Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over ti ....Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over time and captured by different sensors and identify correlations between historic security incidents and current data attacks. This project will significantly help to secure data on cloud for organisations in Australia and benefit fast-growing security sensitive data hosting and applications on cloud.Read moreRead less
Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create ....Privacy Protection in Distributed Data Mining. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of the priority challenges recognized by National ICT Australia. However, privacy concerns may prevent it from realization. This project aims to fulfil 'from data to knowledge' without breaching privacy of data from distributed resources held by different parties. The outcomes of this project will create new directions in the research of privacy-preserving distributed data mining and are applicable to Australian counter-terrorism and homeland defence in detecting bio-terrorism from privacy sensitive data.Read moreRead less
Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private da ....Private Data Warehouse Query. Information and Communications Technology (ICT) has dramatically altered the world's social and economic landscape. 'From data to knowledge' is one of priority challenges recognized by National ICT Australia. However, privacy concern may prevent it from realisation. This project aims to fulfil 'from data to knowledge' without breaching privacy of user's queries to a data warehouse. The outcomes of this project will create new directions in the research of private data warehouse query, and are applicable to stock exchange data warehouses and pharmaceutical data warehouses, where the user is reluctant to reveal his query to the data warehouse operator.Read moreRead less
Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communic ....Protect information sharing within distributed collaborative environment. Industries require secure information accessing and communication. This project continues development of new delegation frameworks and information assurance requirements in Internet-based collaborative environments. The frameworks will be systematically upon policy-based models to set up a reliable, secure information sharing and communication medium. We also aim to develop techniques for setting up secure group communication and providing accesses to group members for many database systems. The approach leads to a great understanding of advocating selective information sharing in role-based systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aim ....Limiting disclosure of private information in relational database systems. Enterprises are deeply concerned about customers' privacy issues and try to build solid trust to attract customers. This project continues development of new purpose-based frameworks and private information assurance requirements in relational database systems. The frameworks will identify and address issues of protecting private information; and to specify and enforce privacy rules to support identified issues. It aims to develop techniques for purpose-based usage control and detecting possible conflicts between obligations. The approach leads to a great understanding of advocating limited disclosure in usage control systems. The project develops fundamental enabling methodologies for the information and communication industry.Read moreRead less
Computer-assisted 3D morphometrics for human identification. This project anticipates the rapid adoption by security services of comparative 3-D facial morphometrics for the identification of "persons of interest" and the concomitant creation of large databases of such characteristics. Anatomical knowledge will be used to refine new Japanese software which semi-automatically matches 3D facial landmarks and morphology between suspect and database and to validate its use in Australia. We build on ....Computer-assisted 3D morphometrics for human identification. This project anticipates the rapid adoption by security services of comparative 3-D facial morphometrics for the identification of "persons of interest" and the concomitant creation of large databases of such characteristics. Anatomical knowledge will be used to refine new Japanese software which semi-automatically matches 3D facial landmarks and morphology between suspect and database and to validate its use in Australia. We build on current collaborative research by the applicants in Australia and Japan with funding provided by both governments. Our research has validated comparative facial morphometrics for suspect identification and underpinned the use of facial scanning by police throughout Japan.Read moreRead less
Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data ....Improving provision of a document store as a service in a public cloud. Improving provision of a document store as a service in a public cloud. This project aims to develop a model of document-oriented database correctness and performance that can be applied to cloud-hosted clusters. Many modern web applications rely on document-oriented databases hosted on clusters of virtualised servers from commercial cloud providers. Developers make difficult deployment decisions, such as how to combine data sharding and replication to meet service requirements without any guidance on the degree of precision. This research will allow developers and database administrators to predict how systems will behave in conditions difficult to simulate directly. Ultimately, this is expected to improve the quality and efficiency of services built using document databases.Read moreRead less
A data driven paradigm for service-oriented system engineering. This project aims to design and develop a data driven paradigm for service-oriented system engineering that allows system engineers and domain experts in different domains to build software systems easily in order to enable fast technology transfer within and across domain boundaries. This model integrates and automates a suite of efficient approaches for system structure determination, validation and recommendation based on keyword ....A data driven paradigm for service-oriented system engineering. This project aims to design and develop a data driven paradigm for service-oriented system engineering that allows system engineers and domain experts in different domains to build software systems easily in order to enable fast technology transfer within and across domain boundaries. This model integrates and automates a suite of efficient approaches for system structure determination, validation and recommendation based on keyword search, subgraph isomorphism and substructure query techniques. This project is expected to significantly accelerate the application of new technologies, for example, big data analytics and Internet of Things, in many of Australia's critical domains such as e-Health, smart cities, and cybersecurity.Read moreRead less
Efficient databases for flash memory. This project will bring significant benefits to Australia. It will place Australia at the fore-front of the emerging field of flash memory databases. The lack of prior research in this field, coupled with the significant performance benefits of flash memory, means this project will make significant breakthroughs in this frontier technology. The algorithms developed will be directly incorporated into a state-of-the-art open source database and disseminated ....Efficient databases for flash memory. This project will bring significant benefits to Australia. It will place Australia at the fore-front of the emerging field of flash memory databases. The lack of prior research in this field, coupled with the significant performance benefits of flash memory, means this project will make significant breakthroughs in this frontier technology. The algorithms developed will be directly incorporated into a state-of-the-art open source database and disseminated throughout the international community, thereby boosting Australia's international research reputation. The database developed will significantly increase the speed of large database servers as well as bring significant energy savings to databases running on small portable devices.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less