Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobil ....Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobile environments. This should protect the privacy of individuals and increase users’ trust in location-based systems.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE210101497
Funder
Australian Research Council
Funding Amount
$427,455.00
Summary
Structured Codes: Harnessing Interference to Improve Communication Networks. Interference occurs when a device involuntarily receives signals from unintended transmitters. Interference is the biggest challenge in modern large-scale communication networks. In contrast to conventional wisdom that avoids interference, this project aims to harness interference for its advantage. It will view interference as a form of computation that can be exploited advantageously using structured codes. Developing ....Structured Codes: Harnessing Interference to Improve Communication Networks. Interference occurs when a device involuntarily receives signals from unintended transmitters. Interference is the biggest challenge in modern large-scale communication networks. In contrast to conventional wisdom that avoids interference, this project aims to harness interference for its advantage. It will view interference as a form of computation that can be exploited advantageously using structured codes. Developing theory and novel coding techniques, this project expects to deepen our understanding of interference, and significantly increase the network bandwidth efficiency. Expected outcomes will benefit a wide range of applications such as next-generation mobile systems, sensor networks, and cyber-physical systems.Read moreRead less
Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and ....Searching Cohesive Subgraphs in Big Attributed Graph Data. The availability of big attributed graph data brings great opportunities for realizing big values of data. Making sense of such big attributed graph data finds many applications, including health, science, engineering, business, environment, etc. A cohesive subgraph, one of key components that captures the latent properties in a graph, is essential to graph analysis. This project aims to invent effective models of cohesive subgraphs and efficient algorithms for searching and monitoring cohesive subgraphs in big and dynamic attributed graphs from both structure and attribute perspectives. The methods, techniques, and prototype systems developed in this project can be deployed to facilitate the smart use of big graph data across the nation. Read moreRead less
New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility co ....New modulation techniques for future high-mobility wireless communications. Future wireless networks will support huge amounts of mobile data traffic and numbers of terminals. To provide satisfactory service to emerging mass transportation systems such as self-driving cars, high-speed trains, and drones, it will be critical to incorporate the ability for wireless networks to function in high-mobility environments. The project aims to devise novel modulation techniques to support high-mobility communications with superior performance. The theoretical advances will be demonstrated using software-defined radios. These outcomes will provide fundamental scientific basis for deployment of future air interfaces. The project will benefit Australia in gaining a leading position in global telecommunications development.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE190101418
Funder
Australian Research Council
Funding Amount
$398,000.00
Summary
Extremely-high-speed and reliable coding for next generation communications. This project aims to develop fundamental coding theories and innovative coded-modulation techniques for the next generation backbone communication systems. The development of these techniques is expected to lead to dramatic increases of spectrum efficiency, data rate and reliability of communication systems. The techniques will enable extremely high speed and extremely reliable front-haul/back-haul communications, which ....Extremely-high-speed and reliable coding for next generation communications. This project aims to develop fundamental coding theories and innovative coded-modulation techniques for the next generation backbone communication systems. The development of these techniques is expected to lead to dramatic increases of spectrum efficiency, data rate and reliability of communication systems. The techniques will enable extremely high speed and extremely reliable front-haul/back-haul communications, which constitute the major building blocks of critical information and communications technology infrastructures for future digital society. This project is expected to support the sustainable development of the emerging digital society and new data-intensive applications, which are crucial for the long term economic growth for the Australian community.Read moreRead less
Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies ....Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies which realise efficient MKHEs, together with their cryptographic libraries and practical applications in solving industry problems. This will provide direct economic benefits to Australian industry through the enablement of advanced technologies and low-cost business solutions which are developed in Australia.Read moreRead less
Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cache ....Information-theoretic secure communications via caching. This project aims to address the cybersecurity problem of securing telecommunication networks to prevent data leakage. Current widely-adopted data-encryption approaches to secure communications will be broken with large-scale quantum computers, and existing information-theoretic approaches rely on the channel quality of the network. To circumvent these risks, this project proposes a new information security approach using information cached at devices to camouflage data. The project will future-proof secure communication systems against large-scale quantum computers, which threaten current encryption approaches. This should ensure that data transmitted over communication networks can never be revealed to interceptors or hackers, even in public WiFi.Read moreRead less