The Faculty of Engineering is organizing a series of seminars in 2009 to encourage cross-disciplinary exchange among departments and encourage synergism among researchers.
Prof David W L Cheung,
Head, Department of Computer Science,
Director, Center for E-commerce Infrastructure Development, HKU
Professor David Wai-lok Cheung is the Head of Department of Computer Science and Director of the Center for E-commerce Infrastructure Development (CECID) in The University of Hong Kong. He conducts research in database, data mining and e-commerce technologies. His publications have appeared in top conferences such as SIGMOD, VLDB, ICDE and leading journals such as ACM TODS, ACM TKDD and IEEE TKDE. He was the recipient of the HKU Outstanding Researcher Award. Most recently, he received the Distinguished Contribution Award in the 2009 Pacific-Asia Data Mining and Knowledge Discovery Conference. Concerning applied research, he has received more than HK$60M grants from the Hong Kong Innovation and Technology Commission. Professor Cheung and his team have developed open-source ebXML gateway, which has been used by developers from more than 80 countries. The open-source product has received awards in various prominent competitions, including the Hong Kong 2004 IT Excellence Awards, the 2004 Asia-Pacific ICT Awards, and the 2005 Linux Business Awards.
May 25, 2009 (Monday)
12:30 pm – 1:30 pm
Theatre B, Chow Yei Ching Building, HKU
Google and Amazon have turned their huge infrastructure into a cloud computing environment and are aggressively recruiting businesses to run applications on their platforms. Many top-tier IT vendors have been promoting cloud computing as a new service model. Cloud computing laboratory has recently been announced in Hong Kong. However, serious concern has been raised about the security and privacy on such a service platform. Corporate users would need to protect their data running on the cloud computing platform from the “untrusted” service provider. Unfortunately, traditional encryption methods that aim at providing “unbreakable” protection are often not adequate because they are not designed to support applications to be executed on the encrypted data. In this seminar, the general problem of computing on encrypted data will be discussed. The key issue is how to balance the need on security and the requirement to perform computation. As a case study, the problem of k-nearest neighbor (kNN) computation will be used to illustrate a new model of secure computation on encrypted database.
~ Sandwiches and drinks will be provided ~
*All teaching/research staff and students are welcome.*
Should you have any enquiries, please feel free to contact the Faculty of Engineering by email at email@example.com or by phone at 2859 2803.