Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Engineering

Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman Nov 2015

Longer Than A Telephone Wire - Voice Firewalls To Counter Ubiquitous Lie Detection, Carl Reynolds, Matt Smith, Mark Woodman

The ITB Journal

Mobile computing and communication devices are open to surreptitious privacy attacks using emotion detection techniques; largely utilising work carried out in the area of voice stress analysis (VSA). This paper extends some work in the area of removing emotion cues in the voice, specifically focusing on lie detection and presents the results of a pilot study indicating that the use of mobile phones in situations of stress is common and that awareness of VSA is low. Existing strategies for the removal or modification of emotion cues, based on models of synthesis are considered and weaknesses are identified.


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael Oct 2015

Keynote: Justifying Uberveillance- The Internet Of Things And The Flawed Sustainability Premise, Katina Michael

Professor Katina Michael

Imagine a world where everything was numbered. Not just homes with street addresses, or cars with number plates, or smart phones with telephone numbers, or email addresses with passwords, but absolutely everything you could see and touch and even that which you could not. Well, that world is here, right now. This vast expanse we call “Earth” is currently being quantified and photographed, inch by inch, by satellites, street cameras, drones and high altitude balloons. Longitude and latitude coordinates provide us with the precise degrees, minutes and seconds of the physical space, and unique time stamps tell us where a …


A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos Sep 2015

A Survey Of Security And Privacy Challenges In Cloud Computing: Solutions And Future Directions, Yuhong Liu, Yan Lindsay Sun, Jungwoo Ryoo, Athanasios V. Vasilakos

Computer Science and Engineering

While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.


Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell Sep 2015

Could Biometrics Give Us A World Without Passwords?, Katina Michael, Natasha Mitchell

Professor Katina Michael

What's your strategy for keeping all the passwords in your life both readily available and secure? Do you replace letters with numbers in words you won't forget? Do you cycle through days of the week? Months of the year? Seasons? Pets you once had? What if it was possible to live in a world without passwords? There are many new ways to verify your identity that don't require passwords: wearables, tokens, epidermal electronic, implantables and biometrics. So what might our lives look like without passwords? And is that reality even desirable?


Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael May 2015

Using A Social-Ethical Framework To Evaluate Location-Based Services In An Internet Of Things World, Roba Abbas, Katina Michael, Mg Michael

Associate Professor Katina Michael

The idea for an Internet of Things has matured since its inception as a concept in 1999. People today speak openly of a Web of Things and People, and even more broadly of an Internet of Everything. As our relationships become more and more complex and enmeshed, through the use of advanced technologies, we have pondered on ways to simplify flows of communications, to collect meaningful data, and use them to make timely decisions with respect to optimisation and efficiency. At their core, these flows of communications are pathways to registers of interaction, and tell the intricate story of outputs …


Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du May 2015

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if …


Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani Apr 2015

Privacy In Cooperative Distributed Systems: Modeling And Protection Framework, Afshan Samani

Electronic Thesis and Dissertation Repository

A new form of computation is emerging rapidly with cloud computing, mobile computing, wearable computing and the Internet-of-Things. All can be characterized as a class of “Cooperative Distributed Systems” (CDS) in open environment. A major driver of the growth is the exponential adoption by people and organizations within all aspects of their day-to-day matters. In this context, users’ requirements for privacy protection are becoming essential and complex beyond the traditional approaches. This requires a formal treatment of “privacy” as a fundamental computation concept in CDS paradigm.

The objective is to develop a comprehensive formal model for “privacy” as base …


Recent Advances In Security And Privacy In Big Data, Yong Yu, Yi Mu, Giuseppe Ateniese Jan 2015

Recent Advances In Security And Privacy In Big Data, Yong Yu, Yi Mu, Giuseppe Ateniese

Faculty of Engineering and Information Sciences - Papers: Part A

Big data has become an important topic in science, engineering, medicine, healthcare, finance, business and ultimately society itself. Big data refers to the massive amount of digital information stored or transmitted in computer systems. Approximately, 2.5 quintillion bytes of data are created every day. Almost 90% of data in the world today are created in the last two years alone. Security and privacy issues becomes more critical due to large volumes and variety, due to data hosted in large-scale cloud infrastructures, diversity of data sources and formats, streaming nature of data acquisition and high volume inter-cloud migration. In large-scale cloud …


Privacy-Preserving Encryption Scheme Using Dna Parentage Test, Clementine Gritti, Willy Susilo, Thomas Plantard, Khin Than Win Jan 2015

Privacy-Preserving Encryption Scheme Using Dna Parentage Test, Clementine Gritti, Willy Susilo, Thomas Plantard, Khin Than Win

Faculty of Engineering and Information Sciences - Papers: Part A

Consider the following practical scenario. Amother Alice would like to make her assets accessible only to her descen-dents. In order to do so, she encrypts her secret Swiss bank account with her DNA sequences, and provides this information to her descendents. To simplify the scenario and without losing generality, we assume that Alice has only one son, named Bob. Therefore, Alice provides the ciphertext to her family (this ciphertext can eventually be published), which will later be stored in a secure cloud storage. Later, when Alice is unable to access her assets herself (due to her illness for instance), then …


Server-Aided Verification Signature With Privacy For Mobile Computing, Lingling Xu, Jin Li, Shaohua Tang, Joon Sang Baek Jan 2015

Server-Aided Verification Signature With Privacy For Mobile Computing, Lingling Xu, Jin Li, Shaohua Tang, Joon Sang Baek

Faculty of Engineering and Information Sciences - Papers: Part B

No abstract provided.


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …