Show/Hide University Links

UTSA College of Business

Kim-Kwang Raymond Choo, Ph.D.
Associate Professor
Cloud Technology Endowed Professorship

Department of Information Systems and Cyber Security
Raymond.Choo@utsa.edu

Ph.D. Queensland University of Technology
Graduate Diploma University of Queensland
Master's University of South Australia
Bachelor's University of South Australia

ABout
Kim-Kwang Raymond Choo holds a Ph.D. in information technology from Queensland University of Technology, Australia, and a Graduate Diploma in Business Administration from The University of Queensland, Australia. Prior to starting his Cloud Technology Endowed Professorship at UTSA, Professor Choo spent five years working for the University of South Australia, and five years working for the Australian Government Australian Institute of Criminology.

He was a visiting scholar at INTERPOL Global Complex for Innovation between October 2015 and February 2016, and he was a visiting Fulbright scholar at Rutgers University School of Criminal Justice and Palo Alto Research Center (formerly Xerox PARC) in 2009.

Professor Choo's areas of research include cyber security and digital forensics. He has co-edited three books entitled "Cloud Security Ecosystem" (Syngress: An Imprint of Elsevier, 2015), “Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017) and “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), as well as authoring a book entitled “Secure Key Establishment” published in Springer’s “Advances in Information Security” book series and a book entitled “Cloud Storage Forensics” published by Syngress/Elsevier (Forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories). He has also published seven Australian Government refereed monographs, 30 refereed book chapters, 222 refereed journal articles, 89 refereed conference articles and six parliamentary submissions.

He is the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015. Since 2011, Professor Choo has supervised to completion 13 Ph.D., 13 masters and nine honors (eight 1st Class and one 2nd upper honors) theses.

In 2016, he was named Cybersecurity Educator of the Year – APAC (2016 Cybersecurity Excellence Awards [CEAs are produced in cooperation with the Information Security Community on LinkedIn], and in 2015, he and his team won the Digital Forensics Research Challenge organized by Germany's University of Erlangen-Nuremberg.

Other awards include Best Research Paper Award at the 20th European Symposium on Research in Computer Security (ESORICS 2015), Australia New Zealand Policing Advisory Agency (ANZPAA); National Institute of Forensic Sciences Highly Commended Award; 2010 Australian Capital Territory Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry,”; 2008 Australia Day Achievement Medallion in recognition of his dedication and contribution to the Australian Government Australian Institute of Criminology, and through it to the public service of the nation; and the British Computer Society's Wilkes Award for the best paper published in the 2007 volume of the Computer Journal (Oxford University Press).

In April 2017 he was appointed an Honorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA. He is also a Fellow of the Australian Computer Society and a Senior Member of IEEE.

URL: https://sites.google.com/site/raymondchooau/
Google Scholar: http://scholar.google.com.au/citations?user=rRBNI6AAAAAJ&hl=en

Research Interests

  • Big data (e.g. privacy-preserving, identification of real-world events and big data forensics)
  • Cyber crime
  • Cyber security (including cloud privacy-preserving and cyber physical security)
  • Digital forensics (e.g. cloud forensics and mobile device and app forensics)


Selected Publications
Big Data
Liu Z, Choo K-K R, Zhao M. "Practical-oriented Protocols for Privacy-preserving Outsourced Big Data Analysis: Challenges and Future Research Directions." Computers & Security [In press; 2015 Impact Factor: 1.640 (Quartile 2; Ranks 43/143)]. http://dx.doi.org/10.1016/j.cose.2016.12.006

Xiong L, Choo K-K R, and Vasilakos A V. "Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing." IEEE Transactions on Big Data [In press]. https://doi.org/10.1109/TBDATA.2017.2697448  

Xu Z., Luo X., Liu Y., Choo K-K R, Sugumaran V., Yen N., Mei L. and Hu C. "From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources." IEEE Transactions on Big Data. [In press]. http://dx.doi.org/10.1109/TBDATA.2016.2599935

Xu Z., Xuan J., Liu Y., Choo K-K R, Mei L., and Hu C. "Building Spatial Temporal Relation Graph of Concepts Pair Using Web Repository." Information Systems Frontiers. [In press; 2015 Impact Factor: 1.450 (Quartile 2; Ranks 29/105)]. http://dx.doi.org/10.1007/s10796-016-9676-4

Xu Z, Yen N, Lu Z, Choo K-K R, Mei L and Luo X. "Social Sensors Based Online Attention Computing of Public Safety Events." IEEE Transactions on Emerging Topics in Computing [In press]. https://doi.org/10.1109/TETC.2017.2684819

