• Title/Summary/Keyword: Secure Outsourcing

Search Result 38, Processing Time 0.025 seconds

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

A Study on Acceptance of CDM/UCR in WCO as e-Customs clearance procedures (WCO의 CDM과 UCR을 수용한 전자통관시스템 발전 방안)

  • Ryu, Geun-Woo;Kim, Young-Chun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.327-350
    • /
    • 2007
  • A single window platform must be successfully established by implementing CDM/UCR in WCO and UNeDocs in UN/CEFACT, which is part of the framework of standards for secure and facilitate global trade. Core success factors in single window platform for international trade depend on political innovative capacity, advanced leadership of high ranking officials and departments in charge, effective collaborations between the ministries and offices concerned which are supported by supreme executives, self-controlled coordinations between users, convenience and access availability to users, promotion and marketing, identification on predictive impediments, financial raising and revenue model payable, communication's strategy, valid legal basis etc. To settle a stable ubiquitous e-trade platform, firstly, procedures and practices of customs clearance which different from one another mutually must be standardized globally. Secondly, the international standard electronic data exchanges must be introduced to facilitate and simplify customs clearing procedures by holding administrative informations in common between public institutions. thirdly, cooperative work model must be accepted with enhancing outsourcing business between reference groups (export-import firms and IT service providers).

  • PDF

GOPES: Group Order-Preserving Encryption Scheme Supporting Query Processing over Encrypted Data

  • Lee, Hyunjo;Song, Youngho;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • v.14 no.5
    • /
    • pp.1087-1101
    • /
    • 2018
  • As cloud computing has become a widespread technology, malicious attackers can obtain the private information of users that has leaked from the service provider in the outsourced databases. To resolve the problem, it is necessary to encrypt the database prior to outsourcing it to the service provider. However, the most existing data encryption schemes cannot process a query without decrypting the encrypted databases. Moreover, because the amount of the data is large, it takes too much time to decrypt all the data. For this, Programmable Order-Preserving Secure Index Scheme (POPIS) was proposed to hide the original data while performing query processing without decryption. However, POPIS is weak to both order matching attacks and data count attacks. To overcome the limitations, we propose a group order-preserving data encryption scheme (GOPES) that can support efficient query processing over the encrypted data. Since GOPES can preserve the order of each data group by generating the signatures of the encrypted data, it can provide a high degree of data privacy protection. Finally, it is shown that GOPES is better than the existing POPIS, with respect to both order matching attacks and data count attacks.

A Study on Data Sharing Scheme using ECP-ABSC that Provides Data User Traceability in the Cloud

  • Hwang, Yong-Woon;Kim, Taehoon;Seo, Daehee;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4042-4061
    • /
    • 2022
  • Recently, various security threats such as data leakage and data forgery have been possible in the communication and storage of data shared in the cloud environment. This paper conducted a study on the CP-ABSC scheme to solve these security threats. In the existing CP-ABSC scheme, if the data is obtained by the unsigncryption of the data user incorrectly, the identity of the data owner who uploaded the ciphertext cannot be known. Also, when verifying the leaked secret key, the identity information of the data user who leaked the secret key cannot be known. In terms of efficiency, the number of attributes can affect the ciphertext. In addition, a large amount of computation is required for the user to unsigncrypt the ciphertext. In this paper, we propose ECP-ABSC that provides data user traceability, and use it in a cloud environment to provide an efficient and secure data sharing scheme. The proposed ECP-ABSC scheme can trace and verify the identity of the data owner who uploaded the ciphertext incorrectly and the data user who leaked the secret key for the first time. In addition, the ciphertext of a constant size is output and the efficiency of the user's unsigncryption computation were improved.

Data Block based User Authentication for Outsourced Data (아웃소싱 데이터 보호를 위한 데이터 블록 기반의 상호 인증 프로토콜)

  • Hahn, Changhee;Kown, Hyunsoo;Kim, Daeyeong;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.42 no.9
    • /
    • pp.1175-1184
    • /
    • 2015
  • Recently, there has been an explosive increase in the volume of multimedia data that is available as a result of the development of multimedia technologies. More and more data is becoming available on a variety of web sites, and it has become increasingly cost prohibitive to have a single data server store and process multimedia files locally. Therefore, many service providers have been likely to outsource data to cloud storage to reduce costs. Such behavior raises one serious concern: how can data users be authenticated in a secure and efficient way? The most widely used password-based authentication methods suffer from numerous disadvantages in terms of security. Multi-factor authentication protocols based on a variety of communication channels, such as SMS, biometric, or hardware tokens, may improve security but inevitably reduce usability. To this end, we present a data block-based authentication scheme that is secure and guarantees usability in such a manner where users do nothing more than enter a password. In addition, the proposed scheme can be effectively used to revoke user rights. To the best of our knowledge, our scheme is the first data block-based authentication scheme for outsourced data that is proven to be secure without degradation in usability. An experiment was conducted using the Amazon EC2 cloud service, and the results show that the proposed scheme guarantees a nearly constant time for user authentication.

