Loading...
Search for:
rabaninejad--r
0.088 seconds
Total 7056 records
Security enhancement of an auditing scheme for shared cloud data
, Article International Journal of Internet Protocol Technology ; Volume 15, Issue 1 , 2022 , Pages 60-68 ; 17438209 (ISSN) ; Attari, M. A ; Asaar, M. R ; Aref, M. R ; Sharif University of Technology
Inderscience Publishers
2022
Abstract
In cloud storage services, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data owners without the need to retrieve data from the cloud server. In some applications, the identity of data users should be kept private from the third party auditor. Oruta is a privacy preserving public auditing scheme for shared data in the cloud which exploits ring signatures to protect the identity privacy. In this paper, we propose two attacks and demonstrate that the scheme is insecure and a dishonest server can arbitrarily tamper the outsourced data without being detected by the auditor. We also propose a solution to remedy this weakness with the...
A lightweight auditing service for shared data with secure user revocation in cloud storage
, Article IEEE Transactions on Services Computing ; Volume 15, Issue 1 , 2022 , Pages 1-15 ; 19391374 (ISSN) ; Attari, M. A ; Asaar, M. R ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
As data sharing has become one of the most popular services offered by cloud storage, designing public auditing mechanisms for integrity of shared data becomes more important. Two problems which arise in shared data auditing include preserving users identity and collusion resistant revocation of users. When data stored at the cloud is shared among a group of users, different users may modify and sign different data blocks which leaks signer identities to the public verifier. Also, when a user is revoked from the group, signatures generated by this user should be re-signed by the cloud server using re-signature keys. In addition, collusion of cloud server and the revoked user should leak no...
Comments on a lightweight cloud auditing scheme: Security analysis and improvement
, Article Journal of Network and Computer Applications ; Volume 139 , 2019 , Pages 49-56 ; 10848045 (ISSN) ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Academic Press
2019
Abstract
In a cloud storage service, public auditing mechanisms allow a third party to verify integrity of the outsourced data on behalf of data users without the need to retrieve data from the cloud server. Recently, Shen et al. proposed a new lightweight and privacy preserving cloud data auditing scheme which employs a third party medium to perform time-consuming operations on behalf of users. The authors have claimed that the scheme meets the security requirements of public auditing mechanisms. In this paper, we show that Shen et al.'s scheme is insecure by proposing two attacks on the scheme. In the first attack, an outside adversary can modify some messages in transmission to the cloud server...
An identity-based online/offline secure cloud storage auditing scheme
, Article Cluster Computing ; Volume 23, Issue 2 , 2020 , Pages 1455-1468 ; Rajabzadeh Asaar, M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Springer
2020
Abstract
Cloud storage has significantly reduced data management costs for data owners. However, loss of physical control over the data after outsourcing, triggers some security concerns such as data integrity. Provable Data Possession (PDP) protocols, enable data owners to audit the integrity of their outsourced data without the need to retrieve the file from cloud server. However, most existing PDP schemes require resource-constrained users to perform costly operations for generating metadata on file blocks. In online/offline PDP mechanisms introduced most recently, the user’s computation is divided into online/offline phases, where the costly operations are allowed to be carried out in the offline...
An id-based privacy-preserving integrity verification of shared data over untrusted cloud
, Article 25th International Computer Conference, Computer Society of Iran, CSICC 2020, 1 January 2020 through 2 January 2020 ; 2020 ; Sedaghat, S. M ; Ahmadian Attari, M ; Aref, M. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Data sharing is considered as a favorite service provided by cloud storage servers in which the stored data is shared among a group of users. However, auditing such shared data is a big security issue for cloud users. In this paper, we propose an ID-Based public shared data integrity auditing scheme, in which all the group users are able to update, delete or insert new blocks into the shared data. Besides, the cloud server can revoke a misbehaving user with a minimum overhead. The scheme is secure against an untrusted cloud server and also preserves data privacy against the public verifier. Furthermore, overhead analysis shows the efficiency of proposed scheme in comparison to the existing...
