Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the c ....Algebraic Methods in Design and Analysis of Stream Ciphers. The project investigates the problem of communication security in the mobile environment where both confidentiality and authenticity are of prime concern. Stream ciphers are a very natural choice in mobile environment as they provide an efficient cryptographic protection using a limited computing resources. We model stream cipher as a system of multivariate equations. In this approach, security of stream ciphers can be measured as the complexity of an algorithm that solves the appropriate system of equations. This project leads to new techniques for the design and analysis of stream ciphers.Read moreRead less
Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehens ....Security for Web Services. Web services, an emerging distributed computing paradigm, poses challenging problems in security, due to their dynamic decentralised scalable nature, operating over an untrusted Internet, for which no adequate solutions exist today. This research addresses the model, architecture and design of secure authorisation for web services. It achieves conceptual advances in terms of a flexible authorisation model, proposes a new XML based policy language, develops a comprehensive security policy management framework, designs a distributed authorisation service and demonstrates a practical secure web service system in .NET.It presents a new approach to formally reasoning about conflict resolution policies with dynamic delegation.Read moreRead less
Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements ....Secure Communications for Critical Infrastructure Control Systems. Control systems are crucial to the nation's critical infrastructure. They supervise and command the remote devices used in the energy distribution, water management, telecommunications, and transport industries. Historically, security has not been a concern in the design of control systems communications, which has resulted in their current vulnerable state. This project will establish the communications security requirements of control systems technologies and propose suitable secure communications schemes. New cryptographic protocols and analytic models will be developed to account for the criticality and operational peculiarities of control systems communications. These results are of significant potential value to Australia's critical infrastructure protection.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract Do ....Security Techniques against Denial of Service Attacks in Networked Systems. As more and more business opportunities are created over the Internet, dealing with network-based intrusions and denial of service (DoS) attacks is becoming increasingly critical (as witnessed recently last year). The proposed research addresses systematically the theory and analysis of DoS attacks and develops new techniques and practical solutions to counteract them. We will investigate a hybrid method to counteract DoS, propose a new technique to identify malicious packets in the Internet to handle distributed DoS, consider a new approach using smart packets and develop enhancements to intrusion detection systems using data mining. Proposed techniques are analysed in practical situations.Read moreRead less
Cooperative Mesh Networks for Municipal Wireless Access. Robust mobile broadband data communication is vital for public safety and emergency services applications. This project will improve the performance and cost-effectiveness of mesh networks, enabling new network architectures. Immediate benefits to Australia will be: Contribution to a growing knowledge base and fundamental capabilities wireless broadband communications; Education of future leading academic and industrial innovators; Raising ....Cooperative Mesh Networks for Municipal Wireless Access. Robust mobile broadband data communication is vital for public safety and emergency services applications. This project will improve the performance and cost-effectiveness of mesh networks, enabling new network architectures. Immediate benefits to Australia will be: Contribution to a growing knowledge base and fundamental capabilities wireless broadband communications; Education of future leading academic and industrial innovators; Raising the international profile of Australian research in information technology. The contribution of Information and Communications Technology to the National economy is widely recognized. ICT contributes to wealth creation, employment and exports, underpinning many innovation processes.Read moreRead less
Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computatio ....Investigations Into New Public Key Systems. Public key cryptography is now mainstream technology and an essential tool in electronic business. In order to go beyond the basic security services of confidentiality and authentication, additional features are now desirable, such as verifiability of encryption, distributed key generation, and group-oriented encryption and signatures. At the same time the increasing demand for mobile business requires public key implementations with minimal computational and storage demands. This project will study five recently proposed public key algorithms and assess their suitability for various secure applications. These results are of significant potential value in Australia's electronic commerce market.Read moreRead less
Advanced coding techniques for next generation NAND Flash memories. Advanced coding techniques for next generation NAND Flash memories. This project aims to design low-power consuming coding schemes that can achieve the maximum coding gain for NAND Flash memories in Solid State Drives. Although these devices are replacing hard drives in laptops and provide enormous benefits in access speed and weight, they become unreliable the more they are used. Advanced coding techniques are needed to solve p ....Advanced coding techniques for next generation NAND Flash memories. Advanced coding techniques for next generation NAND Flash memories. This project aims to design low-power consuming coding schemes that can achieve the maximum coding gain for NAND Flash memories in Solid State Drives. Although these devices are replacing hard drives in laptops and provide enormous benefits in access speed and weight, they become unreliable the more they are used. Advanced coding techniques are needed to solve problems caused by the very strict reliability/cost requirements of large storage systems. Allocating memory to coding redundant information can extend these devices’ lifetime. The design of codes and decoders with a low power consumption is expected to be the key enabling technology for next generation large storage devices.Read moreRead less
Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy ....Secure and Dynamic Single Identification Systems. The expected results of the project will be frontier technologies that are essential in applications and services whose acceptance and take-up will be dependent on users' assurance of their privacy. Services, such as medical information or bank information, require a secure identification scheme. Securing such services will encourage new forms of collaboration among a wider range of users with the likely impact of a more productive global economy. This impact will be particularly emphasised in Australia with its geographically disperse population. Securing vital electronic transactions will ultimately contribute to lowering costs and increasing productivity and so creating a more competitive economy.Read moreRead less