Loading...
Search for: outsourcing
0.006 seconds
Total 54 records

    A fully distributed hierarchical attribute-based encryption scheme

    , Article Theoretical Computer Science ; Volume 815 , 2020 , Pages 25-46 Ali, M ; Mohajeri, J ; Sadeghi, M. R ; Liu, X ; Sharif University of Technology
    Elsevier B.V  2020
    Abstract
    With the development of cloud computing, many enterprises have been interested in outsourcing their data to cloud servers to decrease IT costs and rise capabilities of provided services. To afford confidentiality and fine-grained data access control, attribute-based encryption (ABE) was proposed and used in several cloud storage systems. However, scalability and flexibility in key delegation and user revocation mechanisms are primary issues in ABE systems. In this paper, we introduce the concept of a fully distributed revocable ciphertext-policy hierarchical ABE (FDR-CP-HABE) and design the first FDR-CP-HABE scheme. Our scheme offers a high level of flexibility and scalability in the key... 

    An identity-based online/offline secure cloud storage auditing scheme

    , Article Cluster Computing ; Volume 23, Issue 2 , 2020 , Pages 1455-1468 Rabaninejad, R ; Rajabzadeh Asaar, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
    Springer  2020
    Abstract
    Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline... 

    A lightweight identity-based provable data possession supporting users’ identity privacy and traceability

    , Article Journal of Information Security and Applications ; Volume 51 , 2020 Rabaninejad, R ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
    Elsevier Ltd  2020
    Abstract
    Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction... 

    A Secure and Effcient Approach for Processing Join Query on Encrypted Outsourced Data

    , M.Sc. Thesis Sharif University of Technology Hadian, Saman (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing As a cloud service, it is a solution to reduce the cost of data storage and management in small and medium organizations. One of the main concerns in this area is the privacy of data owners and the non-disclosure of information by curious (albeit trusted) public cloud service providers. Resolving this issue requires encrypting the data before sending it to the cloud server. Transferring all encrypted data to the cloud server and performing various queries after encryption imposes a lot of time, computational and storage overhead, which destroys the philosophy of outsourcing. One of the open research issues is the processing of join queries over encrypted data by the cloud... 

    Integrity Checking of Outsourced Computations with Distributed Data Sources

    , Ph.D. Dissertation Sharif University of Technology Dolatnezhad, Somayeh (Author) ; Amini, Morteza (Supervisor)
    Abstract
    In recent years, one of the research interests is ensuring the integrity of computations done on data received from multiple data sources. Limited research has been done to ensure the integrity of computations that the output depends on data generated by different data sources. However, there are many solutions for systems that the input data is generated by a single data source. In this thesis, ensuring the integrity of multi-source aggregate functions and general functions are investigated in an untrusted server. To verify the integrity of aggregate functions, first of all, we present a construction for verifying the results of linear functions using the RSA signature. It should be noted... 

    Multi-User dynamic searchable symmetric encryption with corrupted participants

    , Article IEEE Transactions on Dependable and Secure Computing ; 2021 ; 15455971 (ISSN) Gharehchamani, J ; Wang, Y ; Papadopoulos, D ; Zhang, M ; Jalili, R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    We study the problem of multi-user dynamic searchable symmetric encryption (DMUSSE) where a data owner stores its encrypted documents on an untrusted remote server and wishes to selectively allow multiple users to access them by issuing keyword search queries. Specifically, we consider the case where some of the users may be corrupted and colluding with the server to extract additional information about the dataset (beyond what they have access to). We provide the first formal security definition for the dynamic setting as well as forward and backward privacy definitions. We then propose SE, the first provably secure DMUSSE scheme and instantiate it in two versions, one based on oblivious... 

    Private set operations over encrypted cloud dataset and applications

    , Article Computer Journal ; Volume 64, Issue 8 , 2021 , Pages 1145-1162 ; 00104620 (ISSN) Rafiee, M ; Khazaei, S ; Sharif University of Technology
    Oxford University Press  2021
    Abstract
    We introduce the notion of private set operations (PSO) as a symmetric-key primitive in the cloud scenario, where a client securely outsources his dataset to a cloud service provider and later privately issues queries in the form of common set operations. We define a syntax and security notion for PSO and propose a general construction that satisfies it. There are two main ingredients to our PSO scheme: an adjustable join (Adjoin) scheme (MIT-CSAIL-TR-2012-006 (2012) Cryptographic treatment of CryptDB's adjustable join. http://people.csail.mit.edu/nickolai/papers/popa-join-tr.pdf) and a tuple set (TSet) scheme (Cash, D., Jarecki, S., Jutla, C. S., Krawczyk, H., Rosu, M.-C., and Steiner, M.... 

    Encryption Aware Query Processing for Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Ghareh Chamani, Javad (Author) ; Jalili, Rasool (Supervisor)
    Abstract
    Data outsourcing provides cost-saving and availability guarantees. However, privacy and confidentiality issues, disappoint owners from outsourcing their data. Although solutions such as CryptDB and SDB tried to provide secure and practical systems, their enforced limitations, made them useless in practice. Inability in search on encrypted data, is one of the most important existing challenges in such systems. Furthermore, the overhead of mechanisms such as FHEs, removes them from considering for any practical system. Indeed, special purpose encryptions would be the only usable mechanisms for such purposes. However, their limited functionality does not support some important required... 