A lightweight identity-based provable data possession supporting users’ identity privacy and traceability
, Article Journal of Information Security and Applications ; Volume 51 , 2020 ; Ahmadian Attari, M ; Rajabzadeh Asaar, M ; Aref, M. R ; Sharif University of Technology
Elsevier Ltd
2020
Abstract
Cloud storage auditing is considered as a significant service used to verify the integrity of data stored in public cloud. However, most existing auditing protocols suffer form complex certificate management/verification since they rely on expensive Public Key Infrastructure (PKI). On the other hand, most cloud users have constrained computational resources. The few existing ID-based storage auditing protocols in the literature, require resource-constrained users to perform costly operations for generating metadata on file blocks. In this paper, we propose a storage auditing protocol which benefits from ID-based structure and lightweight user computations, simultaneously. Our construction...
On the security of YRL, an anonymous broadcast encryption scheme
, Article 8th International Symposium on Telecommunications, IST 2016, 27 September 2016 through 29 September 2016 ; 2017 , Pages 752-755 ; 9781509034345 (ISBN) ; Ameri, M. H ; Delavar, M ; Mohajeri, J ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2017
Abstract
Broadcast encryption is a novel concept for sending a special message to a subset of users. In broadcast encryption schemes, the distribution center broadcasts the message in encrypted form and expect that only the intended users be able to decrypt the message. This concept has several applications such as pay-per-service TVs. In this paper, we investigate one of the most recent broadcast encryption schemes and show that the introduced scheme does not provide the main requirement of broadcast encryption schemes. For this purpose, we demonstrate that all of the users, including authorized and unauthorized users, can decrypt the broadcasted encrypted message. © 2016 IEEE
Network vulnerability analysis through vulnerability take-grant model (VTG)
, Article 7th International Conference on Information and Communications Security, ICICS 2005, Beijing, 10 December 2005 through 13 December 2005 ; Volume 3783 LNCS , 2005 , Pages 256-268 ; 03029743 (ISSN); 3540309349 (ISBN); 9783540309345 (ISBN) ; Sadoddin, R ; Jalili, R ; Zakeri, R ; Omidian, A. R ; Sharif University of Technology
2005
Abstract
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a fact, exploiting most of vulnerabilities result in access rights alteration. In this paper, we propose a new vulnerability analysis method based on the Take-Grant protection model. We extend the initial Take-Grant model to address the notion of vulnerabilities and introduce the vulnerabilities rewriting rules to specify how the protection state of the system can be changed by exploiting vulnerabilities. Our analysis is based on a bounded polynomial algorithm, which generates the closure of the Take-Grant graph...
Sequence dependence of the binding energy in chaperone-driven polymer translocation through a nanopore
, Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 83, Issue 1 , January , 2011 ; 15393755 (ISSN) ; Ejtehadi, M. R ; Metzler, R ; Sharif University of Technology
2011
Abstract
We study the translocation of stiff polymers through a nanopore, driven by the chemical-potential gradient exerted by binding proteins (chaperones) on the trans side of the pore. Bound chaperones prevent backsliding through the pore and, therefore, partially rectify the polymer passage. We show that the sequence of chain monomers with different binding affinity for the chaperones significantly affects the translocation dynamics. In particular, we investigate the effect of the nearest-neighbor adjacency probability of the two monomer types. Depending on the magnitude of the involved binding energies, the translocation speed may either increase or decrease with the adjacency probability. We...
First passage time distribution of chaperone driven polymer translocation through a nanopore: Homopolymer and heteropolymer cases
, Article Journal of Chemical Physics ; Volume 135, Issue 24 , 2011 ; 00219606 (ISSN) ; Metzler, R ; Ejtehadi, M. R ; Sharif University of Technology
2011
Abstract
Combining the advection-diffusion equation approach with Monte Carlo simulations we study chaperone driven polymer translocation of a stiff polymer through a nanopore. We demonstrate that the probability density function of first passage times across the pore depends solely on the Péclet number, a dimensionless parameter comparing drift strength and diffusivity. Moreover it is shown that the characteristic exponent in the power-law dependence of the translocation time on the chain length, a function of the chaperone-polymer binding energy, the chaperone concentration, and the chain length, is also effectively determined by the Péclet number. We investigate the effect of the chaperone size on...
