PROTECTION OF DATA USING LINEAR PROGRAMMING AND FHE TECHNIQUE IN CLOUD COMPUTING
Abstract
Cloud computing has good services like virtualization. Virtualization provides the unlimited computational resources. Cloud computing provides robust design with low cost. Different security constraints are satisfied in outsourcing with the implementation of new encryption standards. These above services give the reliable solution in secure transmission. Previous systems cloud environment enables the computational resources are limited whenever access the resources in outsourcing. These resources utilization are pay per use manner here. Previous servers have processing storage, memory levels are less. There is no possibility for encryption complete content. Some content available as a plain text, remaining content available as a cipher text. This two type’s format content starts the transmission. Attackers are entering automatically leakage of data problems generate here. That’s why this type of network comes under insecure. It can deliver the incorrect data in destination. Users are not satisfies with the help of these services. Security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. The above limitations are overcome using the linear programming in cloud computing. These types of techniques are providing good secure network and optimization solution. User is ready for transfer the large file to another user. Here large file assume as a large problem. Using linear programming large files divide into sub parts using decomposition. Transformation techniques start the allocation of decomposed parts in different servers. Different servers provide the perfect infrastructure for encryption with sufficient computational resources. Before starts the outsourcing total content is encrypted in client side. After deliver the content verifies the proof. Proof it is matched with server proof then performs the decryption. It’s delivers as a correct data.