Research Directions

Provenance

Provenance

Provenance is the derived history of data and it essentially enables people to know what has happened to their data. With the increasing dependence on Cloud computing services, users are beginning to give up control of their data to trusted third parties such as Cloud service providers. Users of Cloud services are unable to know who has touched their data, the exact number of copies of files containing their information, or whether their data is actually deleted from the Cloud.

CROW is interested in returning this control to users through the study of data provenance in Cloud computing environments from a user-centric perspective.

Hardware Security

Hardware Security

An increasing number of embedded computing devices are used in everyday life, ranging from consumer appliances, vehicles, manufacturing processes and the aerospace industry. Most of the mission-critical processes are handled by these tiny computing devices but when they can be connected to the internet, they create unique challenges for cyber-physical systems. Ultimately, the reliability of the mission-critical processes relies on the overall security of the device.

CROW is interested in these studying cyber-physical systems and working towards the development of a strong and evaluable security architecture for cyber-physical systems.

User Centricity

User Centricity

It is difficult to envision modern life without electronic devices. The continued growth of embedded consumer electronics and large scale computing environments providing personalised services to individuals has changed the notion of both privacy and user-control. User-centricity looks at the problem of control over users’ data and functions and is developing a robust model that will return control over data back to the user.

The basic principle is to provide ‘freedom of choice’ to users, enabling them to decide what to share, easily understand what has happened to their shared information, and how they can manage their digital presence securely.

Security Visualisation

Security Visualisation

The ability of state-of-the-art data visualisation tools to enable users to make considered decisions falls well short of the required standard. Most security visualisation techniques either produce an incomprehensible mesh of lines or simply cannot provide users with the appropriate level of easily-understood detail to enable them to make informed decisions about their data.

CROW is interested in returning control of data to users through the development of visually intuitive and appealing security visualisation techniques.

Security Economics

Security Economics

The economic aspects of security and privacy preservation are crucial to devising effective security policies for individuals, organisations and governments. Understanding the underlying economic dynamics in designing a security system will help system engineers build secure, scalable and usable systems.

CROW is interested in the cultural, societal and psychological factors that influence security economics and how they can be harnessed to build usable security systems.

Tools and Datasets

Tools and Datasets

In this theme, we aim to develop and contribute tools to emerging security challenges. We will do this through two approaches; creating a set of tools, and collecting an authoritative set of data for in-depth research. To formally understand and describe emerging security concepts, we need to be able to conduct algorithmic experiments on data in the areas of data provenance and user-centricity.

To do this requires an authoritative data set for consistency and accuracy. CROW intends for these tools and datasets to contribute to research aimed at returning control of data to users.