Research on the Strategy for Outsourcing in Construction Projects: in Fast-track Project (건설프로젝트에서 전략적 하도급 방안에 관한연구 : 설계시공병행방식 사례를 중심으로)

  • Choi, Soo-Ho;Choi, Hyun-Chul;Choi, Hye-Mi;Kim, Ju-Hyung
    • Journal of the Korea Institute of Building Construction
    • /
    • v.14 no.6
    • /
    • pp.551-559
    • /
    • 2014
  • Fast-tracking was developed as an optimizing method to shorten the duration of construction project in 1960's, and it introduced to Korea in 1999. Since then, many Korean companies have been used fast-tracking for getting economical benefit from shorten duration. However, there were some problems(dispute, delay and cost overrun) because of using inappropriate subcontractor management system. For this reason, previous studies suggested some management models to solve these problems. Unfortunately, however, the models have been had some doubts about reliability, objectivity and possibility of using them on real construction site. Therefore, this study suggests 3 steps of strategic subcontracting method and apply it on real fast-tracking practice(L company) to secure reliability and objectivity. Through this, the method is expected to make up the doubts of previous studies.

CP-ABE Access Control that Block Access of Withdrawn Users in Dynamic Cloud

  • Hwang, Yong-Woon;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4136-4156
    • /
    • 2020
  • Recently, data can be safely shared or stored using the infrastructure of cloud computing in various fields. However, issues such as data security and privacy affect cloud environments. Thus, a variety of security technologies are required, one of them is security technology using CP-ABE. Research into the CP-ABE scheme is currently ongoing, but the existing CP-ABE schemes can pose security threats and are inefficient. In terms of security, the CP-ABE approach should be secure against user collusion attacks and masquerade attacks. In addition, in a dynamic cloud environment where users are frequently added or removed, they must eliminate user access when they leave, and so users will not be able to access the cloud after removal. A user who has left should not be able to access the cloud with the existing attributes, secret key that had been granted. In addition, the existing CP-ABE scheme increases the size of the ciphertext according to the number of attributes specified by the data owner. This leads to inefficient use of cloud storage space and increases the amount of operations carried out by the user, which becomes excessive when the number of attributes is large. In this paper, CP-ABE access control is proposed to block access of withdrawn users in dynamic cloud environments. This proposed scheme focuses on the revocation of the attributes of the withdrawn users and the output of a ciphertext of a constant-size, and improves the efficiency of the user decryption operation through outsourcing.

Study on the analysis of model of business process for textile industry of Korea (한국 섬유산업의 비즈니스 프로세스 모형 분석에 관한 연구)

  • Jang, Doc-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.223-235
    • /
    • 2006
  • Textile industry of Korea has been assumed advanced textile industry nation's aspects with production system and equipment. But has been descended in the sector of design, brand, recognition comparing with Italy, Japan, England. And products of middle and low price do not have competitiveness against China, South East Asia. The world's textile industry nation has been confronted with Free Trade, and Regional Trade Blocks. New market has been opened with free Trade, but Trade Blocks(NAFTA, EU, APEC etc.) which encourage regional member country's profit maximize made textile export driven nation to consider strategies to cope with. Advanced textile industry nation divided the work among themselves and composed linking system among them which highly valuable products are manufactured at advanced nation and low price products are manufactured by global outsourcing. The purpose of this study is to analyze impact of process which requires to secure international competitiveness into business performance experimentally.

  • PDF

A Study on App Factory Design for Improving App Development Software Productivity (앱 개발 소프트웨어 생산성 향상을 위한 개발 자동화 설계에 대한 연구)

  • Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.1
    • /
    • pp.35-41
    • /
    • 2017
  • Smart phone based IT support programs are faced with difficulties due to the following reasons first, long development period is required as separate developments are necessary respectively depending on the operating system of Smart phone second, it is also difficult to secure high development cost for the outsourcing of the development. It is a big problem for improving app developing productivity. Smart App Factory which is suggested in this thesis is the business strategy to surpass the Android market of Google and App Store of Apple within short period of time based on App productivity of Smart App Authoring Tool and to accomplish the materialization of App market which is in the 1st global position and all potential customers who need programs for their works regardless of budget, scope, complexity and scale will be implemented by unfolding unprecedented low price policy and global online marketing activities for App development.

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.