SlideShare a Scribd company logo
1 of 7
Download to read offline
Andrey Brito (Federal University of Campina Grande, Brazil)
CloudScape Brazil, Porto Alegre, RS
July 7th, 2016
Secure Cloud
• Main objective
Improve confidentiality of programs executed in clouds
• Approach
Evaluate if/how hardware mechanisms in commodity CPUs
(esp., Intel SGX) and can be used to protect the confidentiality
of programs
2July 7th, 2016 CloudScape Brazil
Confidentiality++
• Ensure confidentiality as well as integrity, consistency and
availability of applications
• Protect cloud applications against attacks by
– employees of the cloud provider
– other tenants / hackers
– hackers with physical access
• Enable novel applications by removing trust dependency between
data providers, application providers and cloud providers
3July 7th, 2016 CloudScape Brazil
Status (Started in January, 1st)
• Porting and deploying commonly and executing software to run
inside SGX
– MySQL, Memcached, Apache
• Evaluating tradeoffs
– Other technologies
– Software architectures that enable and facilitate the porting of existing
solutions
• Planning how to integrate with existing cloud management
platforms
4July 7th, 2016 CloudScape Brazil
Consortium
5July 7th, 2016 CloudScape Brazil
SecureCloud project is funded by the 3rd EU-Brazil coordinated call within the Horizon
2020 program.
European Commission
Horizon 2020
Brazil
Federal Government
MCTI – RNP – CTIC
Swiss Confederation
State Secretariat for Education,
Research and Innovation
July 7th, 2016 CloudScape Brazil 9
Consortium
Universidade
Federal de
Itajubá
CH
CH
IT
IL
DEUK
DK
PB
MG
PR
SP
PR PR
RJ
coordinator
coordinator
10July 7th, 2016 CloudScape Brazil

More Related Content

What's hot

SecureIoT Security Knowledge Base
SecureIoT Security Knowledge BaseSecureIoT Security Knowledge Base
SecureIoT Security Knowledge Base
Mariza Konidi
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...
davidepiccardi
 

What's hot (20)

EUBraBIGSEA Major Goals
EUBraBIGSEA Major GoalsEUBraBIGSEA Major Goals
EUBraBIGSEA Major Goals
 
SIG-Special Interest Group in Cloud Computing
SIG-Special Interest Group in Cloud Computing SIG-Special Interest Group in Cloud Computing
SIG-Special Interest Group in Cloud Computing
 
SecureCloud Final results
SecureCloud Final resultsSecureCloud Final results
SecureCloud Final results
 
Introduction to privacy preserving synthetic data
Introduction to privacy preserving synthetic dataIntroduction to privacy preserving synthetic data
Introduction to privacy preserving synthetic data
 
FIWARE Global Summit - Using IoT to Enhance the Standard of the Life of Citizens
FIWARE Global Summit - Using IoT to Enhance the Standard of the Life of CitizensFIWARE Global Summit - Using IoT to Enhance the Standard of the Life of Citizens
FIWARE Global Summit - Using IoT to Enhance the Standard of the Life of Citizens
 
SecureIoT Security Knowledge Base
SecureIoT Security Knowledge BaseSecureIoT Security Knowledge Base
SecureIoT Security Knowledge Base
 
Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...Design and implementation of a solution for remote data protection in safety-...
Design and implementation of a solution for remote data protection in safety-...
 
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud SystemsDevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
DevOps for Dynamic Interoperability of IoT, Edge and Cloud Systems
 
SAVI-IoT: A Self-managing Containerized IoT Platform
SAVI-IoT: A Self-managing Containerized IoT PlatformSAVI-IoT: A Self-managing Containerized IoT Platform
SAVI-IoT: A Self-managing Containerized IoT Platform
 
Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
FIWARE Global Summit - International Data Spaces - A New Idea for Data Sharing
FIWARE Global Summit - International Data Spaces - A New Idea for Data SharingFIWARE Global Summit - International Data Spaces - A New Idea for Data Sharing
FIWARE Global Summit - International Data Spaces - A New Idea for Data Sharing
 
