Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobil ....Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobile environments. This should protect the privacy of individuals and increase users’ trust in location-based systems.Read moreRead less
Private searching on streaming data. This project aims to explore secure and practical solutions for various internet search types and to develop a prototype of a private searching system to avoid compromising user privacy whilst sharing query requests. Searching of streaming data allows collection of useful information from huge streaming sources of data such as on-line news feeds and internet chat-rooms. Current solutions for this problem are inefficient and restricted to a couple of simple se ....Private searching on streaming data. This project aims to explore secure and practical solutions for various internet search types and to develop a prototype of a private searching system to avoid compromising user privacy whilst sharing query requests. Searching of streaming data allows collection of useful information from huge streaming sources of data such as on-line news feeds and internet chat-rooms. Current solutions for this problem are inefficient and restricted to a couple of simple search types, and vulnerable to identifying the search requester. The project expects to develop private searching tools to protect the privacy of user's search queries. This will have the potential to detect any attacks to our digital infrastructure while keeping the search criteria classified, and could have applications in Australian counter-terrorism and homeland defence.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Intelligent Technologies for Smart Cryptography. This project aims to improve cybersecurity by automating the process of generating cryptographic software for smart devices. The expected outcomes are tools that automatically produce efficient cryptographic software that resists attacks. The main benefit of this project is to reduce the amount of expert labour required when developing secure software.
Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop ....Development of Cryptographic Library and Support System. The protection of the whole cyber space relies on a foundation of cryptography. Cryptographic components of apps authenticate remote parties and secure the communications. However, cryptographic misuse has become a most common issue in development of security component, affecting up to 90% of apps!
This project aims to research, design and develop a crypto library. The innovation of this project lays in three aspects: (1) we will develop a self-contained, reliable, compatible and verifiable crypto library; (2) we will develop security test software automatically to test and verify security of codes; and (3) we will provide intelligent decision support through argumentation to help developers to apply the library efficiently and correctly.Read moreRead less