Loading...
Search for: outsourcing
0.007 seconds
Total 54 records

    Determining Strategic Direction of IT Process Outsourcing in Banking Industry Using Analytical Hierarchy Process (AHP) Technique Case Study: Karafarin Bank

    , M.Sc. Thesis Sharif University of Technology Kordzadeh, Nima (Author) ; Isaai, Mohammad Taghi (Supervisor)
    Abstract
    Due to the strategic importance of IT, there exists an undeniable need for a systematic analysis before deciding whether or not a particular IT process should be outsourced. A study that provides a systematic analysis for evaluating components of the company's IT for outsourcing may be useful to practitioners. In this research, analytic hierarchy process (AHP) is proposed as a suitable technique for analyzing information systems outsourcing decision. An IT outsourcing case is used to demonstrate the usefulness of the proposed approach. "Super Decisions" is used to implement the AHP  

    Critical Success Factors in Outsourcing of Construction Projects; Client’s Perspective (Case Study: Tehran Municipality)

    , M.Sc. Thesis Sharif University of Technology Haghnazar, Mohammad Ali (Author) ; Sepehri, Mehran (Supervisor)
    Abstract
    Outsourcing has considerably increased in number, as evident by the literature. Many activities, once being carried out by the organization itself, are now accomplished by contractors. Nowadays, implementing successful outsourcing projects is an important and challenging deal for outsourcer organizations. Such organizations always aim to finish their projects based on a defined scope of time, budget and quality while accepted by the final customer. Managers are trying to use outsourcing strategy more extensively but are faced with various problems in practice. So it’s advantageous to perform a research to identify these difficulties to be able to employ this strategy more efficiently. Due to... 

    A Secure DBMS Architecture to Preserve Data Privacy, Confidentiality, and Integrity

    , M.Sc. Thesis Sharif University of Technology Halvachi, Hadi (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    While data outsourcing provides some benefits, it suffers from new privacy and security concerns, mainly about the confidentiality and integrity of the stored sensitive data, as well as enforcing access control policies. Current solutions to these aims are not comprehensive and consider only one aspect of security requirements. A secure DBMS architecture is introduced that simultaneously considers confidentiality, integrity and access control enforcement requirements. The transparency of security functions from data owner, service providers, and applications facilitates the operationality of the solution.Additionally, a new indexing technique for character encrypted data is proposed that... 

    A Secrecy-Preserving Access Control in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Karimi, Leila (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes three challenges; 1) the average number of keys needed to access authorized resources, 2) efficient update of policies, and 3) confidentiality of data owner’s access control policies. Most of the existing proposed solutions address only one of these challenges, while they impose high overhead on both the data owner and users. Such an overhead prevents the model to be implemented in practical applications. In this thesis, we propose an approach to address all the aforementioned challenges with acceptable overhead. In this approach, which is based on selective... 

    Using Functional Encryption to Manage Encrypted Data

    , M.Sc. Thesis Sharif University of Technology Mahfoozi, Rohollah (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Recently, many organizations outsource their data on an external server to rescue the trouble of data maintenance. But, data owners do not trust in the external server to enforce defined access control policies. In recent years, many researches was dedicated to cryptographic access control on outsourced data, in order to solve this problem. We introduce a method based on Attribute-based Encryption to enforce access control on outsourced data. In this method we consider policy updating and administrative access control. As a result The owner is not only able to change access control policies on outsourced data but also to define administrative rights (grant/revoke) for some admin users. Our... 

    Confidential Access to the Outsourced Relational Data

    , M.Sc. Thesis Sharif University of Technology NajmAbadi, Elahe Sadat (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    In recent years, there has been a trend toward outsourcing data to the cloud provider. These companies must tackle the data security challenges. Generally these parties are assumed to be honest but curious. In past years, the research communities have been investigating different solution to ensure confidentiality.
    In addition to data confidentiality access and pattern confidentiality is a high-priority issue in some cases so. potential adversary should be unable to drive information from the observed access pattern to the outsourced data. Despite the fact that there are more investigation in the field of data confidentiality, concern over data security are the rise in outsourcing data,... 

