Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Owen Lo is active.

Publication


Featured researches published by Owen Lo.


international conference on cloud computing | 2011

DACAR Platform for eHealth Services Cloud

Lu Fan; William J Buchanan; Christoph Thümmler; Owen Lo; Abou Sofyane Khedim; Omair Uthmani; Alistair Lawson; Derek Bell

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and security, integrity and confidentiality of sensitive medical data still need to be addressed. This paper presents a solution proposed by the Data Capture and Auto Identification Reference (DACAR) project to overcoming these challenges. The key contributions of this paper include a Single Point of Contact (SPoC), a novel rule based information sharing policy syntax, and Data Buckets hosted by a scalable and cost-effective Cloud infrastructure. These key components and other system services constitute DACARs eHealth platform, which allows the secure capture, storage and consumption of sensitive health care data. Currently, a prototype of the DACAR platform has been implemented. To assess the viability and performance of the platform, a demonstration application, namely the Early Warning Score (EWS), has been developed and deployed within a private Cloud infrastructure at Edinburgh Napier University. Simulated experimental results show that the end-to-end communication latency of 97.8% of application messages were below 100ms. Hence, the DACAR platform is efficient enough to support the development and integration of time critical eHealth services. A more comprehensive evaluation of the DACAR platform in a real life clinical environment is under development at Chelsea & Westminster Hospital in London.


Computers & Security | 2012

Letter to the Editor: Formal security policy implementations in network firewalls

Richard Macfarlane; William J Buchanan; Elias Ekonomou; Omair Uthmani; Lu Fan; Owen Lo

Network security should be based around formal security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type of policies relating to security in networks, and a taxonomy of the research into systems which have been proposed to support the network administrators in difficult tasks of creating, managing and deploying these policies.


Journal of Cyber Security Technology | 2017

Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)

Owen Lo; William J Buchanan; Douglas Carson

ABSTRACT This article demonstrates two fundamental techniques of power analysis, differential power analysis (DPA) and correlation power analysis (CPA), against a modern piece of hardware which is widely available to the public: the Arduino Uno microcontroller. The DPA attack we implement is referred to as the Difference of Means attack while the CPA attack is implemented by building a power model of the device using the Hamming Weight Power Model method. The cryptographic algorithm we have chosen to attack is AES-128. In particular, the AddRoundKey and SubBytes functions of this algorithm are implemented on an Arduino Uno and we demonstrate how the full 16-byte cipher key can be deduced using the two techniques by monitoring the power consumption of the device during cryptographic operations. The results of experimentation find that both forms of attack, DPA and CPA, are viable against the Arduino Uno. However, it was found that CPA produces results which are easier to interpret from an analytical perspective. Thus, our contributions in this article is providing a side-by-side comparison on how applicable these two power analysis attack techniques are along with providing a methodology to enable readers to replicate and learn how one may perform such attacks on their own hardware.


availability, reliability and security | 2018

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Owen Lo; William J. Buchanan; Douglas Carson

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing amount of work on the design and implementation of lightweight cryptographic algorithms to provide a solution for running cryptography on low resource devices. One particular cryptographic algorithm designed specifically to be used on low resource devices is the PRESENT algorithm. Although the design of PRESENT provides a small memory footprint alongside low power consumption our results show it is susceptible to information leakage when power analysis is performed against a device running this algorithm. In this paper, we present our methodology and results on performing correlation power analysis against this light weight block cipher. Our chosen device under test is an Arduino Uno which was programmed to run the Add Round Key and S-Box functions of PRESENT during the first round of encryptions. Results demonstrate that the Add Round Key function is susceptible to information leakage but a high number of false-positives were observed. Greater success was obtained when targeting the S-Box of the PRESENT algorithm and we were able to derive the first 8 bytes of the key.


Security and Communication Networks | 2018

Distance Measurement Methods for Improved Insider Threat Detection

Owen Lo; William J Buchanan; Paul Griffiths; Richard Macfarlane

Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2) and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance) in order to detect changes of behaviour, which are shown to have success in determining different insider threats.


privacy forum | 2013

Modelling of Integrated Trust, Governance and Access

William J Buchanan; Omair Uthmani; Lu Fan; Niall Burns; Owen Lo; Alistair Lawson; James Varga; Cassie Anderson

We live in a world where trust relationships are becoming ever more important. The paper defines a novel modelling system of trust relationships using Binary Decision Diagrams (BDDs), and outlines how this integrates with an information sharing architecture known as safi.re (Structured Analysis and Filtering Engine). This architecture has been used on a number of information sharing projects, including within health and social care integration, and in sharing between the police and their community partners. The research aims to abstract the relationships between domains, organisations and units, into a formal definition, and then implement these as governance rules, and using the trust relationship definition, and the rules.


international conference on ehealth telemedicine and social medicine | 2012

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud

Lu Fan; William J Buchanan; Owen Lo; Christoph Thuemmler; Alistair Lawson; Omair Uthmani; Elias Ekonomou; Abou Sofyane Khedim


Archive | 2012

Technical evaluation of an e-health platform.

Owen Lo; Lu Fan; William J Buchanan; Christoph Thuemmler


Journal of Cyber Security and Mobility | 2012

E-Health: Chances and Challenges of Distributed, Service oriented Architectures

C. Thuemmler; W. Buchanan; Christoph Thuemmler; Sofyane Khedim; William J. Buchanan; Lu Fan; Owen Lo; Elias Ekonomou


Future Internet | 2015

The Future Internet: A World of Secret Shares

William J Buchanan; David Lanc; Elochukwu Ukwandu; Lu Fan; Gordon Russell; Owen Lo

Collaboration


Dive into the Owen Lo's collaboration.

Top Co-Authors

Avatar

William J Buchanan

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Lu Fan

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elias Ekonomou

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Omair Uthmani

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Alistair Lawson

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elochukwu Ukwandu

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Gordon Russell

Edinburgh Napier University

View shared research outputs
Top Co-Authors

Avatar

Niall Burns

Edinburgh Napier University

View shared research outputs
Researchain Logo
Decentralizing Knowledge