Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies ....Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies which realise efficient MKHEs, together with their cryptographic libraries and practical applications in solving industry problems. This will provide direct economic benefits to Australian industry through the enablement of advanced technologies and low-cost business solutions which are developed in Australia.Read moreRead less
Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The e ....Enabling Anonymity and Privacy for Blockchain Technology in a Quantum World. Blockchain is a promising technology in the digital world today. However, existing approaches for enabling blockchain applications, particularly with privacy protection and anonymity, are vulnerable to quantum computer attacks. This project aims to enable novel cryptographic mechanisms together with their cryptographic libraries for protecting blockchain in the quantum world, hence, post-quantum secure blockchain. The expected outcomes of this project include innovative technologies, as well as secure and practical post-quantum protocols for protecting future blockchain applications. This will provide economic and social benefits to Australian industry through the enablement of advanced technologies which are developed in Australia.Read moreRead less
Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ ....Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ secret keys. The expected outcomes will bridge theory and practice, providing economic benefits to industry by enabling practical mechanisms to store confidential user’s information in the cloud, hence lowering the infrastructure cost for industry.Read moreRead less
Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practi ....Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practical cryptographic solutions that provide protection against malicious senders, in contrast to the existing knowledge that can only cope with malicious receivers. The expected outcomes are innovative technologies, which will lower infrastructure costs and provide cybersecurity for cloud storage.Read moreRead less