithms, securing the sensitive information that is present in the cloud. In the hybrid algorithm, it is the combination of problem encryption, key generation, result decryption and proof generation. It also validates the results which are being computed and also provides end-to-end confidentiality over the data to both the end user. The uses of hybrid algorithm results in a random key generation, encrypt/decrypt, and validate the satisfied results. This will provide a low cost to both server and client.




[1] Atallah M & Frikken K, “Securely outsourcing linear algebra computationsâ€, Proc. 5th ACM Symp.Inf., Comput.Commun. Security, (2010), pp.48-59.

[2] Atallah MJ, Pantazopoulos KN, Rice JR & Spafford EH, “Secure outsourcing of scientific computationsâ€, Adv. Comput., Vol.54, (2002), pp.215-272.

[3] Laud P & Pankova A, “On the Impossibility of Privately Outsourcing Linear Programmingâ€, ACM CCSW, (2013).

[4] Benjamin D & Atallah MJ, “Private and cheating-free outsourcing of algebraic computationsâ€, Proc. 6th Annu. Conf. Privacy, Secur. Trust (PST), (2008), pp.240-245.

[5] Wang C, Ren K, Wang J & Wang Q, “Harnessing the cloud for securely outsourcing large-scale systems of linear equationsâ€, IEEE Trans. Parallel Distrib. Syst., Vol.24, No.6, (2013), pp.1172-1181.

[6] Wang C, Renand K & Wang J, “Secure and practical outsourcing of linear programming in cloud computingâ€, Proc. 30th IEEE Int. Conf. Comput.Commun. (INFOCOM), (2011), pp.820-828.

[7] Mell P & Grance T, “Draft nist working definition of cloud computing-v15â€, (2009), 123-135.

[8] Hohenberger S & Lysyanskaya A, “How to securely outsource cryptographic computationsâ€, Proc. of TCC, (2005), pp.264-282.

[9] Gennaro R, Gentry C & Parno B, “Non-interactive verifiable computing: Outsourcing computation to untrusted workersâ€, Proc. of CRYPTO, (2010).

[10] Yu S, Wang C, Ren K & Lou W, “Achieving secure, scalable, and fine-grained access control in cloud computingâ€, Proc. of IEEE INFOCOM?, (2010).

[11] Mangasarian OL, “Privacy-preserving linear programmingâ€, Optimization Letters, Vol.5, No.1,(2011), pp.165-172.

[12] Vaidya J, “Privacy-preserving Linear Programmingâ€, Proc. 24th ACM Symp.Appl.Comput., (2009), pp.2002-2007.

[13] Wang C, Ren K & Wang J, “Secure optimization computation outsourcing in cloud computing: A case study of linear programmingâ€, IEEE transactions on computers, Vol.65, No.1, (2016), pp.216-229.

[14] Li J & Atallah MJ, “Secure and private collaborative linear programmingâ€, Proc. Int. Conf. Collaborative Comput., (2006), pp.1-8.

[15] Optimization of Resource Provisioning cost in cloud computing,

[16] Cloud computing for optimization, 2013/01.

[17] 3 ways of cloud optimization to improve efficiency of the cloud,

[18] A Akhmetbekova, P Auyesbayeva, Sh Ibrayev (2018). Turkic "Hikaya" genre and its characters. Opción, Año 33. 81-106.

[19] A Mukanbetkaliyev, S Amandykova, Y Zhambayev, Z Duskaziyeva, A Alimbetova (2018). The aspects of legal regulation on staffing of procuratorial authorities of the Russian Federation and the Republic of Kazakhstan Opción, Año 33. 187-216.

View Full Article: