Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organ ....Securing Web-based Services by Policy Coherence and Proof-checking. This project aims to develop a provably correct cybersecurity system for workflows, which enables organizations to provide flexible and more secure web-based services and business communication. The project expects to generate new knowledge, theoretic advancement and result in new technologies in the areas of internet of things and cybersecurity. The expected outcomes include a software tool with documentation, which helps organisations achieve operational excellence and security, and maintain a trusted environment for end users. This system will provide significant economic and commercial benefits to business and end users with highly secured web-services and improved productivity through a coherent framework and proof-checked workflows.Read moreRead less
Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. Th ....Cost-effective Edge Service Provisioning in the Last Mile of 5G. This project aims to deliver a suite of novel approaches for enabling cost-effective last-mile service provisioning in the 5G mobile edge computing (MEC). This project is the world's first attempt to systematically tackle the critical service provisioning challenges in the last mile where base stations link users to MEC applications. It offers a practical solution for provisioning software vendors' MEC services cost-effectively. This project should drive Australia's 5G transition and innovations, promote its post-COVID economic recovery and resilience by enabling various real-time mobile and IoT applications, e.g., telehealth, remote learning/working, industry 4.0, and ensure its pioneering position in the global 5G research.Read moreRead less
Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to ....Efficient and secure data integrity auditing on cloud. Data auditing presents a promising way for verifying user data integrity on cloud, i.e., whether user privacy sensitive data such as identity information on cloud is modified or lost. Current auditing approaches lack sufficient efficiency and security. This results in that they cannot provide timely warning and precaution on potential data loss threats. This project aims to systematically investigate this significant challenge and expects to establish innovative research and solutions for enabling efficient and secure data integrity auditing on cloud. The project outcomes will help to safeguard Australian community in fast-growing cyber world, and benefit to fast-growing user privacy sensitive data hosting and applications on cloud.Read moreRead less
Cross-Correlated Security and Service Quality in Heterogeneous Mobile Communication Networks. Mobile telecommunication infrastructures constitute the vital elements of all developed countries and therefore their reliability and integrity has a profound role in a sustained national economy progress. This project will provide a uniquely practical and long-term solution to the Internet security threat even after introduction of new mobile applications and services. The project will put Australia on ....Cross-Correlated Security and Service Quality in Heterogeneous Mobile Communication Networks. Mobile telecommunication infrastructures constitute the vital elements of all developed countries and therefore their reliability and integrity has a profound role in a sustained national economy progress. This project will provide a uniquely practical and long-term solution to the Internet security threat even after introduction of new mobile applications and services. The project will put Australia on the frontbench of the extensive research activities worldwide in the field of mobile network security and quality of service. This project will protect the nation's most valuable data infrastructure from service interruption as a result of a sudden data traffic load increase.Read moreRead less
Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider a ....Preventing sensitive data exfiltration from insiders . Confidential data such as military secrets or intellectual property must never be disclosed outside the organisation; formally protecting data exfiltration from insider attacks is a major challenge. This project aims to develop a pattern matching based systematic methodology for data exfiltration in database systems. We will devise highly accurate detection tools and secure provenance techniques that can effectively protect against insider attacks. The outcomes of the project will incorporate new security constraints and policies raised by emerging technologies to enable better protection of sensitive information. Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic groupin ....Privacy preserving and data utility in outsourced systems. Making the best tradeoff between data privacy and utility is a vital challenge in privacy-preserving outsourcing environments. This project aims to develop a balanced distributed framework to achieve the best utility of outsourced data while protecting private information. The framework consists of general structure of distributed evolutionary algorithms and a predefined topology for high optimization efficiency and a dynamic grouping recombination model. The project outcomes will be beneficial to applications in the nation as it incorporates new privacy constraints and utility requirements raised by emerging technologies to enable better protection of sensitive information and maximal data utility in outsourced systems. Read moreRead less
MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) ne ....MemberGuard: Protecting Machine Learning Privacy from Membership Inference. Machine Learning has become a core part of many real-world applications. However, machine learning models are vulnerable to membership inference attacks. In these attacks, an adversary can infer if a given data record has been part of the model's training data. In this project, the team aims to develop new techniques that can be used to counter these attacks, such as 1) new analytical models for membership leakage, 2) new methods for susceptibility diagnosis, 3) new defences that leverage privacy and utility. Data-oriented services are estimated to be valuable assets in the future. These techniques can help Australia gain cutting edge advantage in machine learning security and privacy and protect its intellectual property on these services.Read moreRead less
DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting th ....DeepHoney: Automatic Honey Data Generation for Active Cyber Defence . This project aims to enhance the security of networks and information systems by empowering them with intelligent deception techniques to achieve proactive attack detection and defence. In recent times, the fictitious environment – honeypot designed by human experience becomes popular to attract attackers and capture their interactions. However, rules-based construction of honeypots fails in preserving the privacy, boosting the attractiveness and evolving the system. The project expects to advance deep learning and yield novel DeepHoney technologies with associated publications and open-source software. This should benefit science, society, and the economy by building the next generation of active cyber defence systems. Read moreRead less