Meeting the challenges of data security
Our research has significantly improved the security of printing and network environments.
The security of data in printing and network environments is an area of increasing concern to individuals, businesses and government organisations throughout the world.
The threat to printing and imaging devices has increased over the last decade. This is as a result of more sophisticated tactics used by hackers, increasingly mobile workforces and changes in industry regulations. The threats posed include unauthorised changes to settings that would allow someone to reroute print jobs or access network and password information.
Data theft can result in the loss of millions of pounds, and huge damage to reputation. As a result companies worldwide have sought to combat unauthorised and illegal practices, whilst not impacting normal usage.
Mathematical algorithms developed by the School of Mathematics represent a significant step-change in existing data security techniques.
Rapid change detection
The algorithms developed enable greater security in automatic document classification and summarisation, recognising normal and abnormal patterns of data and distinguishing between confidential and non-confidential documents.
Hewlett-Packard (HP), the world’s leading PC vendor, funded the research underpinning this development and patented the resulting software, with the aim of strengthening its position as the market leader in the global information technology industry.
The algorithms have been incorporated in a schedule of upgrades in over ten million of HP’s electronic devices.
Professor Balinsky was assisted by two PhD students: N. Mohammad (2007-2011, EPSRC CASE award with Hewlett-Packard) and B. Dadachev (2011- , funded jointly by Cardiff University and Hewlett-Packard). Dr Mohammad was immediately employed by HP on completion of his PhD.
Providing security benefits
The new approach to rapid change detection developed at Cardiff identifies documents that are confidential and prevents them from being printed by unauthorised users.
The algorithms are essentially valid safeguards for all data transmitted via printing and network applications.
The feature extractor developed by Cardiff University detects unusual behaviour, and this ability means that unauthorised access can be prevented and therefore it provides enormous security benefits for HP’s extensive client base.
When evaluating this feature extractor, HP found that it considerably outperformed other feature extractors currently in use.
Meet our experts
Professor of Mathematical Physics
- +44 (0)29 2087 5528
- Dadachev, B. et al. 2012. On the Helmholtz Principle for Data Mining. Presented at: 2012 Third International Conference on Emerging Security Technologies (EST) Lisbon, Portugal 5-7 September 2012. Published in: Stoica, A. et al., Proceedings: EST 2012: Third International Conference on Emerging Security Technologies. Los Alamitos, CA: IEEE. , pp.99-102. (10.1109/EST.2012.11)
- Balinsky, A. , Balinsky, H. and Simske, S. 2011. Rapid change detection and text mining. Presented at: 2nd IMA Conference on Mathematics in Defence Defence Academy of the United Kingdom, Swindon 20 October 2011.
- Balinsky, H. , Balinsky, A. and Simske, S. 2011. Automatic text summarization and small-world networks. Presented at: 11th ACM symposium on Document engineering Mountain View, CA, USA 19-22 September 2011. Proceedings of the 11th ACM symposium on Document engineering. New York, NY: Association for Computing Machinery. , pp.175-184. (10.1145/2034691.2034731)
- Balinsky, H. , Balinsky, A. and Simske, S. 2011. Document sentences as a small world. Presented at: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC) Anchorage, AK, USA 9-12 October 2011. Published in: Tunstel, E. and Nahavandi, S. eds. Proceedings of the 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC). Los Alamitos, CA: IEEE. , pp.2583-2588. (10.1109/ICSMC.2011.6084065)
- Balinsky, A. , Balinsky, H. Y. and Simske, S. J. 2010. On helmholtz's principle for documents processing. Presented at: 10th ACM Symposium on Document Engineering (DocEng2010) Manchester, UK 21-24 September 2010. Published in: Antonacopoulos, A. , Grmish, M. and Ingold, R. eds. Proceedings of the 10th ACM symposium on Document engineering. New York: ACM Press. , pp.283-286. (10.1145/1860559.1860624)