Loading...
Search for: service-provider
0.007 seconds
Total 30 records

    Radio Resource Sharing in Wireless Network Virtualization Based on Game Models

    , M.Sc. Thesis Sharif University of Technology Nouri, Farhad (Author) ; Ashtiani, Farid (Supervisor) ; Mirmohseni, Mahtab (Co-Supervisor)
    Abstract
    In the next generation of wireless networks, wireless network virtualization is considered as an efficient technology to enhance the network capacity. This technology enables the separation between wireless network infrastructure and the services it provides that enhances some of the existing capabilities and make new capabilities in the network. Spectrum sharing,infrastructure sharing, network sharing, resource slicing are some of these capabilities.Furthermore, the mentioned separation causes the lower entry barriers for small beneficiary entities. The increment in the number of beneficiary entities makes intense competitions among them leading to lower costs for different services. Also,... 

    A Model for Optimal Selection of Internet Bandwidth with Desired Quality of Service, and Applying it for Iran

    , M.Sc. Thesis Sharif University of Technology Ahoopai, Hossein (Author) ; Kianfar, Ferydoon (Supervisor)
    Abstract
    This thesis intends to provide a decision model to determine the best amount of bandwidth that must be rented from each of the broadband Internet service providers. Each internet service provider has a proposal. Each proposal consists of a path and a cost and the values of performance indicators for the path. The aim is to achieve an acceptable range for overall network key performance indicators with minimum total cost . Network performance key indicators are availability , packet loss and packet delay. Internet service providers have several pops throughout the world and there are several path to these pops. A link is a combination of origin point , local path , exit point ,... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    Security of multi-adjustable join schemes: separations and implications

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 4 , 2022 , Pages 2535-2545 ; 15455971 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Database management systems (DBMS) are one of cloud services with major applications in industry and business. In the use of such services, since the cloud service provider cannot be entrusted with the plain data, the databases are typically encrypted prior to outsourcing. One of the most challenging issues in designing these services is supporting SQL join queries on the encrypted database. The multi-adjustable join scheme (M-Adjoin) [Khazaei-Rafiee 2020], an extension of Adjoin [Popa-Zeldovich 2012 and Mironov-Segev-Shahaf 2017], is a symmetric-key primitive that supports the join queries for a list of column labels on an encrypted database. In previous works, the following security... 

    Resource provisioning of MVNOs in a virtualized wireless network: a procurement auction approach

    , Article 2018 IEEE Globecom Workshops, GC Wkshps 2018, 9 December 2018 through 13 December 2018 ; 2019 ; 9781538649206 (ISBN) Nouri, F ; Ashtiani, F ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In wireless network virtualization, by separating services and infrastructure, and due to new network components, some new challenges appear. In this paper, we consider the competition among multiple mobile virtual network operators (MVNOs) for provisioning the required rates for users subscribed to a service provider (SP). To realize this competition, we consider an SP as a beneficiary decision maker component, who can choose which users to be serviced by each MVNO. Since the states between each user and different channels of each MVNO are distinct, MVNOs compete to serve the users with good channel conditions to minimize their costs. Using a multiple non-identical object procurement... 

    Private shotgun and sequencing

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 171-175 ; 21578095 (ISSN); 9781538692912 (ISBN) Gholami, A ; Maddah Ali, M. A ; Abolfazl Motahari, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    Current techniques in sequencing a genome allow a service provider (e.g. a sequencing company) to have full access to the genome information, and thus the privacy of individuals regarding their lifetime secret is violated. In this paper, we introduce the problem of private DNA sequencing, where the goal is to keep the DNA sequence private to the sequencer. We propose an architecture, where the task of reading fragments of DNA and the task of DNA assembly are separated, the former is done at the sequencer(s), and the later is completed at a local trusted data collector. To satisfy the privacy constraint at the sequencer and reconstruction condition at the data collector, we create an... 