Zhang S., Xu Z., Choo K-K R, Liu Y., Wei X., Luo X, Mei L. and Hu C. "Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web." IEEE Transactions on Industrial Informatics. [In press; 2015 Impact Factor: 4.108 (Quartile 1; Ranks 3/104)]. https://doi.org/10.1109/TII.2017.2647986

Li W, Xu Z, Li T, Sun G and Choo K-K R. "An Optimized Approach for Massive Web Page Classification Using Entity Similarity Based on Semantic Network." Future Generation Computer Systems [In press; 2016 Google Scholar H-5 Index: 54 (Ranks 3 in Computing Systems); 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2017.03.003

Quick D. and Choo K-K R. "Pervasive Social Networking Forensics: Intelligence and Evidence from Mobile Device Extracts." Journal of Network and Computer Applications. Vol. 86, No. 24-33, 2017 [2015 Impact Factor: 2.331 (Quartile 1; Ranks 5/51)]. http://dx.doi.org/10.1016/j.jnca.2016.11.018

Quick D. and Choo K-K R. "Digital Forensic Intelligence: Data Subsets and Open Source Intelligence (DFINT+OSINT): a Timely and Cohesive Mix." Future Generation Computer Systems. [In press; 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.12.032

Cyber Security
D'Orazio C., Lu R., Choo K-K R and Vasilakos A. V. "A Markov Adversary Model to Detect Vulnerable iOS Devices and Vulnerabilities in iOS Apps." Applied Mathematics and Computation. Vol. 293, pp. 523-544, 2017 [2015 Impact Factor: 1.345 (Quartile 1; Ranks 54/254)]. http://dx.doi.org/10.1016/j.amc.2016.08.051

D'Orazio C. and Choo K-K R. "A Technique to Circumvent SSL/TLS Validations on iOS Devices." Future Generation Computer Systems. [In press; 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.08.019

D'Orazio C. and Choo K-K R. “Circumventing iOS Security Mechanisms for APT Forensic Investigations: A Security Taxonomy for Cloud Apps.” Future Generation Computer Systems. [In press; 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.11.010

D'Orazio C, Choo K-K R and Yang L T. "Data Exfiltration from Internet of Things Devices: iOS Devices as Case Studies." IEEE Internet of Things Journal . Vol. 4, No. 2, 2017, pp. 524-535, [2016 Google Scholar H-5 Index: 18]. http://dx.doi.org/10.1109/JIOT.2016.2569094  

Do Q., Martini B. and Choo K-K R. "A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers." IEEE Transactions on Information Forensics and Security. Vol. 11, No. 10, 2016, pp. 2174-2186, [2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2578285

Fang H, Xu X and Choo K-K R. "Stackelberg Game Based Relay Selection for Physical Layer Security and Energy Efficiency Enhancement in Cognitive Radio Networks." Applied Mathematics and Computation. Vol. 296, 2017, pp. 153-167. http://dx.doi.org/10.1016/j.amc.2016.10.022

He D., Kumar N., Choo K-K R and Wu W. “Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System.” IEEE Transactions on Information Forensics and Security. Vol. 12, No. 2, 2017, pp. 454-464. http://dx.doi.org/10.1109/TIFS.2016.2622682

He D., Kumar N., Wang H., Wang L., Choo K-K R and Vinel A. "A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network." IEEE Transactions on Dependable and Secure Computing. [In press; 2015 Impact Factor: 1.592]. http://dx.doi.org/10.1109/TDSC.2016.2596286

Huang C., Lu R. and Choo K-K R. “Secure and Flexible Cloud-Assisted Association Rule Mining over Horizontally Partitioned Databases.” Journal of Computer and System Sciences. [In Press; 2015 Impact Factor: 1.334]. http://dx.doi.org/10.1016/j.jcss.2016.12.005 

Jiang R., Lu R. and Choo K-K R. "Achieving High Performance and Privacy-preserving Query Over Encrypted Multidimensional Big Metering Data." Future Generation Computer Systems. [In press; 2015 Impact Factor: 2.430 (Quartile 1; Ranks 11/105)]. http://dx.doi.org/10.1016/j.future.2016.05.005

Li B., Lu R., Wang W. and Choo K-K R. “Distributed Host-based Collaborative Detection for False Data Injection Attacks in Smart Grid Cyber-Physical System.” Journal of Parallel and Distributed Computing. [In press; 2015 Impact Factor: 1.320]. http://dx.doi.org/10.1016/j.jpdc.2016.12.012 

Li L., Lu R., Choo K-K R, Datta A., Shao J. "Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases." IEEE Transactions on Information Forensics and Security. Vol. 11, No. 8, 2016, pp. 1847-1861, [2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://doi.org/10.1109/TIFS.2016.2561241