    Fourth Party Training (4PT)Concepts and Business Model

    , M.Sc. Thesis Sharif University of Technology Asadollahi, Elham (Author) ; Akbari Jokar, Mohammad Reza (Supervisor)
    Abstract
    Success in a business will be met by the different factors, of which one of the most important is design and execution of a good business model upon the inauguration of each company. Indicating the commercialization of innovations and innovative commercial ideas, it shows the productivity of innovation. Outsourcing the Training management in organizations is an issue the world pioneer organizations feel its necessity. Training systems in organizations have limited resources, don't have the required knowledge and financial sufficiency for effective execution of all Training processes. Therefore, Training management outsourcing may be a good alternative for meeting perspective and facilitating... 

    Enforcing Access Control Policies over Data Stored on Untrusted Server

    , M.Sc. Thesis Sharif University of Technology Soltani, Naeimeh (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    Recently many organizations outsource their data to an external server due to easier data maintenance. One of the security issues in data outsourcing scenario is the enforcement of data owner’s access control policies. This includes some challenges; namely, the number of keys needed to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies . Most of the existing proposed solutions address only some of these challenges, while they impose high overhead on both the data owner and users. Moreover, most of them address enfrocement of policies in form of access control matrix and... 

    Definition of Model For Evaluation of Paint Shops Outsourcing In Car Manufacturing Company

    , M.Sc. Thesis Sharif University of Technology Salehi, Hamid Reza (Author) ; Eshraghniaye Jahromi, Abdolhamid (Supervisor)
    Abstract
    Decreasing cost, enhancing quality, increasing the customer satisfaction and the productivity to gain farther market shares are among the reasons for urging the companies to outsource their needs. In this study the definition of outsourcing, its advantages and weaknesses and the risks associated with it are presented and then models for decision making on outsourcing and its implementation process are discussed. As a scope for this mention, then the evaluation of outsourcing procedures for the paint shops is selected and studied. A model for the case is also presented. The case study is undertaken in Iran Khodro's paint shop during the years: 1379 – 1384 as a practical case. We can summarize... 

    Processing Queries with Mathematical Expressions on Encrypted Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Naseri Boroujeni, Saeed (Author) ; Jalil, Rasool (Supervisor)
    Abstract
    The ever-increasing volume of data and the lack of computational and storage facilities have caused a managerial challenge to organizations. The existence of these challenges on the one hand and the increase of storage services on the other hand have compelled the organizations to delegate their storage and management of data to the server providers of cloud storage services. The outsourcing of data to servers obviates the need for purchasing exorbitant storage equipment and recruiting professional workforce in the organization. Since the organization’s data will be kept outside the organization’s ambience in case of using such services in form of outsourcing, and the data will not be under... 

    Regular Expression Based Search on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Bohlooli, Ramin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    As cloud computing becomes a ubiquitous technology, data outsourcing, which means delegating storage and retrieval of the data to an extraneous service provider, becomes more popular. One of the main issues in data outsourcing is preserving data confidentiality and privacy. A common solution to this problem is encrypting the data before outsourcing, but this approach prevents the service provider from doing computations on the data. A trivial solution is to transfer all of the data to the client-side and decrypt it before doing the computations, but this solution imposes a large overhead on the client-side and contradicts the philosophy of outsourcing. Till now, so many encryption schemes... 

    Mutual Operation and Routing Problem Considering Customer Clustering in Cloud Manufacturing

    , M.Sc. Thesis Sharif University of Technology Assari, Mozhgan (Author) ; Fattahi Valilai, Omid (Supervisor)
    Abstract
    Regarding to globalization concept, all companies around the world can communicate with each other, share their technologies and also compensate their production deficiencies. To achieve this goal, cloud manufacturing system have been proposed and investigated. One of the most important issues in cloud manufacturing is focusing on the service composition, in which a composition of cloud services is determined to meet customer demands. Also due to the distribution of the resources in the different points and geographic locations, considering to the production and routing which previously have been studied in the classical space is very important. Considering this, the problem is as follows:... 