    Private set operations over encrypted cloud dataset and applications

    , Article Computer Journal ; Volume 64, Issue 8 , 2021 , Pages 1145-1162 ; 00104620 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Oxford University Press  2021
    Abstract
    We introduce the notion of private set operations (PSO) as a symmetric-key primitive in the cloud scenario, where a client securely outsources his dataset to a cloud service provider and later privately issues queries in the form of common set operations. We define a syntax and security notion for PSO and propose a general construction that satisfies it. There are two main ingredients to our PSO scheme: an adjustable join (Adjoin) scheme (MIT-CSAIL-TR-2012-006 (2012) Cryptographic treatment of CryptDB's adjustable join. http://people.csail.mit.edu/nickolai/papers/popa-join-tr.pdf) and a tuple set (TSet) scheme (Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu, M.-C., and Steiner, M.... 

    Power allocation in coordinated multi-cell networks using Stackelberg game

    , Article 2012 6th International Symposium on Telecommunications, IST 2012 ; 2012 , Pages 289-294 ; 9781467320733 (ISBN) Haddadi, S ; Behroozi, H ; Khalaj, B. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we study the power allocation problem in multi-cell orthogonal frequency division multiple access (OFDMA) networks. In order to improve system performance in cell-edges, users are separated into two groups with respect to their distance from base-stations (BSs): Central users and cell-edge users. Coordinated multi-point joint transmission (CoMP-JT) technology incorporated with static clustering is used for users near the cell-edges. In addition, our goal is to serve users with different target signal to interference plus noise ratio (SINR) according to their requested quality of services. Consequently, revenue of the service provider is considered as another factor and two... 

    Optimal residential load management in smart grids: A decentralized framework

    , Article IEEE Transactions on Smart Grid ; Volume 7, Issue 4 , 2016 , Pages 1836-1845 ; 19493053 (ISSN) Safdarian, A ; Fotuhi Firuzabad, M ; Lehtonen, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Severe peak rebounds are likely in absence of a system-wide coordination among customers participating in demand response programs. This paper aims to establish a decentralized system-wide framework to coordinate demand response of residential customers in a smart grid. The objective of the framework is to modify system load profile provided that customers' payments are minimized, and their comfort and privacy are preserved. Home load management (HLM) modules, embedded in customers' smart meters are autonomous agents of the framework. The energy service provider iteratively exchanges load information with HLM modules in the hope of achieving his desired load profile. In each iteration, the... 

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    Failure recovery of composite semantic web services using subgraph replacement

    , Article International Conference on Computer and Communication Engineering 2008, ICCCE08: Global Links for Human Development, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 489-493 ; 9781424416929 (ISBN) Saboohi, H ; Amini, A ; Abolhassani, H ; Sharif University of Technology
    2008
    Abstract
    Web services foster functionality of current web to service oriented architecture. Nascent semantic web is capable of automating activities by annotating shared ontological semantics to documents and services. Although, a zillion web services with diversity have been made since the inception of its diffusion, it is not a panacea for software development and it is still in its infancy. A middle agent (broker) simplifies the interaction of service providers and service requester, especially in the case that an atomic web service cannot fulfill user's need. The broker composes a desired value-added service and orchestrates the execution of bundled sub-processes. It is inevitable that several... 

    Equilibrial service composition model in Cloud manufacturing (ESCM) based on non-cooperative and cooperative game theory for healthcare service equipping

    , Article PeerJ Computer Science ; Volume 7 , 2021 ; 23765992 (ISSN) Vaziri Goudarzi, E ; Houshmand, M ; Fattahi Valilai, O ; Ghezavati, V ; Bamdad, S ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    Industry 4.0 is the digitalization of the manufacturing systems based on Information and Communication Technologies (ICT) for developing a manufacturing system to gain efficiency and improve productivity. Cloud Manufacturing (CM) is a paradigm of Industry 4.0. Cloud Manufacturing System (CMS) considers anything as a service. The end product is developed based on the service composition in the CMS according to consumers’ needs. Also, composite services are developed based on the interaction of MCS providers from different geographical locations. Therefore, the appropriate Manufacturing Cloud Service (MCS) composition is an important problem based on the real-world conditions in CMS. The game... 

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    Efficient distribution of requests in federated cloud computing environments utilizing statistical multiplexing

    , Article Future Generation Computer Systems ; Volume 90 , 2019 , Pages 451-460 ; 0167739X (ISSN) Habibi, M ; Fazli, M ; Movaghar, A ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    One of the main questions in cloud computing environments is how to efficiently distribute user requests or Virtual Machines (VMs) based on their resource needs over time. This question is also an important one when dealing with a cloud federation environment where rational cloud service providers are collaborating together by sharing customer requests. By considering intrinsic aspects of the cloud computing model one can propose request distribution methods that play on the strengths of this computing paradigm. In this paper we look at statistical multiplexing and server consolidation as such a strength and examine the use of the coefficient of variation and other related statistical... 

