• Title/Summary/Keyword: Outsourced

Search Result 136, Processing Time 0.029 seconds

An Improved Multi-Keyword Search Protocol to Protect the Privacy of Outsourced Cloud Data (아웃소싱된 클라우드 데이터의 프라이버시를 보호하기 위한 멀티 키워드 검색 프로토콜의 개선)

  • Kim, Tae-Yeon;Cho, Ki-Hwan;Lee, Young-Lok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.429-436
    • /
    • 2017
  • There is a growing tendency to outsource sensitive or important data in cloud computing recently. However, it is very important to protect the privacy of outsourced data. So far, a variety of secure and efficient multi-keyword search schemes have been proposed in cloud computing environment composed of a single data owner and multiple data users. Zhang et. al recently proposed a search protocol based on multi-keyword in cloud computing composed of multiple data owners and data users but their protocol has two problems. One is that the cloud server can illegally infer the relevance between data files by going through the keyword index and user's trapdoor, and the other is that the response for the user's request is delayed because the cloud server has to execute complicated operations as many times as the size of the keyword index. In this paper, we propose an improved multi-keyword based search protocol which protects the privacy of outsourced data under the assumption that the cloud server is completely unreliable. And our experiments show that the proposed protocol is more secure in terms of relevance inference between the data files and has higher efficiency in terms of processing time than Zhang's one.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

Effect of Consulting on Microcredit Repayment in Korea

  • OH, YOONHAE
    • KDI Journal of Economic Policy
    • /
    • v.37 no.3
    • /
    • pp.55-74
    • /
    • 2015
  • This study examines the effect of a one-on-one outsourced pre-lending consulting service on the repayment behavior of microcredit borrowers in Korea with administrative data from the Smile Microcredit Bank. A random change in the cut-off loan amount for mandatory consulting is utilized as an identification strategy. This three-day pre-lending business consulting service is effective in encouraging repayment behavior of existing businesses but it has no significant effect on start-up loans. The effectiveness of the consulting service in deterring delinquency with regard to existing loans is greater among male borrowers than among females.

  • PDF

Outsourcing Business to cloud computing with communication services

  • Chou, Nory;Lee, Minsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.146-147
    • /
    • 2010
  • This paper describes business on cloud computing service and the development of solution in the business Architecture in outsourced services environment for communication. Cloud computing is so popular and make people life easier. Business process outsourcing has become attractive to both large and small businesses with the advent of service oriented and specifically web service technology.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

A Qualitative Study of Offshore Outsourcing by Korean Clothing Companies (국내 의류업체의 해외소싱에 대한 질적 연구)

  • Hong, Kyung-Hee;Kim, Young-Mi;Yang, Jin-Ok;Lee, Ji-Soo;Lee, Yoon-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.4
    • /
    • pp.703-714
    • /
    • 2010
  • This study assumes that Korea's offshore outsourcing is used for diverse purposes such as designing, the supply of raw and subsidiary materials, production, and manufacturing. The purpose for production exists in the beginning stages of development, because it would have grown in scope since the 1990s when offshore outsourcing began in earnest. In this study, in-depth interviews were conducted with 24 firms with an annual production capacity of more than 200,000 pieces among clothing brands for the domestic market, clothing exporters, and promotion agencies. The interviews took place from December 18, 2008 to January 30, 2009. The interviewees were limited to the officers who had the authority to select manufacturers and decide on production volumes. Responses from the in-depth interviews were recorded, transcribed, and analyzed. The study results are summarized as follows: First, Korean clothing companies were found to rely on offshore outsourcing (China, North Korea, Vietnam, and Indonesia). Second, offshore outsourcing focused on the purposes for production; however, even fabrics were often outsourced in the case of production in China. Third, the interviewed firms mentioned cost savings, production cost reduction, and labor cost reduction most frequently as the main reasons for offshore outsourcing. Fourth, customs duties were considered most important in offshore outsourcing. Finally, when deciding on foreign manufacturers for offshore outsourcing, the surveyed clothing companies were found to: select manufacturers after market research in their outsourced countries, maintain existing contracts, or consider design capabilities and price quotations of candidate manufacturers.

Identification on Risk Factors of Outsourcing for Calculating Costs in Defense Industry Using AHP Technique (AHP 기법을 활용한 방위사업 원가산정 아웃소싱 수행간 리스크요인 식별)

  • Kim, Ki-taek;Shim, Sang-Ryul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.857-865
    • /
    • 2016
  • It has been four years after outsouring to private outsourced institute about calculating the costs on defense industry was commenced. Although the objectivity and reliablity has been improved somewhat, there were also a negative view of spending more time and money such as a costing official re-calculates the costs on the results by out-sourced institute. Therefore I want to study on countermeasure about the risks according to the importance by analysing a priority with deriving susceptible risk factors from the outsourced institute's conduct of calculating the costs in defense industry through this study. The purpose of this study contributes to the reduction of defense budget, a guarantee of the reasonable profit for defense suppliers and the improvement the effective strength of an army with a smooth supply procurement by managing the risks in advance about the conduct regarding to the outsourcing for calculating costs on defense materials in the future.

Exploring Control Mechanisms in BPO (Business Process Outsourcing) Arrangement by Korean Conglomerate: Resource Dependency Perspective (재벌기업의 BPO 통제 메커니즘에 관한 탐색적 연구: 자원 의존성 관점에서)

  • Kim, Gyeung-Min;Kim, Hyang-Bin
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.67-82
    • /
    • 2007
  • The myth about BPO is: since firms do not want to continue to control the business process, they outsourced it to the external provider. Therefore, there is no need for controlling the outsourced process. Based on resource dependency theory, this study explores control mechanism used in BPO context. The overall approach of this study is qualitative, inductive and exploratory. First, a generic framework on the control structure is derived from extant literature, which includes outcome/process control, IS and social control. This framework is applied to a Korean BPO case. This study has found that the hybrid control structure consisting of behavior, outcome and social control mechanisms are effective for BPO success. As outsourcing grows rapidly and IS functions become smaller, the business struggles to redefine its IS capability. This research proposes setting up proper control mechanism between user and BPO service provider as new IS capability that business should focus on; and provides guidelines for managers in development of new IS capability.

Efficient Authentication of Aggregation Queries for Outsourced Databases (아웃소싱 데이터베이스에서 집계 질의를 위한 효율적인 인증 기법)

  • Shin, Jongmin;Shim, Kyuseok
    • Journal of KIISE
    • /
    • v.44 no.7
    • /
    • pp.703-709
    • /
    • 2017
  • Outsourcing databases is to offload storage and computationally intensive tasks to the third party server. Therefore, data owners can manage big data, and handle queries from clients, without building a costly infrastructure. However, because of the insecurity of network systems, the third-party server may be untrusted, thus the query results from the server may be tampered with. This problem has motivated significant research efforts on authenticating various queries such as range query, kNN query, function query, etc. Although aggregation queries play a key role in analyzing big data, authenticating aggregation queries has not been extensively studied, and the previous works are not efficient for data with high dimension or a large number of distinct values. In this paper, we propose the AMR-tree that is a data structure, applied to authenticate aggregation queries. We also propose an efficient proof construction method and a verification method with the AMR-tree. Furthermore, we validate the performance of the proposed algorithm by conducting various experiments through changing parameters such as the number of distinct values, the number of records, and the dimension of data.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.