Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving ....Privacy-Preserving Classification for Big-Data Driven Network Traffic. Protecting sensitive information in large network traffic flows while ensuring data usability for classification emerges as a critical problem of increasing significance. Existing techniques do not work on highly heterogeneous traffic from big-data applications for both privacy protection and classification (such as port-based and load- based methods). This project investigates new theories, methods and techniques for solving this problem. It proposes to develop a set of effective methods for privacy-preserving data publication through combining randomisation with anonymisation, and for classifying the published data through uncertainty leveraging by probabilistic reasoning and accuracy lifting by inter-flow correlation analysis and active learning.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Machine learning in adversarial environments. Machine learning underpins the technologies driving the economies of both Silicon Valley and Wall Street, from web search and ad placement, to stock predictions and efforts in fighting cybercrime. This project aims to answer the question: How can machines learn from data when contributors act maliciously for personal gain?
Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become realit ....Post-Quantum Functional Encryption : Principles, Protocols and Practice. Modern cryptography has the power to revolutionise virtually every aspect of our online lives. Large-scale secure data sharing could become a breeze, with tools such as functional encryption (FE) to give us fine control over access rights by means of expressive languages, and there will be no more juggling of crypto keys. Finally, the known foundations of FE will crumble when even small-sized quantum computers become reality, perhaps next decade. This project aims to recreate and expand the power of FE from post-quantum (PQ) mathematical principles, immune to quantum attacks, building on recent discoveries of limited forms of PQ-FE from rock-solid crypto principles. It begs exploring, for the truly spectacular outcomes likely to ensue.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
Taipan: a block-chain with democratic consensus and validated contracts. Blockchains keep records by mass collaboration using peer-to-peer and cryptographical algorithms. Programmable blockchain technology can disrupt the finance industry, governance, and legal services by reducing the role for intermediaries such as banks and government authorities. This project aims to propose a new block-chain for “Trust Among Individual ParticipANts” (TAIPAN). The main feature of TAIPAN’s programmable block ....Taipan: a block-chain with democratic consensus and validated contracts. Blockchains keep records by mass collaboration using peer-to-peer and cryptographical algorithms. Programmable blockchain technology can disrupt the finance industry, governance, and legal services by reducing the role for intermediaries such as banks and government authorities. This project aims to propose a new block-chain for “Trust Among Individual ParticipANts” (TAIPAN). The main feature of TAIPAN’s programmable block-chain is the integrity and security of individual ownership records that current block-chains lack. This project will aim to overcome two major threats in current programmable block-chains, double-spending among participants, and security vulnerabilities in smart contracts. TAIPAN will provide a democratic and leaderless consensus algorithm that will avoid double-spending, and a new bug-checking framework for smart contracts that finds anomalies before smart contracts are admitted to the block-chain.Read moreRead less
Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ ....Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ secret keys. The expected outcomes will bridge theory and practice, providing economic benefits to industry by enabling practical mechanisms to store confidential user’s information in the cloud, hence lowering the infrastructure cost for industry.Read moreRead less