Loading...
Search for: outsourcing
0.005 seconds
Total 54 records

    Definition of Model For Evaluation of Paint Shops Outsourcing In Car Manufacturing Company

    , M.Sc. Thesis Sharif University of Technology Salehi, Hamid Reza (Author) ; Eshraghniaye Jahromi, Abdolhamid (Supervisor)
    Abstract
    Decreasing cost, enhancing quality, increasing the customer satisfaction and the productivity to gain farther market shares are among the reasons for urging the companies to outsource their needs. In this study the definition of outsourcing, its advantages and weaknesses and the risks associated with it are presented and then models for decision making on outsourcing and its implementation process are discussed. As a scope for this mention, then the evaluation of outsourcing procedures for the paint shops is selected and studied. A model for the case is also presented. The case study is undertaken in Iran Khodro's paint shop during the years: 1379 – 1384 as a practical case. We can summarize... 

    A verifiable delegated set intersection without pairing

    , Article 2017 25th Iranian Conference on Electrical Engineering, ICEE 2017, 2 May 2017 through 4 May 2017 ; 2017 , Pages 2047-2051 ; 9781509059638 (ISBN) Mahdavi Oliaiy, M ; Ameri, M. H ; Mohajeri, J ; Aref, M. R ; Sharif University of Technology
    Abstract
    Recently, there has been shown a great interest in the private set intersection (PSI) protocols which are widely used in social networks applications. In a PSI protocol two entities are able to find the intersection of their document set without inferring more information than the common data. In some PSI protocols the process of finding the intersections of the documents are delegated to a third entity like cloud which has high computational and storage resources and the clients can verify the accuracy of the received results. These protocols are known as the Verifiable Delegated Set Intersection (VDSI). In this paper, we proposed an efficient VDSI protocol by employing the El-Gamal... 

    A new extended analytical hierarchy process technique with incomplete intervalvalued information for risk assessment in IT outsourcing

    , Article International Journal of Engineering, Transactions B: Applications ; Volume 30, Issue 5 , 2017 , Pages 739-748 ; 1728144X (ISSN) Ebrahimnejad, S ; Gitinavard, H ; Sohrabvandi, S ; Sharif University of Technology
    Abstract
    Information technology (IT) outsourcing has been recognized as a new methodology in many organizations. Yet making an appropriate decision with regard to selection and use of these methodologies may impose uncertainties and risks. Estimating the occurrence probability of risks and their impacts organizations goals may reduce their threats. In this study, an extended analytical hierarchical process method is tailored based on interval-valued hesitant fuzzy information to assess the risks in IT outsourcing. In the proposed approach, the weight of each decision maker is implemented in process of the proposed method by considering the concept of simple additive weighting method to decrease the... 

    Processing Queries with Mathematical Expressions on Encrypted Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Naseri Boroujeni, Saeed (Author) ; Jalil, Rasool (Supervisor)
    Abstract
    The ever-increasing volume of data and the lack of computational and storage facilities have caused a managerial challenge to organizations. The existence of these challenges on the one hand and the increase of storage services on the other hand have compelled the organizations to delegate their storage and management of data to the server providers of cloud storage services. The outsourcing of data to servers obviates the need for purchasing exorbitant storage equipment and recruiting professional workforce in the organization. Since the organization’s data will be kept outside the organization’s ambience in case of using such services in form of outsourcing, and the data will not be under... 

    Enforcing access control policies over data stored on untrusted server

    , Article 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, ISCISC 2017, 6 September 2017 through 7 September 2017 ; 2018 , Pages 54-57 ; 9781538665602 (ISBN) Soltani, N ; Jalili, R ; Sharif University of Technology
    Abstract
    One of the security issues in data outsourcing scenario is the enforcement of data owner's access control policies. This includes some challenges; namely, the number of keys required to access authorized resources, efficient policy updating, write access control enforcement, user and data owner overhead, and preserving confidentiality of data and policies. Most of the existing solutions address only some of the challenges, while they impose high overhead on both the data owner and users. Though, policy management in the Role-Based Access Control (RBAC) model is easier and more efficient due to the existence of role hierarchical structure and role inheritance; most of the existing solutions... 

    Regular Expression Based Search on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Bohlooli, Ramin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    As cloud computing becomes a ubiquitous technology, data outsourcing, which means delegating storage and retrieval of the data to an extraneous service provider, becomes more popular. One of the main issues in data outsourcing is preserving data confidentiality and privacy. A common solution to this problem is encrypting the data before outsourcing, but this approach prevents the service provider from doing computations on the data. A trivial solution is to transfer all of the data to the client-side and decrypt it before doing the computations, but this solution imposes a large overhead on the client-side and contradicts the philosophy of outsourcing. Till now, so many encryption schemes... 

