Loading...
Search for: service-provider
0.005 seconds
Total 30 records

    An incentive mechanism in smart networks using ascending reverse auction

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 42-47 ; 9781467325691 (ISBN) Golnarian, S ; Khalaj, B. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we use the ascending reverse auction method in incentive-based cooperative networks in order to increase the cooperation level of malicious users. Our approach integrates the reverse auction method with traditional pricing and reputation based algorithms and uses fuzzy thresholds to increase freedom of service providers in making the decision whether to cooperate or not. In contrast with earlier works, we do not concentrate on a specific network or protocol. The simulation results show that while the average welfare of malicious users is decreased dramatically, the average welfare of all users does not decrease significantly  

    An efficient and social-aware distributed in-network caching scheme in named data networks using matching theory

    , Article Computer Networks ; Volume 158 , 2019 , Pages 175-183 ; 13891286 (ISSN) Ehsanpour, M ; Bayat, S ; Hemmatyar, A. M. A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main characteristics of Named Data Networks (NDN) which makes it a promising architecture for the future of the Internet is its universal in-network caching. Due to the limited caching capacity of the network and the infinite amount of data objects, the cache management scheme becomes a challenging task in NDN. While existing cache management schemes utilize network's caching capacity inefficiently by redundantly keeping popular objects across the network and concentrate on improving bandwidth utilization, we focus on a novel criterion to elevate the cache utilization efficiency. In this paper, a distributed solution that associates the objects to the cache-enabled nodes and... 

    Resource provisioning of MVNOs in a virtualized wireless network: a procurement auction approach

    , Article 2018 IEEE Globecom Workshops, GC Wkshps 2018, 9 December 2018 through 13 December 2018 ; 2019 ; 9781538649206 (ISBN) Nouri, F ; Ashtiani, F ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In wireless network virtualization, by separating services and infrastructure, and due to new network components, some new challenges appear. In this paper, we consider the competition among multiple mobile virtual network operators (MVNOs) for provisioning the required rates for users subscribed to a service provider (SP). To realize this competition, we consider an SP as a beneficiary decision maker component, who can choose which users to be serviced by each MVNO. Since the states between each user and different channels of each MVNO are distinct, MVNOs compete to serve the users with good channel conditions to minimize their costs. Using a multiple non-identical object procurement... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    Radio Resource Sharing in Wireless Network Virtualization Based on Game Models

    , M.Sc. Thesis Sharif University of Technology Nouri, Farhad (Author) ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    In the next generation of wireless networks, wireless network virtualization is considered as an efficient technology to enhance the network capacity. This technology enables the separation between wireless network infrastructure and the services it provides that enhances some of the existing capabilities and make new capabilities in the network. Spectrum sharing,infrastructure sharing, network sharing, resource slicing are some of these capabilities.Furthermore, the mentioned separation causes the lower entry barriers for small beneficiary entities. The increment in the number of beneficiary entities makes intense competitions among them leading to lower costs for different services. Also,... 

    Correctness verification in database outsourcing: A trust-based fake tuples approach

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 7671 LNCS , 2012 , Pages 343-351 ; 03029743 (ISSN) ; 9783642351297 (ISBN) Ghasemi, S ; Noferesti, M ; Hadavi, M. A ; Nogoorani, S. D ; Jalili, R ; Sharif University of Technology
    2012
    Abstract
    An important security challenge in database outsourcing scenarios is the correctness verification of query results. The proposed approaches in the literature, impose high overhead on both the service provider and specially the clients. In this paper, we propose the Trust-Based Fake Tuples approach to audit the correctness of query results. In this approach, some fake tuples are included among the real ones in order to verify the correctness of the results. The experience learnt from past results is used in this paper to evaluate the trust toward the service provider. This trust value is used to tune the number of fake tuples and subsequently the imposed overhead. As the trust value toward... 

    Private shotgun and sequencing

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 171-175 ; 21578095 (ISSN); 9781538692912 (ISBN) Gholami, A ; Maddah Ali, M. A ; Abolfazl Motahari, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Current techniques in sequencing a genome allow a service provider (e.g. a sequencing company) to have full access to the genome information, and thus the privacy of individuals regarding their lifetime secret is violated. In this paper, we introduce the problem of private DNA sequencing, where the goal is to keep the DNA sequence private to the sequencer. We propose an architecture, where the task of reading fragments of DNA and the task of DNA assembly are separated, the former is done at the sequencer(s), and the later is completed at a local trusted data collector. To satisfy the privacy constraint at the sequencer and reconstruction condition at the data collector, we create an... 

