Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to ....Novel audio watermarking techniques for tracing multimedia piracy. This project aims to develop inaudible, high-capacity audio watermarking techniques to trace the illegal copying and distribution of multimedia data containing a sound component, such as audios and sound videos. With the rapid growth of communication networks and the use of advanced multimedia technology, digital multimedia data can be easily copied, manipulated and distributed. This has led to strong demand for new techniques to prevent illegal use of copyrighted data. The project is expected to advance the theory of audio watermarking and enhance Australia's international competitiveness in this field.
Read moreRead less
A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy ....A provable privacy-preserving data sharing system for the cloud environment. This project aims to develop an innovative data sharing system, with a mathematically provable privacy guarantee, in a cloud environment. This will be adopted by Australian Education Management Group’s (AEMG) cloud campus to exchange data in a restricted privacy manner between partner institutions. It will be commercialised as a middleware that can be plugged into existing cloud environments to maintain required privacy even when the cloud crosses various jurisdictions with different privacy policies. The outcomes will benefit educational organisations, and lay the foundations for data sharing in other communities such as the government, banks, and other industries in Australia.Read moreRead less
Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in shor ....Privacy-Preserving Fog Info System in Infrastructure-Deficient Environments. Due to Australia’s unique geographical distribution and population density, many regional or remote areas lack infrastructural support and development, including telecommunications and electricity supply. It is important to provide information and communication services in such infrastructure-deficient environments. In this project, we will develop a first-ever commercially ready Fog information system, or FogIS in short, to enable localised information and communication services, while preserving users' privacy, in infrastructure-deficient environments. The deployment of this system will bring great benefits to Australia’s economic growth, the quality of life, cybersecurity, and environment control in rural and regional Australia. Read moreRead less
Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for loca ....Embedding Enterprise Systems in IoT Fog Networks through Microservices. The project will enable automated re-engineering of enterprise systems, to allow them to reused in Internet-of-Things (IoT) applications. It will support efficient ways in which the core business logic of these large scale and monolithic systems can be extended into resource control and data sensing functions managed through the IoT. The project will develop a novel, fine-grained software architecture style suitable for localised IoT execution, through microservices executing autonomously on nodes of IoT fog networks. It will develop new techniques for automated discovery of microservices from enterprise systems and the verification of future-state system execution based on current-state behavioural and other properties such as security.Read moreRead less
Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings a ....Trust-Oriented Social Relation Analysis and Social Relation Aware Rating Analysis in Trust Management. Trust management is an emerging field offering critical challenges on evaluating the quality and trustworthiness of objects, services and raters. Thus it requires the development of novel techniques and solutions to address these challenges both conceptually and practically. This project will develop innovative techniques to infer trust in complex social networks, detect bias in trust ratings and its dependencies with social relations. They can greatly contribute to breakthrough techniques enabling trust-oriented social network analysis and more objective trust management systems that can be transferred to the Australian IT industry to promote the trustworthiness of Web services and reduce monetary loss.Read moreRead less
Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage ....Adaptive Key-value Store for Future Extreme Heterogeneous Systems. Safe, lasting storage of data, and efficient access to it, is vital for all aspects of computing, ranging from e-commerce applications, and data-management in governments. For the storage of data, persistent key-value stores are central in modern computing platforms. However, contemporary key-value stores have not been designed for emerging extreme heterogeneous computational systems with future hardware accelerators and storage capabilities, including graphics processor and flash-based memory. This project will devise an adaptive key-value store framework for heterogeneous systems. Our new framework will adaptively harvest the performance potential of future hardware such that applications can cope with fast-growing data sets.Read moreRead less
Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and la ....Building Peer-to-Peer Middleware Infrastructure with Web Services. Peer-to-Peer (P2P) computing is a framework defining the interactions between systems acting as both clients and servers. Web services technology is an evolving set of Web standards based on eXtensible Markup Language (XML), and is considered as the newest approach to distributed computing. In this project, we aim to build a new type of P2P architectural framework that is truly interoperable and distributed, being platform and language independent in an Internet-wide context. Using Web services and message queuing, this project also aims to develop a robust middleware infrastructure consisting of a set of tools and programming libraries to ease the development of verifiable P2P applications on heterogeneous platforms.Read moreRead less
Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current comme ....Mapping Trusted Systems Technologies to E-security Requirements. A new software based approach, strongly guided by national and international security standards based upon mandatory access control, is required to simplify for management the protection of their information infrastructure. This will be in the form of a security definition toolset aligned to trusted systems technologies currently under consideration internationally. No such trusted system has been developed to address current commercial IT product environments. The safety and security of information systems against attack and illicit usage form an essential component of ?National Information Infrastructure Protection (NIIP)?, a move to better ?e-security?. Existing commercial (untrusted) operating systems lack the critical security bases for e-security making e-applications vulnerable to tampering and bypass which can cause failures in overall system security.Read moreRead less
Formalising and automating the elicitation and reconciliation of requirements from multiple stakeholders. It is well recognised that requirements specifications are often error-prone and that it is much cheaper to detect and fix these errors early in the software development life cycle than later. A major problem with requirements determination is that each and every stakeholder has his/her own representation of the enterprise reality. This project seeks to take these views and use set-theore ....Formalising and automating the elicitation and reconciliation of requirements from multiple stakeholders. It is well recognised that requirements specifications are often error-prone and that it is much cheaper to detect and fix these errors early in the software development life cycle than later. A major problem with requirements determination is that each and every stakeholder has his/her own representation of the enterprise reality. This project seeks to take these views and use set-theoretical techniques from Formal Concept Analysis (FCA) to automatically generate and compare the underlying conceptual models. A process model based on FCA has been proposed which we will extend and empirically evaluate in this project. The result will be a more rigorous and yet pragmatic approach to requirements engineering which offers the greatest economic leverage.Read moreRead less
Next-generation spatial keyword search. Spatial keyword search is like a normal web search plus additional location information, which helps users to obtain a better ranking of results by considering the spatial proximity. The success of this project will deliver a next-generation spatial keyword search system that overcomes the severe usability limitations experienced by users today.