Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over ti ....Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over time and captured by different sensors and identify correlations between historic security incidents and current data attacks. This project will significantly help to secure data on cloud for organisations in Australia and benefit fast-growing security sensitive data hosting and applications on cloud.Read moreRead less
Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data ....Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data sharding and replication to meet service requirements without any guidance on the degree of precision. This research will allow developers and database administrators to predict how systems will behave in conditions difficult to simulate directly. Ultimately, this is expected to improve the quality and efficiency of services built using document databases.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and econo ....What Can You Trust in the Large and Noisy Web? This project will develop innovative techniques to efficiently and effectively distill truthful information from the inherently unreliable and large-scale Web environment, where misinformation has been widely regarded as a grand challenge for the next decade. The results of this project will not only maintain Australia’s leadership in this frontier research area, but also support many important applications that safeguard Australian people and economy such as emergency and disaster management and online healthcare. This project also serves as an excellent vehicle for the education and training of Australia’s next generation of scholars and engineers.Read moreRead less
Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysi ....Developing an effective defence to cyber-reputation manipulation attacks. This project will develop new technologies for businesses to accurately identify fake internet reviews. Fake reviews, paid for and/or written with malicious intent, can cause irreparable damage to businesses resulting in revenue loss, consumer dissatisfaction or even closure of businesses. However they are difficult to identify, as they continuously evolve to avoid detection and the volume of Internet reviews makes analysis a monumental task. This project will provide advanced tools to detect fake website reviews and a cybersecurity system prototype ready to be used by industry, making Australia a leader in this field and resulting in a safer internet environment for all.Read moreRead less
A Framework for Supporting Consistent and Reliable Collaborative Business Transactions. Business integration and enterprise computing is at the heart of ICT objectives and initiatives global wide. The project aims to be of unique value to Australian industry and provide a means to achieve excellence in the field of research that promises to shape the future of e-business technology. The research conducted within this project will position Australia as one of the leaders in the business transacti ....A Framework for Supporting Consistent and Reliable Collaborative Business Transactions. Business integration and enterprise computing is at the heart of ICT objectives and initiatives global wide. The project aims to be of unique value to Australian industry and provide a means to achieve excellence in the field of research that promises to shape the future of e-business technology. The research conducted within this project will position Australia as one of the leaders in the business transaction area. The project outcomes in the form of specifications and formal models will provide generic solutions that are applicable to many Australian and international companies involved in distributed computing and e-business technologies. Read moreRead less
From Data to Artefact: a Key Ingredient in Service Interoperation. Supporting service interoperation in the e-Business environment is crucial in automating business transactions across organisation boundaries. If no proper mechanism is in place, business delays, failures, and serious disputes can occur. This project will explore new avenues to this long-standing and challenging problem by providing an artefact framework to model and manage business collaboration. Given this project's unique pers ....From Data to Artefact: a Key Ingredient in Service Interoperation. Supporting service interoperation in the e-Business environment is crucial in automating business transactions across organisation boundaries. If no proper mechanism is in place, business delays, failures, and serious disputes can occur. This project will explore new avenues to this long-standing and challenging problem by providing an artefact framework to model and manage business collaboration. Given this project's unique perspective and approaches that are directly applicable to existing enterprise systems, there is a strong potential for its results to lead to a new generation of e-Business design and management, advance the knowledge base of the discipline and yield high returns to the Australian service society and IT industry.Read moreRead less
Computing Order Statistcs over Data Streams. While data stream computation currently is one of the most challenging areas in IT research community, order statistics computation is a very important topic in data stream computation.
This project aims to deliver advanced techniques that promise a great impact on data stream technology. The success of this project will give another competitive edge for Australia to continue her leading role in the development of core IT technology. Moreover,
the ....Computing Order Statistcs over Data Streams. While data stream computation currently is one of the most challenging areas in IT research community, order statistics computation is a very important topic in data stream computation.
This project aims to deliver advanced techniques that promise a great impact on data stream technology. The success of this project will give another competitive edge for Australia to continue her leading role in the development of core IT technology. Moreover,
the research outcome of the project will provide generic solutions to many Australia based
industries, including e-finance, telecommunication, network management, sensor network technology
development, and environment monitoring.
Read moreRead less
Effectively Computing and Maintaining Graph-based Statistics in Large Scale Applications. The expected research outcome includes significantly technical contributions to the graph-based query processing technology development by supporting on-line data analysis. The proposed systematic, algorithm and database centric approach to investigate the novel, ubiquitous problems will lead to a greater support, from the database community, to the advanced real applications, and to creating new opportunit ....Effectively Computing and Maintaining Graph-based Statistics in Large Scale Applications. The expected research outcome includes significantly technical contributions to the graph-based query processing technology development by supporting on-line data analysis. The proposed systematic, algorithm and database centric approach to investigate the novel, ubiquitous problems will lead to a greater support, from the database community, to the advanced real applications, and to creating new opportunities for the IT industry. The success of this project will not only further enhance us as an internationally leading research group in data statistics computation and provide training for high quality personnel in this important and growing area but also bring considerable economic and social benefits to Australia.Read moreRead less
Pattern Discovery of Discriminating Behaviour Associated with Hidden Communities. A sound understanding of discriminating behaviour in hidden communities, e.g. market manipulation, is essential for effective intervention and prevention. This project will deliver novel and workable algorithms and tools for modelling and pattern discovery of such behaviour. This will safeguard Australia by tackling crucial business and social issues like abnormal trading, online crime and terrorism, thereby enhanc ....Pattern Discovery of Discriminating Behaviour Associated with Hidden Communities. A sound understanding of discriminating behaviour in hidden communities, e.g. market manipulation, is essential for effective intervention and prevention. This project will deliver novel and workable algorithms and tools for modelling and pattern discovery of such behaviour. This will safeguard Australia by tackling crucial business and social issues like abnormal trading, online crime and terrorism, thereby enhancing public confidence, compliance and security in both the economy and society, by preventing and reducing economic and social impact. It will create skills and outcomes to further Australia's leadership in managing emerging data mining challenges and applications, and will deepen collaboration with eminent researchers worldwide.Read moreRead less