STRATUS

Returning Data Control to Users

Security Technologies Returning Accountability, Trust and User-centric Services in the Cloud

Stratus Header Image

Publications

2018

1) (Best Paper Award) Manoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello,“PANDORA: Preserving Privacy in PRNU-Based Source Camera Attribution” 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (TrustCom), New York, USA, 2018 (ERA CORE Rank A). {Link}

2017

1) (Best Paper Award) Mark A. Will, Jeffery Garae, Y. S. Tan, Craig Scoon, Ryan K L Ko, “Returning Control of Data to Users with a Personal Information Crunch - A Position Paper”, International Conference on Cloud Computing Research and Innovation,, Singapore, 2017. {Link}

2016

1) Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello, "3DCrypt: Privacy-Preserving Pre-Classification Volume Ray-Casting of 3D Images in the Cloud", The 13th International Conference on Security and Cryptography (SECRYPT), Lisbon, Portugal, July 2016. {Link}

2) Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello, "2DCrypt: Privacy- Preserving Image Scaling and Cropping in the Cloud", IEEE Transactions Information Forensics and Security (TIFS) 2016. {Link}

2015

1) Mark A. Will, and Ryan K. L. Ko, “A Guide to Homomorphic Encryption” The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, eds. Ryan K. L. Ko, and Kim-Kwang Raymond Choo, Chapter 5, pp. 101- 127, Syngress, Elsevier, 2015. {Link}

2) (Best Paper Award) Mark Will, Brandon Nicholson, Marc Tiehuis, Ryan K L Ko, "Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents”, International Conference on Cloud Computing Research and Innovation (ICCCRI 2015),, 2015, Singapore. {Link}

3) Xin Li, Chaitanya Joshi, Yu Shyang Tan, and Ryan K. L. Ko, “Inferring User Actions from Provenance Logs” 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015), held in conjunction with 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. doi: 10.1109/Trustcom.2015.442. {Link}

4) Chen, G., Douch, C. Zhang, M. Pang S. (2015) "Reinforcement Learning in Continuous Spaces by using Learing Fuzzy Classifier". ICONIP2015- the 8th International Workshop on Data Mining and Cyber-security,, Vol 2, pp. 320-328. November 9−12, 2015. {Link]

5) Baden Delamore, and Ryan K. L. Ko, “Security as a Service (SaaS) -- An Overview”, Book Chapter in "The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues", eds. Ryan K. L. Ko, and Kim-Kwang Raymond Choo, Chapter 9, pp. 187-203, Syngress, Elsevier, 2015. {Link}

6) Baden Delamore, and Ryan K. L. Ko, “A Global, Empirical Analysis of the Shellshock Vulnerability in Web Applications” 2015 IEEE International Workshop on Trustworthy Software Systems (TrustSoft 2015), held in conjunction with 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. {Link}

7) (CORE Rank A) Sivadon Chaisiri, Ryan K. L. Ko, and Dusit Niyato, “A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance Management” 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. {Link}

8) Ryan K. L. Ko, Giovanni Russello, Richard Nelson, Shaoning Pang, Aloysius Cheang, Gill Dobbie, Abdolhossein Sarrafzadeh, Sivadon Chaisiri, Muhammad Rizwan Asghar, and Geoffrey Holmes, “STRATUS: Towards Returning Data Control to Cloud Users”, 6th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2015), held in conjunction with 15th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2015), Zhangjiajie, China, Springer, November 18-20, 2015. {Link}

9) Ryan K. L. Ko, and Kim-Kwang Raymond Choo, “The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues”, ISBN: 978-0-12-801595-7, Syngress,, an imprint of Elsevier, 225 Wyman Street, Waltham, MA 02451, USA, 2015. {Link}

10) Alan Y.S. Tan, Ryan K. L. Ko, Geoff Holmes, and Bill Rogers, “Provenance for Cloud Data Accountability” The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues, eds. Ryan K. L. Ko, and Kim-Kwang Raymond Choo, Chapter 8, pp.171-185, Syngress, Elsevier, 2015. {Link}

11) Mohammad Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko, “Trusted Tamper-Evident Data Provenance” 2015 IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (RATSP 2015), held in conjunction with 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. {Link}

12) (Best Paper Award) Muhammad Rizwan Asghar, Giovanni Russello, Bruno Crispo, "E-GRANT: Enforcing Encrypted Dynamic Security Constraints in the Cloud", The 3rd International Conference on Future Internet of Things and Cloud (FiCloud) - Special Track on Security, Privacy and Trust, Rome, Italy, August 2015. < a href="https://ieeexplore.ieee.org/document/7300810/">{Link}

13) (CORE Rank A) Mark A. Will, Ryan K. L. Ko, and Ian H. Witten “Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the Cloud” 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), Helsinki, Finland, 20-22 August, 2015. {Link}

14) (Best Paper Award) Mark Will, Brandon Nicholson, Marc Tiehuis, Ryan K L Ko, "Secure Voting in the Cloud using Homomorphic Encryption and Mobile Agents”, International Conference on Cloud Computing Research and Innovation (ICCCRI 2015), 2015, Singapore. {Link}

2014

1) Ryan K. L. Ko., Mark A. Will, "Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking" 7th IEEE International Conference on Cloud Computing (CLOUD’14), Anchorage, Alaska, USA, 27 June – 2 July 2014. {Link]

2) Baden Delamore, Ryan K.L.Ko,“Escrow: A Large-Scale Web Vulnerability Assessment Tool” 6th IEEE International Symposium on Ubi Safe Computing, held in conjunction with the 13th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (IEEE TrustCom-14) Beijing, China, 24-26 September, 2014. {Link}