Kim-Kwang Raymond Choo, Ph.D.

Associate Professor & Cloud Technology Endowed Professorship
Ph.D. Advisor

Degrees

  • Ph.D. Queensland University of Technology
  • Graduate Diploma University of Queensland
  • Master’s University of South Australia
  • Bachelor’s University of South Australia

About

Personal Faculty Website

Kim-Kwang Raymond Choo holds a Ph.D. in information technology from Queensland University of Technology, Australia, and a Graduate Diploma in Business Administration from The University of Queensland, Australia. Prior to starting his Cloud Technology Endowed Professorship at UTSA, Professor Choo spent five years working for the University of South Australia, and five years working for the Australian Government Australian Institute of Criminology.

He was a visiting scholar at INTERPOL Global Complex for Innovation between October 2015 and February 2016 and a visiting Fulbright scholar at Rutgers University School of Criminal Justice and Palo Alto Research Center (formerly Xerox PARC) in 2009.

Professor Choo’s areas of research include big data analytics, cyber security and digital forensics. He has published three books entitled “Secure Key Establishment” published in Springer’s “Advances in Information Security” book series (2008), “Cloud Storage Forensics” published by Syngress/Elsevier (forewords written by Australia’s Chief Defence Scientist and Chair of the Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories; 2014), and “Big Digital Forensic Data: Reduction and Analysis” published in Springer’s “SpringerBriefs on Cyber Security Systems and Networks” (2018). He has also published seven Australian Government refereed monographs, 30 refereed book chapters, 296 refereed journal articles, 100 refereed conference articles and six parliamentary submissions. He has also co-edited nine books entitled “Cloud Security Ecosystem” (published by Syngress: An Imprint of Elsevier, 2015), “Mobile Security and Privacy” (published by Syngress: An Imprint of Elsevier, 2017), “Contemporary Digital Forensic Investigations of Cloud and Mobile Applications” (published by Syngress: An Imprint of Elsevier, 2017), “Green, Pervasive, and Cloud Computing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Security, Privacy, and Anonymity in Computation, Communication, and Storage” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Security, Privacy, and Anonymity in Computation, Communication, and Storage Workshops” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Algorithms and Architectures for Parallel Processing” (published in Springer’s Lecture Notes in Computer Science book series, 2017), “Advanced Multimedia and Ubiquitous Engineering” (published in Springer’s Lecture Notes in Electrical Engineering book series, 2017), and “International Conference on Applications and Techniques in Cyber Security and Intelligence” (published in Springer’s Advances in Intelligent Systems and Computing book series, 2018).

He is the co-inventor of two PCT and one provisional patent applications on digital forensics and mobile app security filed in 2015. Since 2011, Professor Choo has supervised to completion 17 Ph.D., 13 masters and nine honors (eight 1st Class and one 2nd upper honors) theses.

In 2016, he was named Cybersecurity Educator of the Year – APAC (2016 Cybersecurity Excellence Awards [CEAs are produced in cooperation with the Information Security Community on LinkedIn], and in 2015, he and his team won the Digital Forensics Research Challenge organized by Germany’s University of Erlangen-Nuremberg.

Other awards include Best Research Paper Award at the 20th European Symposium on Research in Computer Security (ESORICS 2015), Australia New Zealand Policing Advisory Agency (ANZPAA); National Institute of Forensic Sciences Highly Commended Award; 2010 Australian Capital Territory Pearcey Award for “Taking a risk and making a difference in the development of the Australian ICT industry,”; 2008 Australia Day Achievement Medallion in recognition of his dedication and contribution to the Australian Government Australian Institute of Criminology, and through it to the public service of the nation; and the British Computer Society’s Wilkes Award for the best paper published in the 2007 volume of the Computer Journal (Oxford University Press).

