Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges ....Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges and expects to establish innovative research and solutions for enabling full lifecycle privacy protection on cloud. The project outcomes will help to safeguard Australian community in fast-growing online cyber world, and benefit to fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative resear ....Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative research and solutions for enabling effective privacy protection in smart metering data on cloud. The project outcomes aims to safeguard Australian home community with pervasive deployment of smart meters and data on cloud, and benefit fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over ti ....Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over time and captured by different sensors and identify correlations between historic security incidents and current data attacks. This project will significantly help to secure data on cloud for organisations in Australia and benefit fast-growing security sensitive data hosting and applications on cloud.Read moreRead less
Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Austra ....Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Australia to the front line of the research field, and protect Australia better. Read moreRead less
Effective and efficient protection of personal privacy in big personal data. Personal privacy protection is becoming increasingly important as personal data is increasingly being hosted in cloud servers, accumulating as big personal data. This project aims to develop innovative solutions for effective and efficient to address the issue of protection of personal privacy. Current approaches are neither effective nor efficient, and lack robustness. The project is expected to enhance theoretical fou ....Effective and efficient protection of personal privacy in big personal data. Personal privacy protection is becoming increasingly important as personal data is increasingly being hosted in cloud servers, accumulating as big personal data. This project aims to develop innovative solutions for effective and efficient to address the issue of protection of personal privacy. Current approaches are neither effective nor efficient, and lack robustness. The project is expected to enhance theoretical foundation of personal privacy protection in big data and cloud, and deliver an effective and efficient personal privacy protection framework with associated algorithms and prototype. These outcomes will help to protect fast-growing privacy sensitive personal data hosting and applications on cloud servers.Read moreRead less
Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This pr ....Secure user authentication with continuous adaptive risk evaluation. Users typically authenticate to any given system only once - when they first access it (for example, through providing a password or fingerprint). The prevalence of single sign-on further allows this single authentication to be sufficient for access to multiple systems. Thus an adversary can obtain a large degree of access from stealing a single password, hijacking a user's session, or even simply borrowing their phone. This project aims to develop a continuous authentication approach based on user behaviour - typical interactions plus biometrics (for example, keystroke dynamics) - combined with a risk adaptive assessment of the resources being accessed, resulting in re-authentication requests in the event of a suspected compromise.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.