    An Optimization Model for Cloud Service Composition and Matching of Mutual Operation and Routing Outsourcing in Cloud Supply Networks

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Reza (Author) ; Fatahi, Omid (Supervisor)
    Abstract
    With the development of science and technology and its application in IT (e.g. internet, intranet and URL) the sharing of manufacturing resources reaches higher research attention, where resource virtualization enables new possibilities in terms of collaboration. As a result of these changes, with the intention of sharing optimum allocation of cloud manufacturing resource and capability among service providers and service users, the concept of service composition was introduced. Cloud services can be combine to build virtual manufacturing chain, so a strategy focusing on the evaluation and selection of virtual manufacturing resources to fulfill given services is fundamental exercise to... 

    A new Model for Mutual Logistic and Operation Outsourcing Considering Flexibility in Operation Process Chart (OPC) Selection

    , M.Sc. Thesis Sharif University of Technology Malek, Mahsa (Author) ; Fatahi Valilai, Omid (Supervisor)
    Abstract
    Cloud Manufacturing is a new paradigm which under development and has been introduced as one of the promising models for providing ubiquitous, convenient, on-demand network access to a shared pool of configurable manufacturing resources (e.g, networks, servers, facilities, applications, robots, machines and services) that can be rapidly provisioned with minimal management effort and service provider’s interaction. Cloud Manufacturing is defined based on Cloud Computing. Like the Cloud Computing, Cloud Manufaturing offers a service-oriented architecture that is based on information technology (IT) in which each manufacturing resources is expressed as a service. For providing a... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Developing an Integrated Framework for Outsourcing in the Auto Industry

    , M.Sc. Thesis Sharif University of Technology Motamedi, Sadegh (Author) ; Sheikhzadeh, Mehdi (Supervisor)
    Abstract
    Outsourcing is currently a challenging issue in the auto industry. On one hand, outsourcing has be-come a competitive imperative for automakers due to its significant benefits. On the other hand, it involves many aspects of risks that could potentially hurt core competencies of a firm. As such, in the auto industry, it is highly critical to make optimal outsourcing decisions for which an integrated framework offering a holistic view seems quite necessary. In this thesis, based on four fundamental research questions of “Who?”, “What?”, “Whom?” and “How?”, an integrated framework for outsourcing in the auto industry is developed in order to identify effective outsourcing factors and associated... 

    A Confidentiality and Integrity Preserving Architecture for Secure Data Outsourcing

    , M.Sc. Thesis Sharif University of Technology Shahrokhi, Hesamoddin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Infrastructural costs of data management, have led people and organizations to outsource their data. This approach is facing with some significant security challenges and risks. The goal of this research, is to present an architecture for secure outsourcing of data in a way that used methods, storage processes, query processing methods and access control mechanisms work together to preserve confidentiality and integrity of outsourced data. In this architecture, the main challenge is transparent placement of some components between client and server in order to prevent user from being aware of communication with a secured server. In order to create this degree of transparency, we need to pay... 

    Providing Confidentiality of Outsourced Data through Fragmentation

    , M.Sc. Thesis Sharif University of Technology Dodangeh, Peyman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced... 

    Indexing Based Search on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Habibi, Ali (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is a process that delegates storage, retrieval, and management of data to an external storage service provider. Data outsourcing will create security challenges for data owners despite decreasing the costs. The most important security challenges in this process are to maintain the confidentiality of data in order to prevent the server's access to information and to ensure that data retrieved from the server is correct. Numerous studies have been conducted to address each of these concerns, each with specific capabilities and overheads. The presented methods generally support some parts of the database's functionality, and feature enhancement in them is along with an increase...