Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distribute ....Encrypted, Distributed, and Queryable Data Store: Framework and Realisation. This project aims to design an encrypted, distributed, and queryable data store. Distributed data stores are used for a broad spectrum of applications. While creating unprecedented opportunities, long-standing data security and privacy concerns are yet to be tackled. This project expects to propose a new architecture for encrypted data stores, and devise practical query processing functions over encrypted and distributed data records. The intended outcome should bring users confidence for the secure adoption of cloud data storage services and significantly benefit enterprises that demand guaranteed protection on their proprietary data.Read moreRead less
Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practi ....Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practical cryptographic solutions that provide protection against malicious senders, in contrast to the existing knowledge that can only cope with malicious receivers. The expected outcomes are innovative technologies, which will lower infrastructure costs and provide cybersecurity for cloud storage.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobil ....Privacy-Preserving Location Based Queries. This project aims to develop efficient solutions for mobile users to consume location-based services (LBS) without revealing their locations. The project expects to demonstrate the effectiveness of the solutions using theoretic analysis and practical experiments. The expected outcomes are a multiparty trust model, techniques to distribute user location information among multiple location-based services, and a practical system to protect privacy in mobile environments. This should protect the privacy of individuals and increase users’ trust in location-based systems.Read moreRead less
Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT a ....Privacy-aware Smart Access Control for Internet-of-Things on Blockchain. This project aims to address privacy and trust issues in Internet-of-Things (IoT) access control mechanism of smart critical infrastructure. This project expects to generate new knowledge in the area of IoT access control by leveraging privacy-preserving techniques, blockchain, and machine learning. Expected outcomes of this project include enhanced capability to build improved techniques for privacy aware tamperproof IoT access control with machine learning based anomaly detection. This should provide significant benefits, such as preventing cyber threats on security and privacy of IoT and improving trust in IoT-enabled smart critical infrastructure of Australia.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unifi ....Constraint-based Privacy Preserving BioSignal Data Management on Blockchain. This project aims to address the issue of user privacy in Bio-Signal data analysis by utilizing the capabilities of differential privacy, smart contracts and blockchain technologies. This project expects to generate new knowledge in the area of privacy to develop an advanced privacy-preserving Bio-Signal data analytic framework. The expected outcomes of this project include increased privacy of user data, and the unification of standards on human-specific data analysis, saving time and money spent on privacy breaches. This should provide significant benefits in preserving the quality and integrity of the healthcare services provided by the Australian government and private sector.Read moreRead less
Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes ....Secure Crowdsourcing Classification with Privacy Protection against Servers. This project aims to enable comprehensive quality data classification via secure crowdsourcing. The quality of a data-intensive process, such as a Machine Learning algorithm, depends on the input data quality. By using a crowdsourcing classification, the project expects to overcome the painstaking and costly process of humans correctly annotating extensive input data from diverse real information. The expected outcomes are innovative technologies, guaranteeing accuracy and confidentiality of annotation results whilst protecting the privacy of data classification results. It enhances data-intensive outputs quality, which will benefit large data-intensive applications, such as cybersecurity protections via intrusion detection.Read moreRead less
Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies ....Efficient Multi-key Homomorphic Encryption and Its Applications. Multi-key homomorphic encryption (MKHE) is a key technology that functions to allow multiple users to supply their private input for collaboration in the cloud while keeping the user data confidential. Unfortunately, it is very difficult to obtain efficient MKHEs. This project aims to overcome this challenge by enabling novel efficient MKHEs. The expected outcomes of this project are to develop innovative cryptographic technologies which realise efficient MKHEs, together with their cryptographic libraries and practical applications in solving industry problems. This will provide direct economic benefits to Australian industry through the enablement of advanced technologies and low-cost business solutions which are developed in Australia.Read moreRead less