期刊文献+
共找到110篇文章
< 1 2 6 >
每页显示 20 50 100
Can whole steps of grain production be outsourced? Empirical analysis based on the three provinces of Jiangsu,Jilin,and Sichuan in China
1
作者 Jiacheng Liu Shengzhi Mao +1 位作者 Qiufen Zheng Zhigang Xu 《Journal of Integrative Agriculture》 SCIE CSCD 2024年第1期336-347,共12页
Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services obs... Certain outsourcing services for agricultural management in China,such as pest control in grain production,have experienced prolonged sluggishness,contrasting with the relatively high level of outsourcing services observed in harvesting,land preparation,and sowing.This study examines the feasibility of implementing whole-step outsourcing in grain production by conducting a case study of rice and maize production in Jiangsu,Jilin,and Sichuan provinces in China.The provision of outsourcing services hinges on two essential conditions:technological advancements fostering specialized production and economies of scale,coupled with a market size sufficient to realize the aforementioned potential economies of scale.The results showed that outsourcing pest control or harvesting services had varying economies of scale.The outsourcing services in pest control were less common than in harvesting services,and their marginal growth space of the economies of scale with technological change was also smaller.Determined by the operational characteristics of pest control itself,the market scale of its professional services is small.Therefore,achieving the whole-step outsourcing of grain production necessitates not only technological innovation but also effective policy interventions to overcome the constraints of market scale.Such interventions include(1)optimizing crop layouts between planning regions and reducing land fragmentation and(2)supplying timely and effective inter-regional agricultural information for service providers aided by information technology. 展开更多
关键词 outsourcing services economy of scale technical conditions market scale
下载PDF
Strategic Contracting for Software Upgrade Outsourcing in Industry 4.0
2
作者 Cheng Wang Zhuowei Zheng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1563-1592,共30页
The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmu... The advent of Industry 4.0 has compelled businesses to adopt digital approaches that combine software toenhance production efficiency. In this rapidly evolving market, software development is an ongoing process thatmust be tailored to meet the dynamic needs of enterprises. However, internal research and development can beprohibitively expensive, driving many enterprises to outsource software development and upgrades to externalservice providers. This paper presents a software upgrade outsourcing model for enterprises and service providersthat accounts for the impact of market fluctuations on software adaptability. To mitigate the risk of adverseselection due to asymmetric information about the service provider’s cost and asymmetric information aboutthe enterprise’s revenues, we propose pay-per-time and revenue-sharing contracts in two distinct informationasymmetry scenarios. These two contracts specify the time and transfer payments for software upgrades. Througha comparative analysis of the optimal solutions under the two contracts and centralized decision-making withfull-information, we examine the characteristics of the solutions under two information asymmetry scenarios andanalyze the incentive effects of the two contracts on the various stakeholders. Overall, our study offers valuableinsights for firms seeking to optimize their outsourcing strategies and maximize their returns on investment insoftware upgrades. 展开更多
关键词 Software upgrade outsourcing the principal-agent information asymmetry reverse selection contract design
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
3
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
下载PDF
Research on the Status Quo and Countermeasures of Human Resource Management Outsourcing in China’s Pharmaceutical Enterprises
4
作者 Wang Jianing Wang Shuling 《Asian Journal of Social Pharmacy》 2024年第1期64-71,共8页
Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current sit... Objective To explore the current situation of human resource management outsourcing in China’s pharmaceutical enterprises,and to put forward some suggestions for enterprises and the government.Methods The current situation of human resource management outsourcing in China’s pharmaceutical enterprises was analyzed through the method of literature research.Results and Conclusion At present,the status of human resource management outsourcing in China’s pharmaceutical companies is that the level of human resource outsourcing companies is not high,and there are no relevant industry norms and laws.The information asymmetry between pharmaceutical enterprises and outsourcing companies results in adverse selection and moral hazard.Besides,the different culture of pharmaceutical enterprises and outsourcing companies leads to inefficient communication between enterprises and employee.To solve these problems,the government should promote and improve industry norms and laws to regulate the market.In addition,enterprises should clarify the motivation for outsourcing and make good decision on the outsourcing content.Meanwhile,enterprises should strengthen communication with employees to eliminate employees’concerns. 展开更多
关键词 pharmaceutical enterprise human resource management outsourcing countermeasure research
下载PDF
Breeding against mycorrhizal symbiosis:Modern cotton (Gossypium hirsutum L.) varieties perform more poorly than older varieties except at very high phosphorus supply levels 被引量:1
5
作者 WANG Xin-xin ZHANG Min +2 位作者 SHENG Jian-dong FENG Gu Thomas W.KUYPER 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2023年第3期701-715,共15页
Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northweste... Cotton (Gossypium hirsutum L.) is an importantfiber cash crop,but its root traits related to phosphorus (P) acquisition,including mycorrhizal root traits,are poorly understood.Eight cotton varieties bred in northwestern China that were released between 1950 and 2013 were grown in pots with or without one arbuscular mycorrhizal fungal (AMF) species(Funneliformis mosseae) at three P supply levels (0,50 and 300 mg P as KH_(2)PO_(4)kg^(-1)).Eleven root traits were measured and calculated after 7 wk of growth.The more recent accessions had smaller root diameters,acquired less P and produced less biomass,indicating an (inadvertent) varietal selection for thinner roots that provided less cortical space for AMF,which then increased the need for a high P fertilizer level.At the two lower P levels,the mycorrhizal plants acquired more P and produced more biomass than non-mycorrhizal plants (3.2 vs.0.9 mg P per plant;1.8 vs.0.9 g biomass per plant at P_(0);14.5 vs.1.7 mg P per plant;and 4.7 vs.1.6 g biomass per plant at P_(50)).At the highest P level,the mycorrhizal plants acquired more P than non-mycorrhizal plants (18.8 vs.13.4 mg per P plant),but there was no difference in biomass (6.2 vs.6.3 g per plant).At the intermediate P level,root diameter was significantly positively correlated with shoot biomass,P concentration and the P content of mycorrhizal plants.The results of our study support the importance of the outsourcing model of P acquisition in the root economics space framework.Inadvertent varietal selection in the last decades,resulting in thinner roots and a lower benefit from AMF,has led to a lower productivity of cotton varieties at moderate P supply (i.e.,when mycorrhizal,the average biomass of older varieties 5.0 g per plant vs.biomass of newer varieties 4.4 g per plant),indicating the need to rethink cotton breeding efforts in order to achieve high yields without very high P input.One feasible way to solve the problem of inadvertent varietal selection for cotton is to be aware of the trade-offs between the root do-it-yourself strategy and the outsourcing towards AMF strategy,and to consider both morphological and mycorrhizal root traits when breeding cotton varieties. 展开更多
关键词 cotton varieties plant breeding arbuscular mycorrhizal fungi root economics space OUTSOURCING phosphorus acquisition
下载PDF
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
6
作者 Atif Ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
7
作者 Atif Ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
Outsourced Privacy-Preserving kNN Classifier Model Based on Multi-Key Homomorphic Encryption
