Privacy preserving outsourcing algorithm for two-point linear boundary value problems

5Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

One of a powerful application in the age of cloud computing is the outsourcing of scientific computations to cloud computing which makes cloud computing a very powerful computing paradigm, where the customers with limited computing resource and storage devices can outsource the sophisticated computation workloads into powerful service providers. One of scientific computations problem is Two-Point Boundary Value Problems (BVP) is a basic engineering and scientific problem, which has application in various domains. In this paper, we propose a privacy-preserving, verifiable and efficient algorithm for two-point BVP in outsourcing paradigm. We implement the proposed schema on the customer side laptop and using AWS compute domain elastic compute cloud (EC2) for the cloud side.

Cite

CITATION STYLE

APA

Mohammed, N. M., Sultan, L. R., & Lomte, S. S. (2019). Privacy preserving outsourcing algorithm for two-point linear boundary value problems. Indonesian Journal of Electrical Engineering and Computer Science, 16(2), 1065–1069. https://doi.org/10.11591/ijeecs.v16.i2.pp1065-1069

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free