    Dynamic mutual manufacturing and transportation routing service selection for cloud manufacturing with multi-period service-demand matching

    , Article PeerJ Computer Science ; Volume 7 , 2021 , Pages 1-30 ; 23765992 (ISSN) Sadeghi Aghili, S. A ; Fatahi Valilai, O ; Haji, A ; Khalilzadeh, M ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    Recently, manufacturing firms and logistics service providers have been encouraged to deploy the most recent features of Information Technology (IT) to prevail in the competitive circumstances of manufacturing industries. Industry 4.0 and Cloud manufacturing (CMfg), accompanied by a service-oriented architecture model, have been regarded as renowned approaches to enable and facilitate the transition of conventional manufacturing business models into more efficient and productive ones. Furthermore, there is an aptness among the manufacturing and logistics businesses as service providers to synergize and cut down the investment and operational costs via sharing logistics fleet and production... 

    Dynamic mutual manufacturing and transportation routing service selection for cloud manufacturing with multi-period service-demand matching

    , Article PeerJ Computer Science ; Volume 7 , 2021 , Pages 1-30 ; 23765992 (ISSN) Sadeghi Aghili, S. A ; Valilai, O.F ; Haji, A ; Khalilzadeh, M ; Sharif University of Technology
    PeerJ Inc  2021
    Abstract
    Recently, manufacturing firms and logistics service providers have been encouraged to deploy the most recent features of Information Technology (IT) to prevail in the competitive circumstances of manufacturing industries. Industry 4.0 and Cloud manufacturing (CMfg), accompanied by a service-oriented architecture model, have been regarded as renowned approaches to enable and facilitate the transition of conventional manufacturing business models into more efficient and productive ones. Furthermore, there is an aptness among the manufacturing and logistics businesses as service providers to synergize and cut down the investment and operational costs via sharing logistics fleet and production... 

    DPOCS: A dynamic proxy architecture for video streaming based on overlay network

    , Article 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Kuala Lumpur, 16 November 2005 through 18 November 2005 ; Volume 1 , 2005 , Pages 384-389 ; 1424400007 (ISBN); 9781424400003 (ISBN) Akbari, B ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    2005
    Abstract
    In this paper, a new dynamic proxy solution based on overlay multicasting network for layered video streaming is presented. In our proposed approach, all clients in an Internet service provider network interested in receiving a video stream, provided by a media server in the Internet, organize themselves into an overlay tree. The root of the overlay tree acts as a proxy and receives video stream from original server and distributes it in the local overlay tree. In addition to introducing a new architecture, our main contribution in this paper is proposing a number of distributed protocols for construction and improvement of local overlay tree in video streaming applications. The experimental... 

    Deep Private-feature extraction

    , Article IEEE Transactions on Knowledge and Data Engineering ; Volume 32, Issue 1 , 2020 , Pages 54-66 Osia, S. A ; Taheri, A ; Shamsabadi, A. S ; Katevas, K ; Haddadi, H ; Rabiee, H. R ; Sharif University of Technology
    IEEE Computer Society  2020
    Abstract
    We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy trade-off. We then implement and evaluate the performance of DPFE on smartphones to... 

    Deep private-feature extraction

    , Article IEEE Transactions on Knowledge and Data Engineering ; 2018 ; 10414347 (ISSN) Osia, S. A ; Taheri, A ; Shamsabadi, A. S ; Katevas, M ; Haddadi, H ; Rabiee, H. R. R ; Sharif University of Technology
    IEEE Computer Society  2018
    Abstract
    We present and evaluate Deep Private-Feature Extractor (DPFE), a deep model which is trained and evaluated based on information theoretic constraints. Using the selective exchange of information between a user's device and a service provider, DPFE enables the user to prevent certain sensitive information from being shared with a service provider, while allowing them to extract approved information using their model. We introduce and utilize the log-rank privacy, a novel measure to assess the effectiveness of DPFE in removing sensitive information and compare different models based on their accuracy-privacy trade-off. We then implement and evaluate the performance of DPFE on smartphones to...