    DPOCS: A dynamic proxy architecture for video streaming based on overlay network

    , Article 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Kuala Lumpur, 16 November 2005 through 18 November 2005 ; Volume 1 , 2005 , Pages 384-389 ; 1424400007 (ISBN); 9781424400003 (ISBN) Akbari, B ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2005
    Abstract
    In this paper, a new dynamic proxy solution based on overlay multicasting network for layered video streaming is presented. In our proposed approach, all clients in an Internet service provider network interested in receiving a video stream, provided by a media server in the Internet, organize themselves into an overlay tree. The root of the overlay tree acts as a proxy and receives video stream from original server and distributes it in the local overlay tree. In addition to introducing a new architecture, our main contribution in this paper is proposing a number of distributed protocols for construction and improvement of local overlay tree in video streaming applications. The experimental... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 4 , 2022 , Pages 2535-2545 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    A Model for Optimal Selection of Internet Bandwidth with Desired Quality of Service, and Applying it for Iran

    , M.Sc. Thesis Sharif University of Technology Ahoopai, Hossein (Author) ; Kianfar, Ferydoon (Supervisor)
    Abstract
    This thesis intends to provide a decision model to determine the best amount of bandwidth that must be rented from each of the broadband Internet service providers. Each internet service provider has a proposal. Each proposal consists of a path and a cost and the values of performance indicators for the path. The aim is to achieve an acceptable range for overall network key performance indicators with minimum total cost . Network performance key indicators are availability , packet loss and packet delay. Internet service providers have several pops throughout the world and there are several path to these pops. A link is a combination of origin point , local path , exit point ,... 

    Database as a service: Towards a unified solution for security requirements

    , Article Proceedings - International Computer Software and Applications Conference ; 2012 , Pages 415-420 ; 07303157 (ISSN) ; 9780769547589 (ISBN) Hadavi, M. A ; Noferesti, M ; Jalili, R ; Damiani, E ; Sharif University of Technology
    2012
    Abstract
    Security of database outsourcing, due to the untrustworthiness of service provider, is a basic challenge to have Database As a Service in a cloud computing environment. Having disparate assumptions to solve different aspects of security such as confidentiality and integrity is an obstacle for an integrated secure solution through the combination of existing approaches. Concentrating on confidentiality and integrity aspects of database outsourcing, this paper proposes an approach in which each attribute value is split up between several data servers using a customized threshold secret sharing scheme. Our approach preserves data confidentiality and at the same time provides the correctness... 

    A fuzzy ELECTRE approach for evaluating mobile payment business models

    , Article Proceedings - 2010 International Conference on Management of e-Commerce and e-Government, ICMeCG 2010, 23 October 2010 through 24 October 2010, Chengu, Sichuan ; 2010 , Pages 351-355 ; 9780769542454 (ISBN) Asghari, F ; Amidian, A. A ; Muhammadi, J ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Considering the significant growth in mobile phone use by customers and its high accessibility, this device can be considered as the most suitable tool in payment category. To implement a mobile payment service, there are many actors involved such as: bank, operator and service provider. As an effective interaction role and in order to optimize efficient parameters for implementing a mobile payment solution, it is necessary to present a suitable business model. Therefore, five different business models have been surveyed in the field of mobile payment in this research; then they were compared with MCDM evaluation method applications. Since one of the most effective parameter to select an... 

    An anonymous attribute-based access control system supporting access structure update

    , Article 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2019, 28 August 2019 through 29 August 2019 ; 2019 , Pages 85-91 ; 9781728143736 (ISBN) Chegenizadeh, M ; Ali, M ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    It is quite common nowadays for clients to outsource their personal data to a cloud service provider. However, it causes some new challenges in the area of data confidentiality and access control. Attribute-based encryption is a promising solution for providing confidentiality and fine-grained access control in a cloud-based cryptographic system. Moreover, in some cases, to preserve the privacy of clients and data, applying hidden access structures is required. Also, a data owner should be able to update his defined access structure at any time when he is online or not. As in several real-world application scenarios like e-health systems, the anonymity of recipients, and the possibility of... 

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    Deep Private-feature extraction

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 32, Issue 1 , 2020 , Pages 54-66 Osia, S. A ; Taheri, A ; Shamsabadi, A. S ; Katevas, K ; Haddadi, H ; Rabiee, H. R ; Sharif University of Technology
    IEEE Computer Society  2020
    Abstract
    We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy trade-off. We then implement and evaluate the performance of DPFE on smartphones to... 

    CEBAC: A decentralized cooperation enforcement based access control framework in MANETs

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 427-434 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Saremi, F ; Mashayekhi, H ; Movaghar, A ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Prevention of unauthorized access to services in mobile ad hoc networks is a more sophisticated problem than access control in other networks, due to interconnection facilities and lack of any fixed network infrastructure in such networks. Therefore regarding the nature of these networks, controlling access to services should be in a decentralized manner providing good performance and preserving network security. In this paper, we propose a decentralized Cooperation Enforcement Based Access Control (CEBAC) framework for mobile ad hoc networks. CEBAC comprises several groups of Service Authorizers, each issuing Credentials for access to a specific kind of services. The User Authorization for... 

    Private set operations over encrypted cloud dataset and applications

    , Article Computer Journal ; Volume 64, Issue 8 , 2021 , Pages 1145-1162 ; 00104620 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Oxford University Press  2021
    Abstract
    We introduce the notion of private set operations (PSO) as a symmetric-key primitive in the cloud scenario, where a client securely outsources his dataset to a cloud service provider and later privately issues queries in the form of common set operations. We define a syntax and security notion for PSO and propose a general construction that satisfies it. There are two main ingredients to our PSO scheme: an adjustable join (Adjoin) scheme (MIT-CSAIL-TR-2012-006 (2012) Cryptographic treatment of CryptDB's adjustable join. http://people.csail.mit.edu/nickolai/papers/popa-join-tr.pdf) and a tuple set (TSet) scheme (Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu, M.-C., and Steiner, M....