• Title/Summary/Keyword: Outsourced

Search Result 134, Processing Time 0.021 seconds

An Efficient Provable Secure Public Auditing Scheme for Cloud Storage

  • Xu, Chunxiang;Zhang, Yuan;Yu, Yong;Zhang, Xiaojun;Wen, Junwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4226-4241
    • /
    • 2014
  • Cloud storage provides an easy, cost-effective and reliable way of data management for users without the burden of local data storage and maintenance. Whereas, this new paradigm poses many challenges on integrity and privacy of users' data, since users losing grip on their data after outsourcing the data to the cloud server. In order to address these problems, recently, Worku et al. have proposed an efficient privacy-preserving public auditing scheme for cloud storage. However, in this paper, we point out the security flaw existing in the scheme. An adversary, who is on-line and active, is capable of modifying the outsourced data arbitrarily and avoiding the detection by exploiting the security flaw. To fix this security flaw, we further propose a secure and efficient privacy-preserving public auditing scheme, which makes up the security flaw of Worku et al.'s scheme while retaining all the features. Finally, we give a formal security proof and the performance analysis, they show the proposed scheme has much more advantages over the Worku et al.'s scheme.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

A Manufacturing/Remanufacturing System with the Consideration of Required Quality of End-of-used Products

  • Guo, Jianquan;Ko, Young-Dae;Hwang, Hark
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.3
    • /
    • pp.204-214
    • /
    • 2010
  • A manufacturing/remanufacturing system is investigated with the consideration of required minimum quality of end-of-used products. A constant demand is satisfied by remanufacturing end-of-used products and manufacturing raw materials outsourced from outside. It is assumed in this system that the buyback price and remanufacturing cost are related to the different quality level of end-of-used products. For remanufacturing, only the used products that satisfy a required minimum quality level will be recycled. Thus, the returning rate is a function of the required minimum quality level. Functions of returning rate, buyback price and remanufacturing cost, which are closely connected to the quality level of end-of-used products, are investigated here. Treating the required minimum quality level of end-of-used products, the length of a cycle, the number of manufacturing lots and remanufacturing lots in a cycle as decision variables, the mathematical models with the objective of minimizing the average total cost are constructed. Through construction of a solution process based on Tabu Search algorithm and calculating examples, the validity of the models is illustrated.

The Recent Trends and Controversy over Outsourcing of Cataloging in Academic Libraries (대학도서관 편목 업무 외주의 동향과 논쟁)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.38 no.2
    • /
    • pp.119-136
    • /
    • 2004
  • The purpose of this study is to analyze cases of several academic libraries, both in Korea and other countries, which have outsourced part or all of cataloging operations and examine current trends and controversy over outsourcing. Contrary to expectations of reduced expenses and increased efficiency in cataloging, outsourcing often results in bibliographic records of low quality which require additional costs to correct errors and maintain consistency and accuracy of records, and therefore, fails to reach the goal. Due to the absence of high quality bibliographic utilities, union catalogs, and authority databases, and lack of expertise in cataloging among outsourcing service providers, it seems that outsourcing is not currently an appropriate tactic for cataloging in academic libraries in Korea.

A Study on Threat Containment through VDI for Security Management of Partner Companies Operating at Industrial Control System Facility

  • Lee, Sangdo;Huh, Jun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.491-494
    • /
    • 2019
  • The results from the analysis of recent security breach cases of industrial control systems revealed that most of them were caused by the employees of a partner company who had been managing the control system. For this reason, the majority of the current company security management systems have been developed focusing on their performances. Despite such effort, many hacking attempts against a major company, public institution or financial institution are still attempted by the partner company or outsourced employees. Thus, the institutions or organizations that manage Industrial Control Systems (ICSs) associated with major national infrastructures involving traffic, water resources, energy, etc. are putting emphasis on their security management as the role of those partners is increasingly becoming important as outsourcing security task has become a common practice. However, in reality, it is also a fact that this is the point where security is most vulnerable and various security management plans have been continuously studied and proposed. A system that enhances the security level of a partner company with a Virtual Desktop Infrastructure (VDI) has been developed in this study through research on the past performances of partner companies stationed at various types of industrial control infrastructures and its performance outcomes were statistically compiled to propose an appropriate model for the current ICSs by comparing vulnerabilities, measures taken and their results before and after adopting the VDI.