8
作者 Chen Wang Jian Xu +2 位作者 Jiarun Li Yan Dong Nitin Naik 《Intelligent Automation & Soft Computing》 SCIE 2023年第8期1421-1436,共16页
Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new sys... Outsourcing the k-Nearest Neighbor(kNN)classifier to the cloud is useful,yet it will lead to serious privacy leakage due to sensitive outsourced data and models.In this paper,we design,implement and evaluate a new system employing an outsourced privacy-preserving kNN Classifier Model based on Multi-Key Homomorphic Encryption(kNNCM-MKHE).We firstly propose a security protocol based on Multi-key Brakerski-Gentry-Vaikuntanathan(BGV)for collaborative evaluation of the kNN classifier provided by multiple model owners.Analyze the operations of kNN and extract basic operations,such as addition,multiplication,and comparison.It supports the computation of encrypted data with different public keys.At the same time,we further design a new scheme that outsources evaluation works to a third-party evaluator who should not have access to the models and data.In the evaluation process,each model owner encrypts the model and uploads the encrypted models to the evaluator.After receiving encrypted the kNN classifier and the user’s inputs,the evaluator calculated the aggregated results.The evaluator will perform a secure computing protocol to aggregate the number of each class label.Then,it sends the class labels with their associated counts to the user.Each model owner and user encrypt the result together.No information will be disclosed to the evaluator.The experimental results show that our new system can securely allow multiple model owners to delegate the evaluation of kNN classifier. 展开更多
关键词 Outsourced privacy-preserving multi-key HE machine learning KNN
下载PDF
On Incentive and Coordination Mechanism of Service Outsourcing Based on Principal-Agent Theory and Blockchain Technology
9
作者 Chenglong Yan Xiao Wang +1 位作者 Xiaonan Zhang Ruzhi Xu 《Journal of Artificial Intelligence and Technology》 2023年第1期1-9,共9页
To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-... To address the issue of information asymmetry between the two parties and moral hazard among service providers in the process of service outsourcing,this paper builds the Stackelberg game model based on the principal-agent framework,examines the dynamic game situation before the contract being signed,and develops four information models.The analysis reveals a Pareto improvement in the game’s Nash equilibrium when comparing the four models from the standpoint of the supply chain.In the complete information scenario,the service level of the service provider,the customer company’s incentive effectiveness,and the supply chain system’s ultimate profit are all maximized.Furthermore,a coordinating mechanism for disposable profit is built in this study.The paper then suggests a blockchain-based architecture for the service outsourcing process supervision and a distributed incentive mechanism under the coordination mechanism in response to the inadequacy of the principal-agent theory to address the information asymmetry problem and the moral hazard problem.The experiment’s end findings demonstrate that both parties can benefit from the coordination mechanism,and the application of blockchain technology can resolve these issues and effectively encourage service providers. 展开更多
关键词 service outsourcing coordination mechanism distributed incentive mechanism blockchain
下载PDF
通过战略合作管理企业信息技术资源——企业信息系统外包及其ASP模式分析 被引量:9
10
作者 武芳 严丽芳 《管理工程学报》 CSSCI 2002年第2期72-74,共3页
本文在综述企业信息系统外包发展的基础上 ,初步探讨了企业如何建立和管理企业与“承包商”之间的战略联盟问题 ;最后论述了目前流行的电子商务环境下的外包形式—应用服务提供商ASP的相关问题及其在中国的应用实践。
关键词 IT应用服务外包outsourcing 承包商 战略联盟 应用服务提供商ASP
下载PDF
高校档案数字化外包的安全风险研究 被引量:3
11
作者 石剑文 《兰台内外》 2017年第2期16-17,共2页
外包(outsourcing),最早源于工业企业的一种新的经营管理理念、方法。它是企业将本应由企业人员负责的业务包转给专业服务提供商,借助外部专业资源实现对相关业务的高效经营和管理。近年来,随着档案信息化建设的飞速发展,档案数字化... 外包(outsourcing),最早源于工业企业的一种新的经营管理理念、方法。它是企业将本应由企业人员负责的业务包转给专业服务提供商,借助外部专业资源实现对相关业务的高效经营和管理。近年来,随着档案信息化建设的飞速发展,档案数字化技术短板日益显现,越来越多的机构将档案数字化业务外包给专业机构。 展开更多
关键词 档案数字化 大学档案馆 高校扩招 OUTSOURCING 贵州师范大学 档案馆管理 经营管理理念 档案信息 工业企业 陕西科技大学
下载PDF
Incentive mechanism analysis of information security outsourcing based on principal-agent model
12
作者 熊强 仲伟俊 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期113-117,共5页