Reply: Abedpour, asgari, and tabar
, Article Physical Review Letters ; Volume 106, Issue 20 , 2011 ; 00319007 (ISSN) ; Asgari, R ; Tabar, M. R. R ; Sharif University of Technology
2011
Irreversibility in response to forces acting on graphene sheets
, Article Physical Review Letters ; Volume 104, Issue 19 , May , 2010 ; 00319007 (ISSN) ; Asgari, R ; Tabar, M. R. R ; Sharif University of Technology
2010
Abstract
The amount of rippling in graphene sheets is related to the interactions with the substrate or with the suspending structure. Here, we report on an irreversibility in the response to forces that act on suspended graphene sheets. This may explain why one always observes a ripple structure on suspended graphene. We show that a compression-relaxation mechanism produces static ripples on graphene sheets and determine a peculiar temperature Tc, such that for T
Analysis of design goals of cryptography algorithms based on different components
, Article Indonesian Journal of Electrical Engineering and Computer Science ; Volume 23, Issue 1 , 2021 , Pages 540-548 ; 25024752 (ISSN) ; Aref, M. R ; Khorshiddoust, R. R ; Sharif University of Technology
Institute of Advanced Engineering and Science
2021
Abstract
Cryptography algorithms are a fundamental part of a cryptographic system that is designed and implemented to increase information security. They are the center of attention of experts in the information technology domains. Although the cryptography algorithms are implemented to attain the goals such as confidentially, integrity, and authenticity of designing, but other matters that must be noticed by designers include speed, resource consumption, reliability, flexibility, usage type, and so on. For the useful allocation of hardware, software, and human resources, it is important to identify the role of each of the factors influencing the design of cryptographic algorithms to invest in the...
Conservation of statistical results under the reduction of pair-contact interactions to solvation interactions
, Article Physical Review E - Statistical, Nonlinear, and Soft Matter Physics ; Volume 72, Issue 6 , 2005 ; 15393755 (ISSN) ; Farzami, R. R ; Ejtehadi, M. R ; Sharif University of Technology
2005
Abstract
We show that the hydrophobicity of sequences is the leading term in Miyazawa-Jernigan interactions. Being the source of additive (solvation) terms in pair-contact interactions, they were used to reduce the energy parameters while resulting in a clear vector manipulation of energy. The reduced (additive) potential performs considerably successful in predicting the statistical properties of arbitrary structures. The evaluated designabilities of the structures by both models are highly correlated. Suggesting geometrically nondegenerate vectors (structures) as proteinlike structures, the additive model is a powerful tool for protein design. Moreover, a crossing point in the log-linear diagram of...
Multifunctional hyperelastic structured surface for tunable and switchable transparency
, Article Applied Sciences (Switzerland) ; Volume 11, Issue 5 , 2021 , Pages 1-11 ; 20763417 (ISSN) ; Goudarzi, T ; Fleury, R ; Naghdabadi, R ; Sharif University of Technology
MDPI AG
2021
Abstract
We leverage the crucial hyperelastic properties of a multifunctional structured surface to optimize the reconfigurability of the electromagnetic transmission under large nonlinear mechanical deformations. This multiphysics, multifunctional, hyperelastic structured surface (HSS) offers two simultaneous intriguing functionalities; tunability and switchability. It is made of copper reso-nators and a Polydimethylsiloxane (PDMS) substrate, which is one of the most favorable deformable substrates due to its hyperelastic behavior. The proposed HSS is fabricated via an original cost-effective technique and the multiphysics functionalities are captured in both experimental tests and numerical...
MaxHiC: A robust background correction model to identify biologically relevant chromatin interactions in Hi-C and capture Hi-C experiments
, Article PLoS Computational Biology ; Volume 18, Issue 6 , 2022 ; 1553734X (ISSN) ; Modegh, R. G ; Rabiee, H. R ; Sarbandi, E. R ; Rezaie, N ; Tam, K. T ; Forrest, A. R. R ; Sharif University of Technology
Public Library of Science
2022
Abstract
Hi-C is a genome-wide chromosome conformation capture technology that detects interactions between pairs of genomic regions and exploits higher order chromatin structures. Conceptually Hi-C data counts interaction frequencies between every position in the genome and every other position. Biologically functional interactions are expected to occur more frequently than transient background and artefactual interactions. To identify biologically relevant interactions, several background models that take biases such as distance, GC content and mappability into account have been proposed. Here we introduce MaxHiC, a background correction tool that deals with these complex biases and robustly...
