The Australian Research Data Commons (ARDC) invites you to participate in a short survey about your
interaction with the ARDC and use of our national research infrastructure and services. The survey will take
approximately 5 minutes and is anonymous. It’s open to anyone who uses our digital research infrastructure
services including Reasearch Link Australia.
We will use the information you provide to improve the national research infrastructure and services we
deliver and to report on user satisfaction to the Australian Government’s National Collaborative Research
Infrastructure Strategy (NCRIS) program.
Please take a few minutes to provide your input. The survey closes COB Friday 29 May 2026.
Complete the 5 min survey now by clicking on the link below.
Dynamic resource provisioning for autonomic management of cloud computing environments. In the next 20 years, service-oriented computing will play an important role in shaping the industry and will require cloud infrastructure hosting applications to deliver services at low cost. This project will develop technologies for self-managed cloud computing platforms that reduce usage and operational costs, thus transforming the Australian economy.
Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for eff ....Data-driven Approach to Resilient Online Service Systems. This project aims to develop a data-driven approach to improving the resilience of online service systems. Many software systems are now provided as online services via the Internet on a 24/7 basis. Although a lot of effort has been devoted to service quality assurance, in reality, online service systems still encounter many incidents and fail to satisfy user requests. This project expects to develop innovative data-driven methods for effective fault identification, fault localization, and failure prediction. Expected outcomes of this project include novel techniques and tools for maintaining online service systems. This project will provide significant benefits, such as improving the resilience and reliability of our cyber infrastructure.Read moreRead less
BigPrivacy: Scaling privacy preservation for big data applications on cloud. This project aims to research scalable privacy preservation for big data applications on cloud. Privacy preservation is a major concern for big data applications on cloud, such as health data analysis where user privacy must be preserved. Scalable solutions can preserve privacy so that data analysis such as health diagnosis can be performed quickly. The expected deliverable is a unified scalable privacy preservation fra ....BigPrivacy: Scaling privacy preservation for big data applications on cloud. This project aims to research scalable privacy preservation for big data applications on cloud. Privacy preservation is a major concern for big data applications on cloud, such as health data analysis where user privacy must be preserved. Scalable solutions can preserve privacy so that data analysis such as health diagnosis can be performed quickly. The expected deliverable is a unified scalable privacy preservation framework with associated algorithms and its prototype, which cloud systems can deploy for big data applications.Read moreRead less
Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges ....Towards full lifecycle privacy protection on cloud. Privacy protection in user data on cloud is now at risk throughout all stages of user information lifecycle facing significant challenges such as stage adaptive protection, across-system protection, privacy invasion tracing and prediction. Current approaches mainly focus on a specific case at certain stage, hence cannot address those challenges properly by considering all stages. This project aims to systematically investigate those challenges and expects to establish innovative research and solutions for enabling full lifecycle privacy protection on cloud. The project outcomes will help to safeguard Australian community in fast-growing online cyber world, and benefit to fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative resear ....Effective privacy protection for smart metering data on cloud. Privacy in smart metering data on cloud is at risk because analysis of such data can reveal user privacy such as daily lifestyle. Current privacy protection approaches lack effectiveness because they omit some privacy leakage cases or cannot be applied to metering data which is collected continuously. This project aims to systematically investigate significant challenges in the effectiveness and expects to establish innovative research and solutions for enabling effective privacy protection in smart metering data on cloud. The project outcomes aims to safeguard Australian home community with pervasive deployment of smart meters and data on cloud, and benefit fast-growing privacy sensitive data hosting and applications on cloud.Read moreRead less
Algorithms and Software Systems for Management of Software-Defined Clouds. This project seeks to develop technologies for more powerful and lower-cost cloud computing. Cloud computing offers utility-oriented information technology services to users worldwide. Based on pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific and business domains. However, applications are unable to harness the full power of the cloud due to partial virtualisation and lack of int ....Algorithms and Software Systems for Management of Software-Defined Clouds. This project seeks to develop technologies for more powerful and lower-cost cloud computing. Cloud computing offers utility-oriented information technology services to users worldwide. Based on pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific and business domains. However, applications are unable to harness the full power of the cloud due to partial virtualisation and lack of integrated management of compute and network resources of data centres. This project aims to transform cloud computing by developing architectural principles for software-defined clouds; algorithms and policies for integrated allocation of compute and network resources to meet quality-of-service requirements of applications; and a novel software technology for energy-efficient management of software-defined clouds.Read moreRead less
Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical ....Provable elimination of information leakage through timing channels. This project aims to develop techniques to solve the issue in information security of unauthorised information flow resulting from competition for shared hardware resources. The project will combine operating systems design, formal hardware models, information-flow reasoning and theorem proving to achieve a goal that is widely considered infeasible. The project is expected to result in a system that prevents leakage of critical information, such as encryption keys, through timing channels. This should prevent sophisticated attacks on public clouds, mobile devices and military-grade cross-domain devices.Read moreRead less
Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detecti ....Detecting Firmware Vulnerabilities in Smart Home Devices. 83% of Australians have smart home devices. 47% claim they have three or more. These devices are easily targeted by cyber-attacks, and searching for their vulnerabilities has become more crucial than ever. Our industry partner GPG is actively looking for ways to detect vulnerabilities in their smart home products, but have not found any existing methods that satisfy three critical requirements: 1) massive search, 2) cross platform detection, and 3) finding unseen vulnerabilities. We therefore propose to use a series of new techniques such as efficient in-memory fuzzing, conditional formulas, and transfer learning to solve the above challenges. The project outcomes will help Australia gain cutting edge techniques in vulnerability detection. Read moreRead less
Resource management algorithms and software systems for green cloud computing. Service-oriented computing will play an important role in shaping society. It needs cloud infrastructure to host applications for delivering services at the lowest cost. This project will create technologies for energy-efficient cloud computing, reducing its operational cost and environmental impact, thus transforming the Australian economy.
Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over ti ....Secure and efficient data leak prevention on cloud. The leak of sensitive data on cloud not only poses serious threats to both public and private organisations but also puts their employees and clients at risk, e.g., economic loss and social impact. The aim of this project is to develop a secure and efficient solution that can detect and prevent leak of data in real-time. Uniquely, the proposed research will develop novel techniques that can monitor data leak security incidents happening over time and captured by different sensors and identify correlations between historic security incidents and current data attacks. This project will significantly help to secure data on cloud for organisations in Australia and benefit fast-growing security sensitive data hosting and applications on cloud.Read moreRead less