    Mutual Operation and Routing Problem Considering Customer Clustering in Cloud Manufacturing

    , M.Sc. Thesis Sharif University of Technology Assari, Mozhgan (Author) ; Fattahi Valilai, Omid (Supervisor)
    Abstract
    Regarding to globalization concept, all companies around the world can communicate with each other, share their technologies and also compensate their production deficiencies. To achieve this goal, cloud manufacturing system have been proposed and investigated. One of the most important issues in cloud manufacturing is focusing on the service composition, in which a composition of cloud services is determined to meet customer demands. Also due to the distribution of the resources in the different points and geographic locations, considering to the production and routing which previously have been studied in the classical space is very important. Considering this, the problem is as follows:... 

    An Optimization Model for Cloud Service Composition and Matching of Mutual Operation and Routing Outsourcing in Cloud Supply Networks

    , M.Sc. Thesis Sharif University of Technology Jamshidi, Mohammad Reza (Author) ; Fatahi, Omid (Supervisor)
    Abstract
    With the development of science and technology and its application in IT (e.g. internet, intranet and URL) the sharing of manufacturing resources reaches higher research attention, where resource virtualization enables new possibilities in terms of collaboration. As a result of these changes, with the intention of sharing optimum allocation of cloud manufacturing resource and capability among service providers and service users, the concept of service composition was introduced. Cloud services can be combine to build virtual manufacturing chain, so a strategy focusing on the evaluation and selection of virtual manufacturing resources to fulfill given services is fundamental exercise to... 

    A new Model for Mutual Logistic and Operation Outsourcing Considering Flexibility in Operation Process Chart (OPC) Selection

    , M.Sc. Thesis Sharif University of Technology Malek, Mahsa (Author) ; Fatahi Valilai, Omid (Supervisor)
    Abstract
    Cloud Manufacturing is a new paradigm which under development and has been introduced as one of the promising models for providing ubiquitous, convenient, on-demand network access to a shared pool of configurable manufacturing resources (e.g, networks, servers, facilities, applications, robots, machines and services) that can be rapidly provisioned with minimal management effort and service provider’s interaction. Cloud Manufacturing is defined based on Cloud Computing. Like the Cloud Computing, Cloud Manufaturing offers a service-oriented architecture that is based on information technology (IT) in which each manufacturing resources is expressed as a service. For providing a... 

    Investment cost optimization for industrial project portfolios using technology mining

    , Article Technological Forecasting and Social Change ; Volume 138 , 2019 , Pages 243-253 ; 00401625 (ISSN) Azimi, S ; Rahmani, R ; Fateh rad, M ; Sharif University of Technology
    Elsevier Inc  2019
    Abstract
    Large technology-intensive enterprises and companies face a constant challenge: How can a set of selected high-tech projects get done in a manner that would minimize the total cost across all projects? In majority of cases, projects are assumed independent, leading to a separate cost evaluation. This assumption often does not hold for real-world project portfolios, frequently sharing overlapping technologies. In this paper, we show how the order of the execution of the projects can directly affect the total cost of the portfolio, due to shared dependencies. Modeling the problems in this area can be achieved by combining two main fields: graph theory and technology mining. A novel method is... 

    Query Correctness Assurance for Outsourced Databases

    , M.Sc. Thesis Sharif University of Technology Noferesti, Morteza (Author) ; Jalili, Rasoul (Supervisor)
    Abstract
    In the secure data outsourcing scenario, verification of the reply of an unreliable server includes assessing the authenticity, completeness and it’s integrity. In this thesis, an efficient method, with emphasis on freshness, has been introduced to evaluate the correctness of the replies from a server. It takes in hand different application needs, inherent differences in the data, and different update mechanisms. This method evaluates freshness by using timestamps alongside the data being out sourced. Due to the requirement of verifying not only the freshness of the response, but the correctness of the timestamps as well, two general methods for evaluating and verifying the responses were... 

    A Trust-based Approach for Correctness Verification of Query Results in Data Outsourcing Scenario

    , M.Sc. Thesis Sharif University of Technology Ghasemi, Simin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    One of the security issues in database outsourcing scenario is the correctness of the query results. Correctness verification includes integrity, completeness and freshness of the results. Most of the proposed approaches for correctness verification impose high overhead on the components of the scenario which prevents the scenario to implemented in practical applications. In this thesis, we have proposed a probabilistic approach which imposes acceptable overhead for correctness verification of returned results of service provider. The approach uses the previous behavior of the service provider to calculate a trust value toward it which is used to adjust the imposed overhead. In other words,... 

    Developing an Integrated Framework for Outsourcing in the Auto Industry

    , M.Sc. Thesis Sharif University of Technology Motamedi, Sadegh (Author) ; Sheikhzadeh, Mehdi (Supervisor)
    Abstract
    Outsourcing is currently a challenging issue in the auto industry. On one hand, outsourcing has be-come a competitive imperative for automakers due to its significant benefits. On the other hand, it involves many aspects of risks that could potentially hurt core competencies of a firm. As such, in the auto industry, it is highly critical to make optimal outsourcing decisions for which an integrated framework offering a holistic view seems quite necessary. In this thesis, based on four fundamental research questions of “Who?”, “What?”, “Whom?” and “How?”, an integrated framework for outsourcing in the auto industry is developed in order to identify effective outsourcing factors and associated... 