TIN-X v2: modernized architecture with REST API
TIN-X v2: modernized architecture with REST APITIN-X v2: modernized architecture with REST API
TIN-X v2: modernized architecture with REST API
 
Cyber ASAP
Cyber ASAPCyber ASAP
Cyber ASAP
 
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
An ontology-based approach for helping to secure the ETSI Machine-to-Machine ...
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
CDE Marketplace Sept 2016: SimCentric Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: SimCentric Ltd (Autonomy & Big Data)CDE Marketplace Sept 2016: SimCentric Ltd (Autonomy & Big Data)
CDE Marketplace Sept 2016: SimCentric Ltd (Autonomy & Big Data)
 
FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?FIWARE Global Summit - What Comes Next?
FIWARE Global Summit - What Comes Next?
 
IT Infrastructure for the Digital Humanities Observatory
IT Infrastructure for the Digital Humanities ObservatoryIT Infrastructure for the Digital Humanities Observatory
IT Infrastructure for the Digital Humanities Observatory
 
Practical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification IndustryPractical Applications of Blockchain Technology in the Certification Industry
Practical Applications of Blockchain Technology in the Certification Industry
 
IC-SDV 2019: Semantic e-Science - The Future of Information Provision in the ...
IC-SDV 2019: Semantic e-Science - The Future of Information Provision in the ...IC-SDV 2019: Semantic e-Science - The Future of Information Provision in the ...
IC-SDV 2019: Semantic e-Science - The Future of Information Provision in the ...
 

Viewers also liked

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
Prince Chandu
 
Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2
IAEME Publication
 
SAP & Major Regulatory Issues in Brazil
SAP & Major Regulatory Issues in BrazilSAP & Major Regulatory Issues in Brazil
SAP & Major Regulatory Issues in Brazil
EUBrasilCloudFORUM .
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
Sim Shawn
 
Sgx alumni event 31 may 2013
Sgx alumni event 31 may 2013Sgx alumni event 31 may 2013
Sgx alumni event 31 may 2013
Sim Shawn
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detection
jonecx
 

Viewers also liked (20)

Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
 
Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2Generation of cda xml schema from dicom images using hl7 standard 2
Generation of cda xml schema from dicom images using hl7 standard 2
 
Desgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by JaseelaDesgn&imp authentctn.ppt by Jaseela
Desgn&imp authentctn.ppt by Jaseela
 
Healthcare Exchange Interoperability
Healthcare Exchange InteroperabilityHealthcare Exchange Interoperability
Healthcare Exchange Interoperability
 
Most relevant points
Most relevant pointsMost relevant points
Most relevant points
 
Proposals for a Brazilian Programme for Open Access to Research Data
Proposals for a Brazilian Programme for Open Access to Research DataProposals for a Brazilian Programme for Open Access to Research Data
Proposals for a Brazilian Programme for Open Access to Research Data
 
RNP Cloud Infrastructure model, services and challenges
RNP Cloud Infrastructure model, services and challengesRNP Cloud Infrastructure model, services and challenges
RNP Cloud Infrastructure model, services and challenges
 
SAP & Major Regulatory Issues in Brazil
SAP & Major Regulatory Issues in BrazilSAP & Major Regulatory Issues in Brazil
SAP & Major Regulatory Issues in Brazil
 
FUTEBOL - Federated Union of Telecommunications Research Facilities for an EU...
FUTEBOL - Federated Union of Telecommunications Research Facilities for an EU...FUTEBOL - Federated Union of Telecommunications Research Facilities for an EU...
FUTEBOL - Federated Union of Telecommunications Research Facilities for an EU...
 
