Browsing by Author "Nepal S"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- ItemCaring for the last 3%: Telehealth potential and broadband implications for remote Australia(CSIRO, 2012-11-20) Dods S; Freyne J; Alem L; Nepal S; Li J; Jang-Jaccard JAustralians living in remote regions of our nation live with far poorer health outcomes than those in our regional and urban areas. The gaps in health service availability and outcomes between people in urban areas and those in remote parts of our country are well known. Telehealth, the provision of health related services at a distance using technology assisted communications, offers a means to narrow this gap by improving the level and diversity of services in remote areas.
- ItemCybersecurity threats in cloud computing(Telecommunications Association Inc., 24/09/2013) Jang-Jaccard J; Nepal S; GUO YJ
- ItemKey management service: Enabling secure sharing and deleting of documents on public clouds(STCC, 30/06/2016) Nepal S; Friedrich C; Wise C; Sinnott RO; Jang-Jaccard J; Chen S; STCCThe primary focus of existing secure cloud storage solutions have been on securing data both in motion and at rest. These storage solutions mostly focus on three essential properties: confidentiality, integrity and availability. However, modern enterprise applications demand data can be shared within or across organizations. The challenge is how to securely share data in public clouds using federated identities without increasing data movement and computation costs. Furthermore, the consumer should be able to delete their data in the cloud in the context of collaboration without leaving any traces behind. This problem has been addressed in recent times by utilizing or developing new data encryption techniques such as identitybased encryption, attribute-based encryption and proxy-re-encryption. However, these techniques suffer from scalability and flexibility problems when dealing with big data and support for dynamic and federated access control. This paper presents a novel architecture and corresponding protocols to provide secure sharing and deletion of documents on public cloud services: CloudDocs. This system uses AES for data encryption to achieve scalability, supports identity-based access control rules using private-public key pairs to provide flexibility, and uses independent key management services to support secure deletion, whereby the data is irrecoverable once the keys are destroyed. The key management service also supports dynamic and federated access control.