Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE150101116
Funder
Australian Research Council
Funding Amount
$315,000.00
Summary
Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques dev ....Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques developed in this project will produce technologies essential for securing data communications in current and future computer networks, and hence directly contribute to improving cybersecurity for all Australians.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
Data Structures for Multi-Core. The project intends to improve data structures to reduce the bottleneck effect caused by multiple processor cores. The hardware used for a typical server platform has increasing numbers of processor cores. This growing number of cores creates a bottleneck effect when accessing the data that are structured in the shared memory of these servers. These contended data structures limit the server performance and new algorithms are necessary. The project proposes to rel ....Data Structures for Multi-Core. The project intends to improve data structures to reduce the bottleneck effect caused by multiple processor cores. The hardware used for a typical server platform has increasing numbers of processor cores. This growing number of cores creates a bottleneck effect when accessing the data that are structured in the shared memory of these servers. These contended data structures limit the server performance and new algorithms are necessary. The project proposes to relax traditional consistency criteria to provide high concurrency and to leverage optimistic executions that proceed concurrently but may roll back depending on the conflicts with other concurrent executions they encounter. The concurrent data structures would allow application performance to scale with higher numbers of hardware cores.Read moreRead less
Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance provid ....Lightweight security solutions for wearable healthcare sensor devices. The aim of this project is to develop new methods to secure the data and context associated with body-wearable health monitoring devices. The novelty of the scheme is in making the methods work on resource-poor devices, by combining new security capabilities derived from the operating environment with conventional cryptographic techniques. This project aims to increase the trust that medical practitioners and insurance providers can place on health data from wearable devices, and showcase Australian innovation in developing world-class security solutions. The outcome of this project is expected to be the development and demonstration of ultra-lightweight algorithms and mechanisms that execute in wearable devices to safeguard the integrity of the data.Read moreRead less
Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlyin ....Visual Analytics for Next Generation Sequencing. Next-generation sequencing technologies have brought a revolution in biology and healthcare, while taxing the ability of scientists and clinicians to identify and process relevant data, to make sense of it all and communicate it to others in a concise and meaningful way. This project aims to tackle this problem through fundamentally new approaches to data selection and visualisation at very large scale, actively encoding for insight into underlying biological and biomedical processes, bringing sustainable discovery of new relationships and variations within the data. The project aims to support new approaches to medical diagnosis and treatment, and offer crucial lessons to address the broader challenge of understanding large, complex data sets.Read moreRead less
Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project wil ....Enhancing information credibility using mathematical prediction. The aim of this project is to develop theory, techniques, mathematical tools and practical algorithms for rumor detection and forecast in social media to enhance credibility of news, especially in time-sensitive situations and trending events. This project will significantly advance human knowledge of rumor formation, detection, and forecast, which will enable timely and efficient counter attacks. The outcomes from this project will offer a reliable information environment for our society.Read moreRead less
Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In partic ....Security and Privacy of Individual Data Used to Extract Public Information. The project aims to contribute to the development of techniques to allow the harvesting of useful information without compromising personal privacy. Intelligent analysis of personal data can reveal valuable knowledge about a population but at a risk of invading an individual's privacy. This project aims to provide at least partial solutions to some of the problems associated with the protection of private data. In particular, it plans to work on the problem of security of statistical databases and privacy of streaming data. This would be underpinned by a study of anonymisation and homomorphic encryption. The expected outcomes are new theoretical results, new algorithms and protocols applicable to at least some of the current significant problems in information security.Read moreRead less
Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data ar ....Visual analytics for massive multivariate networks. Visual analytics for massive multivariate networks. This project aims to create methods to visually analyse massive multivariate networks. The amount of network data available has exploded in recent years: software systems, social networks and biological systems have millions of nodes and billions of edges with multivariate attributes. Their size and complexity makes these data sets hard to exploit. More efficient ways to understand the data are needed. This project will design, implement and evaluate visualisation methods for massive multivariate network data sets. This research is expected to be used by Australian software development, biotechnology and security companies to exploit their data.Read moreRead less