    A Confidentiality and Integrity Preserving Architecture for Secure Data Outsourcing

    , M.Sc. Thesis Sharif University of Technology Shahrokhi, Hesamoddin (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Infrastructural costs of data management, have led people and organizations to outsource their data. This approach is facing with some significant security challenges and risks. The goal of this research, is to present an architecture for secure outsourcing of data in a way that used methods, storage processes, query processing methods and access control mechanisms work together to preserve confidentiality and integrity of outsourced data. In this architecture, the main challenge is transparent placement of some components between client and server in order to prevent user from being aware of communication with a secured server. In order to create this degree of transparency, we need to pay... 

    Providing Confidentiality of Outsourced Data through Fragmentation

    , M.Sc. Thesis Sharif University of Technology Dodangeh, Peyman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is considered as a promising approach in today computing and connected world. This approach enables organizations to outsource their data to anexternal third party server which is responsible for storing and propagation of outsourced data. Although data outsourcing offers many benefits, especially for those organizations with limited resources and increaseing data volume, but this approach in security aspects like providing confidentiality and privacy about curious external third party or other threats, is faced by serious challenges. In the recent decade many approaches for solving or at least decreasing the potential threats over providing confidentiality of outsourced... 

    Indexing Based Search on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Habibi, Ali (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing is a process that delegates storage, retrieval, and management of data to an external storage service provider. Data outsourcing will create security challenges for data owners despite decreasing the costs. The most important security challenges in this process are to maintain the confidentiality of data in order to prevent the server's access to information and to ensure that data retrieved from the server is correct. Numerous studies have been conducted to address each of these concerns, each with specific capabilities and overheads. The presented methods generally support some parts of the database's functionality, and feature enhancement in them is along with an increase... 

    A stochastic programming model for a capacitated location-allocation problem with heterogeneous demands

    , Article Computers and Industrial Engineering ; Volume 137 , 2019 ; 03608352 (ISSN) Alizadeh, M ; Ma, J ; Mahdavi Amiri, N ; Marufuzzaman, M ; Jaradat, R ; Sharif University of Technology
    Elsevier Ltd  2019
    Abstract
    In this paper, we develop a stochastic programming model for the capacitated location-allocation problem in the heterogeneous environment where the demands are distributed according to the Bernoulli function with different probabilities. The capacitated sub-sources of facilities are also involved to satisfy customers’ demands in this work. This study aims to find optimal locations of facilities and optimal allocations of existing customers to the facilities so that the total cost of operating facilities, allocating the customers, expected servicing and outsourcing is minimized. Due to the large amount of customers with different demand probabilities, accurate estimation of the outsourcing... 

    Job shop scheduling with the option of jobs outsourcing

    , Article International Journal of Production Research ; Volume 57, Issue 10 , 2019 , Pages 3255-3272 ; 00207543 (ISSN) Safarzadeh, H ; Kianfar, F ; Sharif University of Technology
    Taylor and Francis Ltd  2019
    Abstract
    Incorporating outsourcing in scheduling is addressed by several researchers recently. However, this scope is not investigated thoroughly, particularly in the job shop environment. In this paper, a new job shop scheduling problem is studied with the option of jobs outsourcing. The problem objective is to minimise a weighted sum of makespan and total outsourcing cost. With the aim of solving this problem optimally, two solution approaches of combinatorial optimisation problems, i.e. mathematical programming and constraint programming are examined. Furthermore, two problem relaxation approaches are developed to obtain strong lower bounds for some large scale problems for which the optimality is... 

    Private Set Operations Over Encrypted Data in Cloud Computing

    , Ph.D. Dissertation Sharif University of Technology Rafiee Karkevandi, Mojtaba (Author) ; Khazaei, Shahram (Supervisor)
    Abstract
    In recent years, different cryptographic tools have been introduced for a wide range of cloud computing applications that can be classified based on a trade-off between performance and security. In this thesis, we introduced the private set operation schemes, and at their heart, private set intersection schemes, in the cloud computing platform. These schemes are of particular importance because they can be used as basic cryptographic schemes for a wide range of functionalities in the cloud platform. Using these schemes, the user can securely store datasets on the cloud, run set queries remotely and receive the desired results. To this end, we first modeled the syntax and the security notions... 

    Attribute-based fine-grained access control for outscored private set intersection computation

    , Article Information Sciences ; Volume 536 , 2020 , Pages 222-243 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    Private set intersection (PSI) is a fundamental cryptographic protocol which has a wide range of applications. It enables two clients to compute the intersection of their private datasets without revealing non-matching elements. The advent of cloud computing drives the ambition to reduce computation and data management overhead by outsourcing such computations. However, since the cloud is not trustworthy, some cryptographic methods should be applied to maintain the confidentiality of datasets. But, in doing so, data owners may be excluded from access control on their outsourced datasets. Therefore, to control access rights and to interact with authorized users, they have to be online during...