Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate ....Privacy-preserving online user matching. This project aims to develop efficient techniques to preserve the privacy of users of online matching websites used for finding employment, friends and partners. The project expects to generate new knowledge in privacy preserving user matching with multiple servers. The expected outcomes are new techniques that can find matching users without revealing their interests to the matching server and a prototype based on these techniques. This should alleviate the privacy concerns of people using online tools that require providing personal information.Read moreRead less
Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. Thi ....Cloud Security: Techniques for Securing Cloud Data and Services. Fundamental challenges in security and trust arise in cloud data storage and service provision. This project will achieve conceptual advances by proposing new security and trust models to secure cloud data and services. It will develop novel techniques to achieve efficient and secure cloud data management, propose new access control schemes for cloud services and develop new mechanisms for detecting sophisticated cyber threats. This project will also propose a novel integrated trust enhanced cloud security architecture, enabling the design of adaptive secure systems which will be more resilient to dynamic cyber security attacks. It will demonstrate the proposed models and architecture using a practical cloud based online application.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE150101116
Funder
Australian Research Council
Funding Amount
$315,000.00
Summary
Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques dev ....Leakage-Resilient and Quantum-Secure Authenticated Key Exchange Protocols. Authenticated key exchange protocols allow multiple parties to establish a common secret key over a public network, and are a central component of network security. Key-leakage and quantum attacks are two primary threats against the existing protocols. This project aims to fill the gap by developing new authenticated key exchange protocols which are secure against both attacks. The new models, theories, and techniques developed in this project will produce technologies essential for securing data communications in current and future computer networks, and hence directly contribute to improving cybersecurity for all Australians.Read moreRead less
Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Austra ....Smart Personalized Privacy Preserved Information Sharing in Social Networks. This project aims to create a novel and effective method for privacy protection at individual level, which is now a great concern of persons, businesses, and government agencies in this big data age. The project expects to build an automatic smart practical personalized privacy preserving system through removing the fundamental obstacles. The project will significantly advance human knowledge of privacy, and push Australia to the front line of the research field, and protect Australia better. Read moreRead less
Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new metho ....Virtual Environments for Improved Enterprise Software Deployment. This project aims to improve quality assurance for enterprise IT. Enterprise IT systems are highly interconnected and interdependent — a failure in one system can cause a cascade of failures across multiple systems, bringing business to a standstill. The project aims to create new technologies to automate the provisioning of virtual deployment environments to test the enterprise systems. In particular, it aims to develop new methods for the automatic analysis of service interaction traces and the generation of accurate executable service models, without requiring explicit knowledge of them. The automatic analysis and generation should reduce development cost for enterprise IT systems and increase system quality and reliability. The new software deployment technologies from this project aim to significantly reduce the time, effort and cost of system quality assurance activities in software development organisations, and yet produce higher-quality software leading to uninterrupted business operation in end-user organisations across all sectors.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170100641
Funder
Australian Research Council
Funding Amount
$305,754.00
Summary
Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new model ....Priced attribute-based encryption and its applications. This project aims to develop Priced Attribute-Based Encryption (PABE), a security mechanism. Access control is important for secure online information access. Access to encrypted data requires both private key and payment from earmarked funds specified by the access policy of encrypted data. This research will enable both authorisation and restriction of users while they access protected data anonymously. Expected outcomes include new models, theories, techniques and PABE constructions. This research project is expected to contribute to cyber security in anonymous access control with advanced management for all Australians.Read moreRead less
Data Structures for Multi-Core. The project intends to improve data structures to reduce the bottleneck effect caused by multiple processor cores. The hardware used for a typical server platform has increasing numbers of processor cores. This growing number of cores creates a bottleneck effect when accessing the data that are structured in the shared memory of these servers. These contended data structures limit the server performance and new algorithms are necessary. The project proposes to rel ....Data Structures for Multi-Core. The project intends to improve data structures to reduce the bottleneck effect caused by multiple processor cores. The hardware used for a typical server platform has increasing numbers of processor cores. This growing number of cores creates a bottleneck effect when accessing the data that are structured in the shared memory of these servers. These contended data structures limit the server performance and new algorithms are necessary. The project proposes to relax traditional consistency criteria to provide high concurrency and to leverage optimistic executions that proceed concurrently but may roll back depending on the conflicts with other concurrent executions they encounter. The concurrent data structures would allow application performance to scale with higher numbers of hardware cores.Read moreRead less
Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an ....Learning to Pinpoint Emerging Software Vulnerabilities. This project aims to develop learning-based software vulnerability detection techniques to improve the reliability and security of modern software systems. The existing techniques relying on conventional yet rigid software analysis and testing techniques are ineffective and/or inefficient when detecting a wide variety of emerging software vulnerabilities. The outcomes of this project will be a deep-learning-based detection approach and an open-source tool that can capture precision correlations between deep code features and diverse vulnerabilities to pinpoint emerging vulnerabilities without the need for bug specifications. Significant benefits include greatly improved quality, reliability and security for modern software systems.Read moreRead less
The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related soc ....The right to be forgotten: GDPR modelling in cross-domain social networks . The project aims to develop a theoretical model and practical mechanisms to address the critical challenge – ‘right to be forgotten’ - raised from the General Data Protection Regulation (GDPR) with minimal compromising of the utility of the data. To achieve the aim, we will design a ‘right to be forgotten’ framework and associated erasure mechanisms that are effective even information is derived from multiple related social networks. The framework will be created by identifying heterogeneous information, modelling individual behaviour patterns and designing erasure policies. The outcomes of the project can be used by the government to provide privacy guarantees to Australian cyberspace and by industry to protect their clients’ privacy.Read moreRead less
Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy ....Privacy preservation for personalised smart devices. The goal of this project is to build a privacy preservation framework for personalised smart devices with both immediate and long-term applications in a range of industries. The novel theoretical contributions include a privacy-preservation mechanism that guards against attacks by intelligent tools, a model and metrics that distinguish between object detection and object recognition, and allowing users to specify their desired level of privacy guarantee. Practically, these solutions have clear economic and public-safety benefits. The solutions will accelerate AI device development, advance smart technologies based on individual behaviours, and guarantee personal data privacy against both human attackers and adversarial algorithms. Read moreRead less