SER of M-PSK modulation in incremental-selective decode-and-forward cooperative communications over Rayleigh fading channels
, Article International Conference on Advanced Communication Technology, ICACT, 13 February 2011 through 16 February 2011 ; February , 2011 , Pages 432-437 ; 17389445 (ISSN) ; 9788955191554 (ISBN) ; Saadat, R ; Aref, M. R ; Mirjalily, G ; Sharif University of Technology
2011
Abstract
In this paper we consider a cooperative communication systems over Rayleigh fading channels. The system utilizes a combination of incremental and selective decode-and-forward (ISDF) relaying protocols. The symbol error rate (SER) of M-PSK modulation for the ISDF protocol is derived. Using an approximation of the SER expression, the optimal power allocation is investigated. In order to reduce the complexity of the receiver, we used a modified version of the ISDF protocol which does not use the storage or retransmission of the first phase signal. We also derived optimal power allocation coefficient for modified ISDF. It has been noted that for the optimal power allocation in the ISDF protocol,...
Power allocation for incremental-selective decode-and-forward cooperative communications over Rician fading channels
, Article International Conference on Advanced Communication Technology, ICACT, 13 February 2011 through 16 February 2011 ; February , 2011 , Pages 730-734 ; 17389445 (ISSN) ; 9788955191554 (ISBN) ; Saadat, R ; Aref, M. R ; Mirjalily, G ; Sharif University of Technology
2011
Abstract
In this paper we consider a relaying communication system over Rician fading channels. In this system we assume simple Incremental-Selective Decode-and-Forward (ISDF) protocol, which is jointly combining incremental and selective DF relaying protocols. In this protocol, storage or retransmission of the first phase signal are not allowed. We analyze the symbol error rate (SER) performance of the recommended protocol with M-PSK modulation. We evaluate the performance of the protocol in the frequency nonselective slow Rician fading channels. Using the approximation of the SER expression, the optimal power allocation is investigated. Our results show that at least 50% of total power must be used...
Efficient and practical protocol for silylation of hydroxyl groups using reusable lithium perchlorate dispread in silica gel under neutral condition [electronic resource]
, Article Journal of Organometallic Chemistry ; 2006, Volume 691, Issue 5, Pages 817–820 ; Yousefi, R ; Saidi, M. R ; Sharif University of Technology
Abstract
A very efficient and mild procedure for the trimethylsilylation of a wide variety of alcohols, including primary, allylic, benzylic, secondary, hindered secondary, tertiary, and phenols with hexamethyldisilazane on the surface of silica gel dispersed with LiClO4 in room temperature at few minutes in excellent yields under neutral conditions is reported. This procedure also allows the excellent selectivity under LP-SiO2 system for silylation of alcohols in the presence of amine and phenolic hydroxy groups
Modeling, estimation, and model predictive control for Covid-19 pandemic with finite security duration vaccine
, Article 30th International Conference on Electrical Engineering, ICEE 2022, 17 May 2022 through 19 May 2022 ; 2022 , Pages 78-83 ; 9781665480871 (ISBN) ; Baghbadorani, R. R ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Spreading Covid19 has significantly impacted humans' affairs worldwide, either economically or in a sanitary manner. Besides social distance and hospitalization, making and introducing different vaccines help us ameliorate infection and mortality rates. In this research, we use a nonlinear dynamic model for Covid19, with eight states named susceptible, exposed, infected, quarantined, hospitalized, recovered, deceased, and insusceptible populations. Also, we use social distancing, hospitalization, and vaccination rate as three control inputs. This research aims to stop the Covid-19 from spreading worldwide and minimize exposed, infected and deceased populations using model predictive control....