• Title/Summary/Keyword: Secure Outsourcing

Search Result 38, Processing Time 0.033 seconds

Fully Verifiable Algorithm for Secure Outsourcing of Bilinear Pairing in Cloud Computing

  • Dong, Min;Ren, Yanli;Zhang, Xinpeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3648-3663
    • /
    • 2017
  • With the development of cloud computing and widespread availability of mobile devices, outsourcing computation has gotten more and more attention in cloud computing services. The computation of bilinear pairing is the most expensive operation in pair-based cryptographic schemes. Currently, most of the algorithms for outsourcing bilinear pairing have small checkability or the outsourcers need to operate expensive computations. In this paper, we propose an efficient algorithm for outsourcing bilinear pairing with two servers, where the outsourcers can detect the errors with a probability of 1 if the cloud servers are dishonest, and the outsourcers are not involved in any complex computations. Finally, the performance evaluation demonstrates that the proposed algorithm is most efficient in all of fully verifiable outsourcing algorithms for bilinear pairing.

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server

  • Zhao, Ling;Zhang, Mingwu;Shen, Hua;Zhang, Yudi;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.826-845
    • /
    • 2017
  • Outsourcing computation is one of the most important applications in cloud computing, and it has a huge ability to satisfy the demand of data centers. Modular exponentiation computation, broadly used in the cryptographic protocols, has been recognized as one of the most time-consuming calculation operations in cryptosystems. Previously, modular exponentiations can be securely outsourced by using two untrusted cloud servers. In this paper, we present two practical and secure outsourcing modular exponentiations schemes that support only one untrusted cloud server. Explicitly, we make the base and the index blind by putting them into a matrix before send to the cloud server. Our schemes provide better performance in higher efficiency and flexible checkability which support single cloud server. Additionally, there exists another advantage of our schemes that the schemes are proved to be secure and effective without any cryptographic assumptions.

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.

A Case Study - IT Outsourcing of the Korea Development Bank (산업은행: 금융 IT 아웃소싱 - 공동협력으로 안전한 문을 연다)

  • Kang, Ju-Young;Lee, Jae-Kyu
    • Information Systems Review
    • /
    • v.7 no.2
    • /
    • pp.229-255
    • /
    • 2005
  • The Korea Development Bank promoted a total outsourcing for IT operation in 1999 for the first time in the banking industry. The Korea Development Bank became the center of public attention because the most banks were unwilling to take an outsourcing with external sources for the reason of financial operation accidents, securities, and threats of strikes. After the introduction of the total IT outsourcing, the Korea Development Bank has continuously diagnosed the problems of the IT outsourcing and adopted various proper complements for the enhancement of the IT outsourcing. As the result of the enhancement, the IT outsourcing of the Korea Development Bank marched into the joint liability operation period after going through the outsourcing operation period and the co-operation period. The joint liability operation which is the most leading outsourcing system which is adopted by the Korea Development Bank for the first time in the banking industry. Through the joint liability operation, the Korea Development Bank could accept the most up-to-date IT, concentrate internal manpower on the core capability, and secure flexibility of manpower. Also, the bank changed the relationship between the bank and the external sources from the one-sided relationship between a producers and a consumer to the joint liability relationship on which both sides are responsible for the operation, and could integrate the internal capacity with the professional know-how of the external IT outsourcing company. In this paper, we testified the soundness and validity for the worries of banks about the total IT outsourcing with external sources. And, we arranged the advantages and outcomes of the total IT outsourcing with external sources compared to the IT outsourcing with internal sources. Moreover, we expect that we can improve the closed financial IT outsourcing industry structure and raise the world competitive power of domestic IT outsourcing companies by correcting wrong ideas on the IT outsourcing with external sources.

A Study of IT Maintenance Outsourcing Service Factors of Local Governments: Based on AHP Analysis Method (지방자치단체의 IT 유지보수관리의 아웃소싱 서비스 요인에 관한 연구: AHP 분석을 기반으로)

  • Jun, Daeho;Jang, Sanghyun;Lee, Jeongjae;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.21 no.3
    • /
    • pp.43-61
    • /
    • 2022
  • With the development of information technology, IT-based services in public administration has become more indispensable. As a result, the importance of IT maintenance projects to improve the efficiency of IT services and secure service levels is growing. Due to the nature of IT maintenance projects on local government, which mainly involve small and medium-sized IT companies in the region, business participating companies often do not have an appropriate methodology for service quality management. To solve this situation, the government has prepared a service level agreements (SLAs) that can be applied to IT maintenance projects. However, most local governments do not use SLAs for IT maintenance projects. As a result, various problems such as failure of the IT maintenance project or deterioration of quality are occurring Thus, this paper suggested major indexes to evaluate which service factors affect the efficient operation of information systems and the improvement of service quality in IT maintenance projects of local governments and analyzed the importance of indexes based on AHP method. Using this research method, this study found the theoretical implications on the outsourcing service of IT maintenance.