Challenges
ChallengesChallenges
Challenges
 
Sgx @ centre & vista
Sgx @ centre & vistaSgx @ centre & vista
Sgx @ centre & vista
 
Integrated mca cloud technology & information security
Integrated mca cloud technology & information securityIntegrated mca cloud technology & information security
Integrated mca cloud technology & information security
 
Sgx alumni event 31 may 2013
Sgx alumni event 31 may 2013Sgx alumni event 31 may 2013
Sgx alumni event 31 may 2013
 
EUBrazilOpenBio
EUBrazilOpenBioEUBrazilOpenBio
EUBrazilOpenBio
 
Duplicate detection
Duplicate detectionDuplicate detection
Duplicate detection
 
Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...Conditional identity based broadcast proxy re-encryption and its application ...
Conditional identity based broadcast proxy re-encryption and its application ...
 
SecFuNet - Security for Future Networks
SecFuNet - Security for Future NetworksSecFuNet - Security for Future Networks
SecFuNet - Security for Future Networks
 
Cutting edge cloud technologies: 5G, Cloud and IoT, Fog computing
Cutting edge cloud technologies: 5G, Cloud and IoT, Fog computingCutting edge cloud technologies: 5G, Cloud and IoT, Fog computing
Cutting edge cloud technologies: 5G, Cloud and IoT, Fog computing
 
A study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanismsA study and survey on various progressive duplicate detection mechanisms
A study and survey on various progressive duplicate detection mechanisms
 

Similar to Secure Cloud - Secure Big Data Processing in Untrusted Clouds

How Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
How Researchers Will Benefit from Canada’s National Data CyberinfrastructureHow Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
How Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
inside-BigData.com
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications
 
Resume_latest_22_01
Resume_latest_22_01Resume_latest_22_01
Resume_latest_22_01
Raghu Golla
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
IAEME Publication
 

Similar to Secure Cloud - Secure Big Data Processing in Untrusted Clouds (20)

How Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
How Researchers Will Benefit from Canada’s National Data CyberinfrastructureHow Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
How Researchers Will Benefit from Canada’s National Data Cyberinfrastructure
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds Survey On: Auditing Public Clouds
Survey On: Auditing Public Clouds
 
Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
Lifecycle Management of Service-based Applications on Multi-Clouds: A Resear...
 
Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4Cs6703 grid and cloud computing unit 4
Cs6703 grid and cloud computing unit 4
 
Resume_latest_22_01
Resume_latest_22_01Resume_latest_22_01
Resume_latest_22_01
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 
Privacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud compPrivacy preserving public auditing for data storage security in cloud comp
Privacy preserving public auditing for data storage security in cloud comp
 
Hybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android AppHybrid Cryptography Algorithm Based Secured Storage Android App
Hybrid Cryptography Algorithm Based Secured Storage Android App
 
Efficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using CloudEfficient and Empiric Keyword Search Using Cloud
Efficient and Empiric Keyword Search Using Cloud
 
Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...Digital Security by Design: ISCF Digital Security by Design Research Projects...
Digital Security by Design: ISCF Digital Security by Design Research Projects...
 
Security threats in cloud computing
Security threats  in cloud computingSecurity threats  in cloud computing
Security threats in cloud computing
 
journal in research
journal in research journal in research
journal in research
 

More from EUBrasilCloudFORUM .

EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation MeetingEUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM .
 

More from EUBrasilCloudFORUM . (20)

FUTEBOL - Concertation Meeting EUBrasilCloudFORUM
FUTEBOL - Concertation Meeting EUBrasilCloudFORUMFUTEBOL - Concertation Meeting EUBrasilCloudFORUM
FUTEBOL - Concertation Meeting EUBrasilCloudFORUM
 
SWAMP - Concertation Meeting EUBrasilCloudFORUM
SWAMP - Concertation Meeting EUBrasilCloudFORUMSWAMP - Concertation Meeting EUBrasilCloudFORUM
SWAMP - Concertation Meeting EUBrasilCloudFORUM
 
EUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation MeetingEUBrasilCloudFORUM - Concertation Meeting
EUBrasilCloudFORUM - Concertation Meeting
 
NECOS - Concertation Meeting EUBrasilCloudFORUM
NECOS -  Concertation Meeting EUBrasilCloudFORUMNECOS -  Concertation Meeting EUBrasilCloudFORUM
NECOS - Concertation Meeting EUBrasilCloudFORUM
 