Li B., Lu R., Wang W., Choo K-K R. "DDOA: A Dirichlet-based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System." IEEE Transactions on Information Forensics and Security. Vol. 11, No. 11, 2016, pp. 2415-2425, [2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2576898

Liu X., Choo K-K R, Deng R. H., Weng J. "Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers." IEEE Transactions on Dependable and Secure Computing. [In press; 2015 Impact Factor: 1.592]. http://dx.doi.org/10.1109/TDSC.2016.2536601

Liu X., Deng R. H., Choo K-K R and Weng J. "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys." IEEE Transactions on Information Forensics and Security. Vol. 11, No. 11, 2016, pp. 2401-2414, [2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2573770

Li Y, Yu Y, Min G, Susilo W, Ni J and Choo K-K R. "Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems." IEEE Transactions on Dependable and Secure Computing [In press; 2015 Impact Factor: 1.592]. https://doi.org/10.1109/TDSC.2017.2662216 

Ma M, He D, Kumar N, Choo K-K R, and Chen J. "Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things." IEEE Transactions on Industrial Informatics [In press; 2015 Impact Factor: 4.108 (Quartile 1; Ranks 3/104)].

Pajouh H H, Javidan R, Khaymi R, Dehghantanha A and Choo K-K R. "A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks." IEEE Transactions on Emerging Topics in Computing [In press]. http://dx.doi.org/10.1109/TETC.2016.2633228   

Prokhorenko V., Choo K-K R and Ashman H. "Context-oriented Web Application Protection Model." Applied Mathematics and Computation. Vol. 286, 2016, pp. 59-78, [2015 Impact Factor: 1.345 (Quartile 1; Ranks 54/254)]. http://dx.doi.org/10.1016/j.amc.2016.03.026

Prokhorenko V., Choo K-K R and Ashman H. "Intent-based Extensible Real-time PHP Supervision Framework." IEEE Transactions on Information Forensics and Security. Vol. 11, No. 10, 2016, pp. 1847-1861, [2015 Impact Factor: 2.441 (Quartile 1; Ranks 10/105)]. http://dx.doi.org/10.1109/TIFS.2016.2569063

Digital Forensics
Azfar A, Choo K-K R and Liu L. "Forensic Taxonomy of Android Social Apps." Journal of Forensic Sciences. Vol. 62, No. 2, 2017, pp. 435-456 [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13267

Azfar A, Choo K-K R and Liu L. "Forensic Taxonomy of Android Productivity Apps." Multimedia Tools and Applications.Vol. 76, No. 3, 2017, pp. 3313–3341, [In press; 2016 Google Scholar H-5 Index: 35 (Ranks 4 in Multimedia); 2015 Impact Factor: 1.331 (Quartile 2; Ranks 31/106)]. http://dx.doi.org/10.1007/s11042-016-3718-2

Azfar A, Choo K-K R and Liu L. "An Android Communication App Forensic Taxonomy." Journal of Forensic Sciences. Vol. 61, No. 5, 2016, pp. 1337–1350, [2016 Google Scholar H-5 Index: 32 (Ranks 4 in Forensic Science); 2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13164

Leom M. D., Choo K-K R and Hunt R. "Remote Wiping and Secure Deletion on Mobile Devices: A Review." Journal of Forensic Sciences. Vol. 61, No. 6, 2016, pp. 1473-1492, [2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13203

Eterovic-Soric B., Choo K-K R, Mubarak S., and Ashman H. “Windows 7 Anti-Forensics: A Review and a Novel Approach.” Journal of Forensic Sciences. [In press; 2015 Impact Factor: 1.322].

Tassone C., Martini B. and Choo K-K R. "Visualizing Digital Forensic Datasets: A Proof of Concept." Journal of Forensic Sciences. [In press; 2015 Impact Factor: 1.322] http://dx.doi.org/10.1111/1556-4029.13431 .

Teing YY, Dehghantanha A, Choo K-K R, Abdullah MA, and Muda Z. "Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study." IEEE Transactions on Sustainable Computing [In press]. http://dx.doi.org/10.1109/TSUSC.2017.2687103

Teing YY, Dehghantanha A, Choo K-K R, Dargahi T and Conti M. "Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study." Journal of Forensic Sciences. Vol. 62, No. 3, 2017, pp. 641–654, [2015 Impact Factor: 1.322]. http://dx.doi.org/10.1111/1556-4029.13271








UTSA Homepage | College of Business Homepage | Events | Community | Giving | Directory | Contact Us | Site Map
College of Business — The University of Texas at San Antonio
One UTSA Circle — San Antonio, TX 78249-0631— (210) 458-4313 FAX (210) 458-4308

Please send comments about this site to the College of Business Webmaster
Privacy & Security Policies
UTSA Homepage College of Business Homepage