Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
Special Research Initiatives - Grant ID: SR0567263
Funder
Australian Research Council
Funding Amount
$82,831.00
Summary
Development of Tool Interfaces and Data Standards for Enabling Remote Secondary Analysis of Qualitative Data. This proposal will promote sharing and rapid secondary analysis of natural language and other qualitative data by providing interface standards between qualitative analysis systems, and will enhance the integration of analytic methods through improved archiving. This will be achieved by the construction and dissemination of open standards for the efficient, flexible transport and storage ....Development of Tool Interfaces and Data Standards for Enabling Remote Secondary Analysis of Qualitative Data. This proposal will promote sharing and rapid secondary analysis of natural language and other qualitative data by providing interface standards between qualitative analysis systems, and will enhance the integration of analytic methods through improved archiving. This will be achieved by the construction and dissemination of open standards for the efficient, flexible transport and storage of annotation metadata, along with demonstrated implementations of these standards in qualitative tools. At the current stage of development of e-Social Science, the provision of middleware for collaborative work is more important than large-scale computational capability. The initiative will leverage existing ARC investment in qualitative data archiving.Read moreRead less
Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's inter ....Security Applications of Combinatorial Puzzles. This project provides a basis for improving the implementation and maintenance of key management systems. The application of discrete mathematics to information security will help safeguard Australia, will provide opportunities for Australians to take a leading role in an important area and will develop a research network, bridging both theoretical and practical aspects of mathematics and computer science. The project will enhance Australia's international reputation by establishing collaborations with well-respected international mathematicians and computer scientists. The proposal contains topics suitable for the training of new graduates, allowing them to make high quality original research contributions in a novel and important area. Read moreRead less
Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated ....Design of Secure Electronic Voting Systems. It is inevitable that electronic voting will eventually replace current paper based voting schemes. The main outcome of the research will be the fundamental knowledge required to develop secure electronic voting schemes. The security aspects of the design will be thoroughly analysed to ensure that the integrity of the ballot is maintained without compromising user privacy. The practical aspects of implementing such a system will also be investigated and a prototype implementation provided. The project will combine the expertise in electronic voting schemes at QUT with that of Dr Lee.Read moreRead less
Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of el ....Cryptographic Protocols: Proofs and Designs. Cryptographic protocols are the foundation for protection of the critical electronic communications infrastructure on which much of commerce and industry rely. They will increasingly be required in emerging technologies such as ad-hoc wireless networks and sensor networks. This project will provide the ability to design new and efficient protocols with a mathematical guarantee of security. The resulting practical protocols will benefit all users of electronic communications who require security for their information. This includes the financial industries, government, commerce and domestic users.Read moreRead less
Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will i ....Technical and Legal Models for Virtual Info-Sharing Networks (VISN) for Critical Infrastructure Protection (CIP). This project has substantial national benefit because it will result in the design of a virtual information sharing network (VISN) that will better protect Australia's critical infrastructure. It will provide a comprehensive legal/technical analysis of the requirements/characteristics necessary for the development of a VISN. The development of a secure environment for a VISN will improve industry trust and confidence in participating in the sharing of sensitive information; especially the disclosure of potential vulnerabilities or ascertained potential threats. The project will improve information dissemination speeds and assist post information disclosure controls. Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Internet authentication protocols: theory and practice. Authentication is the foundation for secure electronic communication. It is the first step for many everyday online processes such as remote login or electronic banking. This project aims to make analysis of such protocols more realistic and more complete, allowing online communication to become more secure for both corporate users and individuals.
Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Throu ....Cryptographic Protocols from Pairings: Proofs and Designs. Modern society has become critically dependent on information and communications infrastructures. At the same time, the development of e-commerce is being slowed by lack of confidence in its security. By providing increased assurance and enhanced cryptographic security protocols this research will improve the dependability of the nation's information and communications infrastructure, as well as encourage the growth of e-commerce. Through the expertise and experience gained with this project, Australia's excellence in information security research will be reinforced. The training of PhD and Honours students will provide a much needed source of highly trained information security professionals.Read moreRead less