A Study on the Effect of Outsourced to Management Performance (아웃소싱이 기업성과에 미치는 영향)

  • Bae, Ha Jin;Kwak, Soon Jin;Kim, Kwang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.5
    • /
    • pp.83-94
    • /
    • 2014
  • Before economical crisis in 1997, domestic company focused on increasing the size of outward experience which including organization. The result of increasing outward experience without substance was economical crisis, so after that time, many companies have been changing their focus from insourcing to strengthen the core competence to secure global market. This is becoming a cause of following that companies are reducing their outward experience. Especially, to process tasks more effectively and to cope with rapid change of business environment, such as incoming raw material from overseas/high raising of salary/rising property prices, many companies decided outsourcing method. At most of hypothesis, the result was that outsourcing can affect positively to the business. First, introducing of outsourcing during focusing on core competence can be positive effect for company performance such as business management /productivity /procurement /administration /product competitiveness /technology. Second, the result that analyzed based on a point of view of population statics after outsourcing was positive effect at the most of research. Third, result of effectiveness for every outsourcing type classified by 4M was also can be positive at the most of research. Fourth, the characteristic of population statics can be positive effect at the most of category when select outsourcing companies. Research result of outsourcing was various based on the goal of outsourcing. It is revealed by investigation of domestic/overseas treatise that there are opposite two opinions. In this research, there is no consistent result that the outsourcing can give effects on business performance, but most of hypothesis indicates that outsourcing can give positive effect on the business performance.In this research, based on the outsourcing intensity, mutual relation was analyzed. The assumption of the reason of outsourcing is economical and organizational. First, sampling numbers of research was too small so it is too difficult to get significant business performance result. (Sampling : 150, Replied : 106, Rate of Reply : 71%) Second, tried to compare significant differences of outsourcing methods which were divided based on 4M, but the there is gaps between the number of Cell and too difficult to make replier understand. Third, it is tried to find the degrees of effect that the point of view of popular statics can effect on business performances and selection of outsourced companies.

  • PDF

A case research for standard of cost in design service (디자인서비스의 대가기준 사례조사 연구)

  • Ahn, Jinho;Lee, Jeungsun;Kim, Injun
    • Journal of Service Research and Studies
    • /
    • v.9 no.3
    • /
    • pp.61-72
    • /
    • 2019
  • Design is a knowledge service industry that is undervalued in Korea despite its large impact on the development of high - tech industries such as national industrial policy and the fourth industrial revolution. In the design industry, the strategic outsourcing system collapses. This phenomenon is not confined to the domestic market, and the design service companies of design-developed countries such as Europe and the US are also struggling with the classic. Accordingly, some implications were found through the case study of domestic design projects, including overseas, that private companies are more concerned with design cost reduction and cost structure to secure liquidity rather than improving design quality level and pursuing innovation through design outsourcing. It is big. As design is a core competency of a company, internalizing core design tasks, and as products and services become platforms, regional design countermeasures have been reduced, which has led to a decline in the cost standard for large companies' design service outsourcing. In design service industry, design outsourcing is performed at the request of the client, and the service value of the outsourcing is received. In the early 2000s, the importance of design management led global consulting companies to pursue M & A rather than cooperate with design service companies, and Samsung Electronics and other large corporations acquired a large number of excellent design personnel and developed their own design management research institute. This study investigated the design service outsourcing cases of public and private companies (large corporations, midsize companies) widely in relation to the design service price criterion, and grasped the indicators of the actual size and level of the design industry. I will make suggestions about the value and direction of the global design industry through interviews with experts and literature on the changes and influences of these cost criteria.

A Comparative Study of Outsourcing Culinary Part of Foodservice Industry Development. (외식사업발전을 위한 조리분야 아웃소싱 전략에 관한 연구 (평가측정치 개발절차를 중심으로))

  • 김기영
    • Culinary science and hospitality research
    • /
    • v.7 no.3
    • /
    • pp.13-34
    • /
    • 2001
  • The case which it contracts with the dynamic result measurement system when actual outsourcing evaluation measurement is composed and then one result standard between the service supplier and the user is set, which owns jointly the expense which is reduced from that or the benefit which is created from that is increasing In the conclusion, for outsourcing management strategy of domestic foodservice industry in order to succeed, first it is accurate and examined that for what and how outsourcing should be introduced and as a result, what kind of result can be raised from that result\ulcorner Food service industry should be outsourced if you want to make more many investment in better humane resources, food & beverage-goods-security and education to provide eating-out service out of various business in food industry. When considering the actuality of the domestic foodservice industry that time it is appropriate, it sees. The foreign-brand goods which is introduced in the country are being executing in the 1ink of part management strategy. One of the most influential factor of domestic foodservice industry's management pressure is overspent management expenses, Does the namely expenses preparation effect reach which degree\ulcorner what kind of method can most decrease these expenses\ulcorner Doing grows the success and failure of the Korean foodservice industry controls result with the fact that it will operate with a big variable sees. The background which the domestic foodservice industry should introduce inevitably the outsiurcing system is to develop continuously nation foodservice industry in the way of cost curtailment of food-material, a labor cost curtailment with efficient application and synergic effect like specialty manpower utilization. The kindred competitive enterprises gradually concentrate management resource to the point ability from the present point of view which is increasing and a strategy position they secure, to prepare a competitive power, what sees it is important national industry must prepare a new paradigm. It is important to measure the result based on sales accomplishment in operation system dimension, and it is more important to appropriately apply regard of the evaluation measurement

  • PDF

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.