Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastru ....An active approach to detect and defend against peer-to-peer botnets. The aim of this project is to develop an effective defence system to help organisations detect and defend against the peer-to-peer (P2P) botnets. If this research is accomplished successfully, it will be a big step forward in defeating this new but devastating malicious software widely utilised by Internet criminals and terrorists. The capability of a nation to defend against the P2P botnet attacks on its information infrastructure is central to the control of such attacks and hence to a nation's long-term survival and prosperity. The outcomes of this project can be directly used in Australian research communities and adopted by industry and government agencies.Read moreRead less
Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. ....Decentralised Data Management for Edge Caching Systems in 5G. This project aims to deliver a suite of decentralised data management approaches to facilitate practical edge caching systems in the 5G mobile edge computing (MEC) environment. Edge caching offers great promises for Australia's post-COVID economic recovery and resilience with the ability to enable real-time mobile and IoT software applications in various domains, e.g., telehealth, online learning/working, advanced manufacturing, etc. This project tackles new and urgent challenges in edge data storage, manipulation, maintenance, and protection with optimisation, distributed consensus, graph analytics, and cryptography techniques. The outcomes should build the pillars of edge caching systems and promote Australia's 5G software innovations.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE150101116
Funder
Australian Research Council
Funding Amount
$315,000.00
Summary
Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques dev ....Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques developed in this project will produce technologies essential for securing data communications in current and future computer networks, and hence directly contribute to improving cybersecurity for all Australians.Read moreRead less
Evolutionary multi-objective algorithms for Global Grids. This research investigates alternative software technologies for Grid-based evolutionary multi-objective decision algorithms. By employing the latest adaptive techniques and taking advantage of the low cost Grid infrastructure, new parallel evolutionary systems will be developed that can rapidly supply robust solutions to complex problems. This project will further develop an understanding of scaling issues in parallel evolutionary syste ....Evolutionary multi-objective algorithms for Global Grids. This research investigates alternative software technologies for Grid-based evolutionary multi-objective decision algorithms. By employing the latest adaptive techniques and taking advantage of the low cost Grid infrastructure, new parallel evolutionary systems will be developed that can rapidly supply robust solutions to complex problems. This project will further develop an understanding of scaling issues in parallel evolutionary systems and pave the way for even more widespread application of evolutionary techniques for large scale, data-intensive applications in science and industry.Read moreRead less
Special Research Initiatives - Grant ID: SR0567533
Funder
Australian Research Council
Funding Amount
$120,000.00
Summary
Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can ....Scientific Instruments as ICT Components in Building a GrEMLIN for e-Research. The proposal seeks to initiate the development of a GrEMLIN, a Grid Enabled Multi-Level Instrument Network, for e-Research. Scientific instruments, whether at conventional laboratories or at major facilities, may be regarded as specialised ICT components in a network providing remote access to such instrumentation. Collaborative remote access and data analysis brings efficiency and effectiveness dividends, that can be enhanced through the harnessing of Grid technologies. The collaborative project will leverage middleware, Web Services and e-Science software developments in the US and UK, to provide Grid enabled remote instrument access and data analysis as a powerful e-Research tool.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show h ....Human interaction with context-aware computing systems. Context-aware systems can provide seamless support of IT applications in a variety of technologies and therefore can improve: (i) work performance and adoption of IT in many industries; and (ii) the quality of life through better support for health services, education, and everyday tasks. Currently proposed solutions for context-aware systems fail to deliver systems which are usable for non-IT professionals. The proposed project will show how to design context-aware systems that are usable and whose autonomic decisions can be trusted. Additional benefits include increased scientific competitiveness of Australia, strengthened collaboration with international research institutions, and high quality graduates (PhDs, Masters, Honours).Read moreRead less
Linkage Infrastructure, Equipment And Facilities - Grant ID: LE0347131
Funder
Australian Research Council
Funding Amount
$115,490.00
Summary
Intelligent Computer System to Access Information Directly from the Brain Using High Resolution Electroencephalography and Repetitive Transcranial Magnetic Stimulation. The ambitious aim of this project is to create a novel intelligent computer system which accesss information from the brain. To do this we use repetitive Transcranial Magnetic Stimulation and high resolution Electroencephalography.