Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research ....Privacy-preserving cloud data mining-as-a-service. This project aims to explore practical privacy-preserving solutions for cloud data mining-as-a-service based on the Intel Software Guard Extensions (SGX) technology. The research addresses privacy concerns of users when outsourcing data mining needs to the cloud. These concerns have increased as more businesses evaluate data mining-as-an outsourced service due to lack of expertise or computation resources. The expected outcomes from the research will include new data privacy models, new privacy-preserving data mining algorithms, and a prototype of cloud data mining software. These will help businesses cut costs for data mining and privacy protection, and provide significant benefits toward helping Australia achieve its national cyber security strategy and potentially provide economic impact from commercialisation of new software technology for the industry partner.Read moreRead less
Special Research Initiatives - Grant ID: SR0354880
Funder
Australian Research Council
Funding Amount
$10,000.00
Summary
Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national intere ....Building trust in Australia's infrastructure: dealing with scientific, technological, business, policy and legal issues in information security. Australia is faced with the challenge of engendering trust in, and protecting, the information systems vital to the economic and social development of the nation. This initiative will produce a national direction for research, development and educational activities in information security with particular emphasis on the protection of the national interest. It will do so by bringing together for the first time, academic, government and business people from a vast array of backgrounds, and whose interests lie across a spectrum of commercial, legal, policy and research outcomes.Read moreRead less
A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switc ....A new erasure resilient technique for encoding internet packets. Efficient internet communication tolerates losing some packets sent across the web by sending a bit more information than is required. Any holes in the transmission can be repaired using the redundant data. We propose a new transmission protocol that is much simpler to encode and repairs broken messages faster. This new approach, based on sending data plus summed versions of itself, has generic applicability across all packet switched information networks.Read moreRead less
Taming uncertainty: a stochastic-geometric foundation for complex wireless networks. This project will improve our understanding of complex networks such as the internet, wireless communication networks and social networks. We will do this by properly studying the impact of the network geometry. The outcomes will be new approaches to managing complex networks to improve both efficiency and performance.
Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the mod ....Identifying and Tracking Influential Events in Large Social Networks. This project aims to invent a novel model and techniques for identifying and tracking influential events in large and dynamic social networks in real time. The proposed model would take into account the structure and content of social networks, and the influence of events. The project also plans to develop efficient strategies for identifying and tracking events in large and dynamic social network environments based on the model, In particular, the project plans to investigate flexible social network query methods to make users’ event search easy. Finally the project plans to build an evaluation system to demonstrate the efficiency of the algorithms and effectiveness of the model.Read moreRead less
New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a ....New Efficient Cryptographic Tools for Data Privacy and Software Protection. Online services for collaborative communication and software distribution are commonplace today, but their use is hampered by data privacy breaches and intellectual property violations via software reverse engineering. Recent theoretical breakthroughs in cryptography promise to provide new powerful tools for solving these problems, but these tools are not yet suitable for practical use, due to their low efficiency and a lack of solid security foundations. This project aims to apply algebraic and probabilistic techniques to improve efficiency of existing tools, and the understanding of their security. Outcomes are expected to include new insights in cryptographic theory, and new practical tools for cyber security.Read moreRead less
Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows hi ....Closing the Gap: Fundamental Capacity Limits for Interfering Wireless Networks and Practical Methods to Get There. Enhancing communication networks to achieve broadband data rates is now a national priority. Wireless communications is hugely important, with mobile phones, wireless computers, and wireless Internet access to homes, all rapidly growing areas. This project addresses the fundamental bottleneck of interference between links in wireless networks. Wireless unplugs the user and allows him/her to roam, and to set up ad-hoc networks with other users. This research will thus contribute to Australia's increased productivity. Just as importantly, this project addresses fundamental research; it will increase Australia's knowledge base and provide training for students and researchers in how to think about communications problems.Read moreRead less
Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project ad ....Information security and digital watermarking with Latin squares. The importance of digital information is increasing constantly. Audio, video, and still image data dominate our daily lives. Such information has commercial and strategic importance. It is invaluable in crime prevention: for example, video from security cameras. The protection of commercially valuable material against piracy and sensitive information against security breaches is vital to our economy and our safety. This project addresses these issues, by developing new, secure watermarks and fingerprints to protect digital information. Such watermarks can also protect radio communication channels, which is important due to the rising demand for wireless connectivity.Read moreRead less
Practical unified framework for secure e-consent mechanism for health records. This project is driven by modern applications of cryptography and network security and their applications in securing e-health by enabling secure Personal Health Records (PHRs), which will play an important role in the future healthcare industry.
Efficient Algorithms for In-memory Sorting, Searching and Indexing on Modern Multi-core Cache-based and Graphics Processor Architectures. This project clearly belongs to one of the national research priority
goals, Smart Information Use. The copy-based techniques and work on sorting and searching will considerably impact the development of in-memory algorithms in cutting-edge computer architectures. Efficient suffix trees and suffix sorting have myriad applications in string-processing and will ....Efficient Algorithms for In-memory Sorting, Searching and Indexing on Modern Multi-core Cache-based and Graphics Processor Architectures. This project clearly belongs to one of the national research priority
goals, Smart Information Use. The copy-based techniques and work on sorting and searching will considerably impact the development of in-memory algorithms in cutting-edge computer architectures. Efficient suffix trees and suffix sorting have myriad applications in string-processing and will be of high interest to bioinformatics companies. The sortdex project will develop novel algorithms that will be used by enterprise search engine companies to develop applications for libraries and organisations dealing with large databases. Algorithms using the graphics processor as a co-processor have important applications in the high-growth field of computer graphics and games. Read moreRead less