Personality Characteristic-based Enhanced Software Testing Levels for Crowd Outsourcing Environment

  • Kamangar, Zainab U.;Siddiqui, Isma Farah;Arain, Qasim Ali;Kamangar, Umair A.;Qureshi, Nawab Muhammad Faseeh
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2974-2992
    • /
    • 2021
  • Crowd-based outsourcing is an emerging trend in testing, which integrates advantages of crowd-based outsourcing in software testing. Open call format is used to accomplish various network tasks involving different types of testing levels and techniques at various places by software testers. Crowd-sourced software testing can lead to an improper testing process as if it does not allocate the right task to the right crowd with required skills and not choose the right crowd; it can lead to huge results, which become time-consuming and challenging crowd-source manager for the identification of improper one. The primary purpose of this research is to make crowd-based outsourced software testing more effective and reliable by relating association between the software tester, personality characteristic, and different levels of software testing, i.e., unit, integration, and system, in order to find appropriate personality characteristic for required testing level. This research has shown an observed experiment to determine which software testing level suits which personality characteristic tester in a crowd-based software testing environment. A total of 1000 software testers from different software houses and firms in Pakistan were registered to perform tasks at different software testing levels. The Myers-Briggs Type Indicator (MBTI) test is used to identify each tester's personality characteristic involved in this research study.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Profile of Professionals of the Brazilian Production Sector of Timber Housing

  • DE ARAUJO, Victor;POLANCO, Cesar;MORALES, Elen;CORTEZ-BARBOSA, Juliana;GAVA, Maristela;GARCIA, Jose
    • Journal of the Korean Wood Science and Technology
    • /
    • v.47 no.5
    • /
    • pp.607-616
    • /
    • 2019
  • On account of the lack of education of Brazilian worker, this paper analyzed the characteristics of those professionals working in the production sector of timber houses. A sectoral survey was carried out with respective entrepreneurs to investigate the available professionals (career and contract types), evaluate the demands of skilled workers, and indicate solutions to improve the quality of labor qualification. Similarly, over 65% of sampled producers presented both direct-hired and outsourced workforce. For such contract ways, Civil Engineers and Architects were the main careers. Carpenters, Civil Engineers and Architects experienced on timber were the main sectoral demands. Timber Engineers have good potentials of service for this sector. The creation of courses on timber products can emerge as a key alternative to train people.

The Determinants and Barriers of Outsourcing Third-Party Online Delivery: Perspectives of F&B Entrepreneurs in Malaysia

  • SIN, Kit-Yeng;LO, May-Chiun;MOHAMAD, Abang Azlan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.979-986
    • /
    • 2021
  • Online food delivery and food delivery apps have continued to grow exponentially in Malaysia. Fundamental aspects in entrepreneurship of the food and beverage industry, such as knowledge and attitudes towards online food delivery services being outsourced, have yet to be extensively recognized. The present study intends to explore this area of subject matter within the Malaysian context by using behavioral reasoning theory. The actual interview for this study took place in May 2020, and 14 interviews had been carried out. All interviews were audio-recorded with the consent from the respondents for reference purposes and subsequently transcribed verbatim. The transcripts were then checked against audio records. Content analysis was used to analyze the transcripts by focusing on n frequency counts and coding of themes. A qualitative method has been adopted by employing an interview to elicit the perspectives of entrepreneurs from Sarawak on the determinants and barriers in outsourcing online food delivery services. Results indicate that high potential in revenue, broad exposure to reach customers, convenience, and provision of job opportunities are the four factors that determine to outsource. In contrast, food quality maintenance, trustworthiness, high cost incurred, and consumer technology resistance are four factors that serve as barriers towards outsourcing third-party online delivery.

An Empirical Investigation of Vendor Readiness to Assess Offshore Software Maintenance Outsourcing Project

  • Ikram, Atif;Jalil, Masita Abdul;Ngah, Amir Bin;Khan, Ahmad Salman;Mahmood, Yasir
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.229-235
    • /
    • 2022
  • The process of correcting, upgrading, and improving software products after they have been handed over to the consumer is known as software maintenance. Offshore software maintenance outsourcing (OSMO) clients benefit from cost savings, time savings, and improved quality software through OSMO. In most circumstances, the OSMO vendor makes a lot of money but not in all the cases. Especially, when the OSMO project offer is not properly assessed. An efficient outsourcing contract might yield successful outcomes for outsourced projects. But before sending a detailed proposal to bid on the OSMO project the vendor must have to assess the client's project (business offer) requirements. The purpose of this study is to find out common trends within the assessment of a OSMO project. A case study approach along with semi-structured interviews from eight companies concluded ten common practices and several roles. Among these practices, four (code structure, requirements, communication barriers and required infrastructure) were consistent amongst the responses .The findings, limitations and future work are discussed.