In April 2017 he was appointed an Honorary Commander, 502nd Air Base Wing, Joint Base San Antonio-Fort Sam Houston, USA. He is also a Fellow of the Australian Computer Society and a Senior Member of IEEE.

URL: https://sites.google.com/site/raymondchooau/

Research Interests

  • Big data analytics (including privacy-preserving, identification of real-world events and big data forensics)
  • Cyber security
  • Offensive cyber (cyber crime, identification and exploitation of vulnerabilities, cyber operations, etc.)
  • Defensive cyber (design of lightweight security solutions, blockchain-based solutions, etc.)
  • Digital forensics, including forensics-by-design (e.g. cloud forensics, mobile device and app forensics, smart vehicle forensics, IoT forensics and drone forensics)

Selected Publications

Google Scholar: https://scholar.google.com/citations?hl=en&user=rRBNI6AAAAAJ&view_op=list_works&sortby=pubdate

  • “A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.” IEEE Transactions on Dependable and Secure Computing, in press
  • “A Two-layer Dimension Reduction and Two-tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.” IEEE Transactions on Emerging Topics in Computing, in press
  • “Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.” IEEE Transactions on Big Data, in press
  • “Are you Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.” IEEE Transactions on Sustainable Computing, in press
  • “BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.” IEEE Transactions on Dependable and Secure Computing, in press
  • “CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage.” IEEE Transactions on Services Computing, in press
  • “Efficient Identity-based Encryption Scheme with Equality Test for Smart City.” IEEE Transactions on Sustainable Computing, in press
  • “Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.” IEEE Transactions on Dependable and Secure Computing, in press
  • “From Latency, through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.” IEEE Transactions on Big Data, in press
  • “Fuzzy Privacy-Preserving Tensor Decomposition over Encrypted Data in a Federated Cloud Environment.” IEEE Transactions on Dependable and Secure Computing, in press
  • “Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.” IEEE Transactions on Sustainable Computing, in press
  • “On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.” ACM Transactions on Cyber-Physical Systems, in press
  • “Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.” IEEE Transactions on Dependable and Secure Computing, in press
  • “Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud.” IEEE Transactions on Services Computing, in press
  • “Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.” IEEE Transactions on Dependable and Secure Computing, in press
  • “Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.” IEEE Transactions on Cloud Computing, in press
  • “Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.” IEEE Transactions on Big Data, in press
  • “Robust Malware Detection for Internet Of (Battlefield) Things Devices Using Deep Eigenspace Learning.” IEEE Transactions on Sustainable Computing, in press
  • “Towards Bayesian-based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.” IEEE Transactions on Network and Service Management, in press
  • “Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.” IEEE Transactions on Industrial Informatics, Vol. 14, No. 2, (2018): 759-767.
  • “Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.” IEEE Transactions on Dependable and Secure Computing, Vol. 15, No. 1, (2018): 27-39.
  • “Reliable Inversion in GF(28) with Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 37, No. 3, (2018): 696-704.
  • “A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.” IEEE Transactions on Information Forensics and Security, Vol. 12, No. 6, (2017): 1259-1268.
  • “Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System.” IEEE Transactions on Information Forensics and Security, Vol. 12, No. 2, (2017): 454-464.
  • “SIPF: A Secure Installment Payment Framework for Drive-Thru Internet.” ACM Transactions on Embedded Computing Systems,Vol. 16, No. 2, (2017): Article No. 52.
  • “Social Sensors Based Online Attention Computing of Public Safety Events.” IEEE Transactions on Emerging Topics in Computing,Vol. 5, No. 3, (2017): 403-411.
  • “A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 10, (2016): 2174-2186.
  • “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 11, (2016): 2401-2414.
  • “DDOA: A Dirichlet-based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 11, (2016): 2415-2425.
  • “Intent-based Extensible Real-time PHP Supervision Framework.” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 10, (2016): 1847-1861.
  • “Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.” IEEE Transactions on Information Forensics and Security, Vol. 11, No. 8, (2016): 1847-1861.