In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote clien... In order to solve principal-agent problems caused by interest inconformity and information asymmetry during information security outsourcing, it is necessary to design a reasonable incentive mechanism to promote client enterprises to complete outsourcing service actively. The incentive mechanism model of information security outsourcing is designed based on the principal-agent theory. Through analyzing the factors such as enterprise information assets value, invasion probability, information security environment, the agent cost coefficient and agency risk preference degree how to impact on the incentive mechanism, conclusions show that an enterprise information assets value and invasion probability have a positive influence on the fixed fee and the compensation coefficient; while information security environment, the agent cost coefficient and agency risk preference degree have a negative influence on the compensation coefficient. Therefore, the principal enterprises should reasonably design the fixed fee and the compensation coefficient to encourage information security outsourcing agency enterprises to the full extent. 展开更多
关键词 principal agent information security outsourcing incentive mechanism
下载PDF
Facilitating IT outsourcing through improving buyer-vendor interaction in outsourcing life cycle
13
作者 谢刚 梅姝娥 《Journal of Southeast University(English Edition)》 EI CAS 2011年第1期96-100,共5页
For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empiric... For a clear understanding of how to foster necessary attributes of partnerships that promote a closer relationship for achieving outsourcing success,this paper tries to explore the role of interaction.Based on empirical data from a logistics and procurement flat system outsourcing case and earlier research,the industrial network approach and the international marketing and purchasing interaction model are used to analyze the nature of interaction in a three-phased outsourcing life cycle,particularly,characteristics and activities of the transition phase are identified.The findings reveal that developing a relationship between partners requires an industrial network perspective.Improving the key aspects of interaction,information and knowledge sharing,communication and collaborative participation,involved in the important events of three phases would contribute to enhance the relationships performance.The key aspects of interaction should take place among the network actors and not just between buyers and vendors. 展开更多
关键词 information technology(IT) outsourcing outsourcing life cycle INTERACTION
下载PDF
新加坡警察培训课程的外包策略及其启示 被引量:1
14
作者 欧阳国亮 《公安教育》 2016年第3期75-77,共3页
"外包"(Outsourcing)这个词是上世纪伴随着企业管理制度的发展而产生的一个专门术语,具体指企业动态地配置自身和其他企业的功能和服务,并利用外部资源为自身的生产经营提供服务,以此实现资源的优化配置。新加坡政府十分重视"外包... "外包"(Outsourcing)这个词是上世纪伴随着企业管理制度的发展而产生的一个专门术语,具体指企业动态地配置自身和其他企业的功能和服务,并利用外部资源为自身的生产经营提供服务,以此实现资源的优化配置。新加坡政府十分重视"外包"这种管理服务策略,该策略在多个领域得到了推行,其中就包括警察培训。 展开更多
关键词 外包策略 服务策略 企业管理制度 OUTSOURCING 国土面积 企业动态 专门术语 教学工作 资源节约 社会教育机构
下载PDF
对银行服务外包业务的几点思考 被引量:3
15
作者 宋江云 李群 虞凡 《时代金融》 2009年第2X期26-28,共3页
银行服务外包BPO(Business Process Outsourcing),是指商业银行将原本应由其自身负责处理的某些事务或者某些业务活动,委托给本机构以外的第三方进行处理的经营方式。
关键词 服务外包业务 票据影像 经营方式 OUTSOURCING 源讯公司 后台服务 声誉风险 网上银行服务 合规风险 人力资源管理
下载PDF
Can harvest outsourcing services reduce field harvest losses of rice in China? 被引量:4
16
作者 QU Xue Daizo KOJIMA +2 位作者 Yukinaga NISHIHARA WU La-ping Mitsuyoshi ANDO 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2021年第5期1396-1406,共11页
The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and ... The purpose of this study is to quantify the rice harvest losses in China and to evaluate the impacts of machinery and harvest outsourcing services on these losses,given the background of high-speed mechanization and outsourcing services.Data were collected from a national survey conducted in 2016 by the research team in conjunction with the Research Center for the Rural Economy of the Ministry of Agriculture and Rural Affairs of China.A non-parametric method was used to test whether combine harvesting and outsourcing services could significantly reduce harvest losses.Next,quantile regression was used to estimate the real effects of machinery and outsourcing services on harvest losses.The analysis yielded four main study outcomes.First,the harvest loss rate of rice in China was 3.65%.Second,mechanical reaping and winnowing caused greater losses than manual methods,while the opposite was true of field transportation.Third,combine harvesting increased the losses.Fourth,the effects of an outsourcing service on losses differed among the different harvesting methods.Outsourcing services increased losses in segmented harvesting but they reduced losses in combine harvesting. 展开更多