    Design of a Lightweight and Provably Secure Ciphertext-policy Attribute-Based Encryption Algorithm for Cloud Computing

    , M.Sc. Thesis Sharif University of Technology Ghertasi Oskouei, Alireza (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Mohajeri, Javad (Supervisor)
    Abstract
    With the help of cloud computing, easy and fast access to a wide range of computing resources through the network is provided for a wide range of users. Cloud computing, on the other hand, faces security challenges in protecting users' privacy and access control because the cloud service provider is not a trusted entity, so it is possible to access or disclose sensitive data. Various solutions have been proposed to simultaneously meet the above two security requirements. The most well-known solution in this field is "Attribute-Based Encryption".In this dissertation, after reviewing the existing schemes to respond to the obstacles to implementing attribute-based encryption, an attribute-based... 

    Single machine scheduling problem with batch outsourcing

    , Article International Journal of Engineering, Transactions B: Applications ; Volume 35, Issue 5 , 2022 , Pages 1006-1016 ; 1728144X (ISSN) Safarzadeh, H ; Kianfar, F ; Sharif University of Technology
    Materials and Energy Research Center  2022
    Abstract
    Outsourcing as a useful strategy in the industry can be integrated into scheduling problems. Moreover, batch outsourcing is a practical assumption owing to the logistics issues for transferring the parts between the manufacturer and the subcontractors. However, this assumption is rarely addressed in the scheduling literature. In this paper, a novel single machine scheduling problem with the option of batch outsourcing is studied. The objective is to minimize the sum of the total completion time of the jobs and the total outsourcing cost. To solve the problem, first, two mixed-integer linear programming (MILP) models, named MP1 and MP2, are developed, which respectively use a straightforward... 

    Dynamic Searchable Encryption Schemes

    , M.Sc. Thesis Sharif University of Technology Fareghbal Khameneh, Hamid (Author) ; Khazaei, Shahram (Supervisor) ; Rafiee Karkevandi, Mojtaba (Supervisor)
    Abstract
    Dynamic searchable encryption schemes enable keyword search query and update operations on encrypted data. One of their applications is to use them in cloud storage services that allow the client to store, search and update data on an external server. Due to the importance of efficiency in real-world applications, retrieving information in searchable schemes involves leakage of some information such as search and access patterns. However, with the addition of update operations (insertion and deletion), more leakages are considered for these schemes. In this regard, reducing the amount of information disclosed to the server is necessary. For this purpose, forward and backward security... 

    Security enhancement of an auditing scheme for shared cloud data

    , Article International Journal of Internet Protocol Technology ; Volume 15, Issue 1 , 2022 , Pages 60-68 ; 17438209 (ISSN) Rabaninejad, R ; Attari, M. A ; Asaar, M. R ; Aref, M. R ; Sharif University of Technology
    Inderscience Publishers  2022
    Abstract
    In cloud storage services, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data owners without the need to retrieve data from the cloud server. In some applications, the identity of data users should be kept private from the third party auditor. Oruta is a privacy preserving public auditing scheme for shared data in the cloud which exploits ring signatures to protect the identity privacy. In this paper, we propose two attacks and demonstrate that the scheme is insecure and a dishonest server can arbitrarily tamper the outsourced data without being detected by the auditor. We also propose a solution to remedy this weakness with the... 

    Towards more secure constructions of adjustable join schemes

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 19, Issue 2 , 2022 , Pages 1078-1089 ; 15455971 (ISSN) Khazaei, S ; Rafiee, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    An adjustable join (AdjoinAdjoin) scheme [4] is a symmetric-key primitive that enables a user to securely outsource his database to a server, and later to issue join queries for a pair of columns. When queries are extended to a list of columns, the 3Partition3Partition security of Adjoin schemes [8] does not capture the expected security. To address this deficiency, we introduce the syntax and security notion of multi-adjustable join (M-AdjoinM-Adjoin) schemes. We propose a new security notion for this purpose, which we refer to as M3PartitionM3Partition. The 3Partition3Partition security of AdjoinAdjoin extends to the M3PartitionM3Partition security of M-AdjoinM-Adjoin in a straightforward... 

    An Approach for Secure Data Outsourcing

    , Ph.D. Dissertation Sharif University of Technology Hadavi, Mohammad Ali (Author) ; alili, Rasool (Supervisor)
    Abstract
    Data outsourcing is an approach to delegate the burden of data management to external servers. In spite of its clear advantages, data outsourcing requires security assurances including data confidentiality, query result correctness, and access control enforcement. Research proposals have identified solutions with disparate assumptions for different security requirements. It is a real obstacle towards having an integrated solution through the combination of existing approaches. The practicality of data outsourcing to the cloud is seriously affected by this challenge. In this thesis, a unified view based on secret sharing is proposed to simultaneously achieve confidentiality, correctness, and...