Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while pres ....Privacy-preserving data processing on the cloud. This project aims to address the current lack of privacy of user data processed by common cloud computing web servers, including email, business data, and confidential files. This project aims to develop new techniques in cryptography. The anticipated outcome is a suite of practical tools enabling common cloud computing processing operations such as search, statistical analysis, and multi-user access control, to be performed efficiently while preserving the data privacy. These tools should provide significant benefits to the privacy of cloud users, as well as financial and reputation benefits to the IT industry, by significantly reducing the likelihood of massive user data privacy breaches in the event of a cyber-hacking attack on the cloud server.Read moreRead less
Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a unive ....Effective software vulnerability detection for web services. This project aims to design and implement new and better methods to find vulnerabilities in software services delivered over the web or through the cloud, as well as methods for proving the absence of certain types of vulnerability. So-called injection attacks are pervasive and generally considered the most important security threat on today's Internet. The programming languages used for software services tend to use strings as a universal data structure, which unfortunately makes it hard to separate trusted code from untrusted user-provided data. This project intends to develop novel program analysis tools and string constraint solvers, and employ these tools to support sophisticated automated reasoning about string manipulating software.Read moreRead less
Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ ....Secure and dynamic access control over encrypted data in the cloud. This project aims to enable dynamic access control due to organisational change, which is critical to enable the adoption of cloud computing in practice. Access control over encrypted outsourced data is an essential requirement for enabling practical, secure storage. This project will be underpinned by a study of constructing new cryptographic primitives for enabling cipher-text changes without the need for refreshing the users’ secret keys. The expected outcomes will bridge theory and practice, providing economic benefits to industry by enabling practical mechanisms to store confidential user’s information in the cloud, hence lowering the infrastructure cost for industry.Read moreRead less
Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practi ....Securing Public Cloud Storage with Protection against Malicious Senders. Public cloud storage offers low-cost solutions for small and medium-sized enterprises. However, cloud data leakage is a major concern. Encrypting data with a security policy before storing in the cloud does not solve the problem due to the presence of malicious senders who deliberately make encrypted data accessible beyond the described policy. This project aims to enable secure public cloud storage by developing new practical cryptographic solutions that provide protection against malicious senders, in contrast to the existing knowledge that can only cope with malicious receivers. The expected outcomes are innovative technologies, which will lower infrastructure costs and provide cybersecurity for cloud storage.Read moreRead less
The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related soc ....The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related social networks. The framework will be created by identifying heterogeneous information, modelling individual behaviour patterns and designing erasure policies. The outcomes of the project can be used by the government to provide privacy guarantees to Australian cyberspace and by industry to protect their clients’ privacy.Read moreRead less
Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools ....Enhancing privacy preserving in dynamic cyberspace. This project aims to develop a novel infrastructure operational monitoring and management strategy to reduce the redundant maintenance actions and achieve a cost-effective approach for civil infrastructure asset management. The project will use multiple social networks as a platform for the project, with the potential for the results to be extended to any dynamic cyberspace. Project outcomes will include a set of new analysis theories and tools to facilitate government, companies, individuals, and organisations to enhance their information gathering and privacy-preserving capabilities. This is expected to enhance the credibility of the government and organisations and save the possible financial loss of companies and individuals.Read moreRead less