关键词 rice harvest outsourcing service combine harvesting harvest loss RICE
下载PDF
A secure outsourced Turing- equivalent computation scheme against semi-honest workers using fully homomorphic encryption
17
作者 方昊 胡爱群 《Journal of Southeast University(English Edition)》 EI CAS 2016年第3期267-271,共5页
A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private in... A scheme that can realize homomorphic Turing- equivalent privacy-preserving computations is proposed, where the encoding of the Turing machine is independent of its inputs and running time. Several extended private information retrieval protocols based on fully homomorphic encryption are designed, so that the reading and writing of the tape of the Turing machine, as well as the evaluation of the transition function of the Turing machine, can be performed by the permitted Boolean circuits of fully homomorphic encryption schemes. This scheme overwhelms the Turing-machine-to- circuit conversion approach, which also implements the Turing-equivalent computation. The encoding of a Turing- machine-to-circuit conversion approach is dependent on both the input data and the worst-case runtime. The proposed scheme efficiently provides the confidentiality of both program and data of the delegator in the delegator-worker model of outsourced computation against semi-honest workers. 展开更多
关键词 Turing machine fully homomorphic encryption outsourced computation
下载PDF
TPTVer: A Trusted Third Party Based Trusted Verifier for Multi-Layered Outsourced Big Data System in Cloud Environment 被引量:3
18
作者 Jing Zhan Xudong Fan +2 位作者 Lei Cai Yaqi Gao Junxi Zhuang 《China Communications》 SCIE CSCD 2018年第2期122-137,共16页
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system... Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead. 展开更多
关键词 big data security outsourced ser-vice security MapReduce behavior trustedverification trusted third party
下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
19
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
下载PDF
FACOR:Flexible Access Control with Outsourceable Revocation in Mobile Clouds 被引量:2
20
作者 ZHOU Shungan DU Ruiying +3 位作者 CHEN Jing SHEN Jian DENG Hua ZHANG Huanguo 《China Communications》 SCIE CSCD 2016年第4期136-150,共15页
Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile d... Access control is a key mechanism to secure outsourced data in mobile clouds. Some existing solutions are proposed to enforce flexible access control on outsourced data or reduce the computations performed by mobile devices. However, less attention has been paid to the efficiency of revocation when there are mobile devices needed to be revoked. In this paper, we put forward a new solution, referred to as flexible access control with outsourceable revocation(FACOR) for mobile clouds. The FACOR applies the attribute-based encryption to enable flexible access control on outsourced data, and allows mobile users to outsource the time-consuming encryption and decryption computations to proxies, with only requiring attributes authorization to be fully trusted. As an advantageous feature, FACOR provides an outsourceable revocation for mobile users to reduce the complicated attribute-based revocation operations. The security analysis shows that our FACOR scheme achieves data security against collusion attacks and unauthorized accesses from revoked users. Both theoretical and experimental results confirm that our proposed scheme greatly reliefs the mobile devices from heavy encryption and decryption computations, as well as the complicated revocation of access rights in mobile clouds. 展开更多
关键词 mobile cloud computing ABE OUTSOURCING user revocation
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部