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUMOCARIoT - Concertation Meeting EUBrasilCloudFORUM
OCARIoT - Concertation Meeting EUBrasilCloudFORUM
 
FASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUMFASTEN - Concertation Meeting EUBrasilCloudFORUM
FASTEN - Concertation Meeting EUBrasilCloudFORUM
 
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
5G-RANGE - Concertation Meeting EUBrasilCloudFORUM
 
HPC4E - Concertation Meeting EUBrasilCloudFORUM
HPC4E - Concertation Meeting EUBrasilCloudFORUMHPC4E - Concertation Meeting EUBrasilCloudFORUM
HPC4E - Concertation Meeting EUBrasilCloudFORUM
 
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUMATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
ATMOSPHERE - Concertation Meeting EUBrasilCloudFORUM
 
PITCH - WisoApp at CloudscapeBrazil 2017
PITCH - WisoApp at CloudscapeBrazil 2017PITCH - WisoApp at CloudscapeBrazil 2017
PITCH - WisoApp at CloudscapeBrazil 2017
 
PITCH - Ustore at CloudscapeBrazil 2017
PITCH - Ustore at CloudscapeBrazil 2017PITCH - Ustore at CloudscapeBrazil 2017
PITCH - Ustore at CloudscapeBrazil 2017
 
PITCH - IN2 at CloudscapeBrazil 2017
PITCH - IN2 at CloudscapeBrazil 2017PITCH - IN2 at CloudscapeBrazil 2017
PITCH - IN2 at CloudscapeBrazil 2017
 
Melodic
Melodic Melodic
Melodic
 
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
Lessons learned from the development of FUTEBOL A case of cloud and fog inter...
 
SBC Thematic Groups Organization
SBC Thematic Groups OrganizationSBC Thematic Groups Organization
SBC Thematic Groups Organization
 
Laying the foundation for a SIG (Special Interest Group) in Cloud Computing
Laying the foundation for a SIG (Special Interest Group) in Cloud ComputingLaying the foundation for a SIG (Special Interest Group) in Cloud Computing
Laying the foundation for a SIG (Special Interest Group) in Cloud Computing
 
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion sessionSession 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
Session 2: Cloudscape Brazil 2017 & WCN Position Papers: Discussion session
 
Enabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the CloudEnabling Privacy and Security for Data Outsourced to the Cloud
Enabling Privacy and Security for Data Outsourced to the Cloud
 
Research Challenges and Interdisciplinary aspects in Cloud Computing Industry...
Research Challenges and Interdisciplinary aspects in Cloud Computing Industry...Research Challenges and Interdisciplinary aspects in Cloud Computing Industry...
Research Challenges and Interdisciplinary aspects in Cloud Computing Industry...
 
HPC as a Service
HPC as a ServiceHPC as a Service
HPC as a Service
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 

Secure Cloud - Secure Big Data Processing in Untrusted Clouds

  • 1. Andrey Brito (Federal University of Campina Grande, Brazil) CloudScape Brazil, Porto Alegre, RS July 7th, 2016
  • 2. Secure Cloud • Main objective Improve confidentiality of programs executed in clouds • Approach Evaluate if/how hardware mechanisms in commodity CPUs (esp., Intel SGX) and can be used to protect the confidentiality of programs 2July 7th, 2016 CloudScape Brazil
  • 3. Confidentiality++ • Ensure confidentiality as well as integrity, consistency and availability of applications • Protect cloud applications against attacks by – employees of the cloud provider – other tenants / hackers – hackers with physical access • Enable novel applications by removing trust dependency between data providers, application providers and cloud providers 3July 7th, 2016 CloudScape Brazil
  • 4. Status (Started in January, 1st) • Porting and deploying commonly and executing software to run inside SGX – MySQL, Memcached, Apache • Evaluating tradeoffs – Other technologies – Software architectures that enable and facilitate the porting of existing solutions • Planning how to integrate with existing cloud management platforms 4July 7th, 2016 CloudScape Brazil
  • 5. Consortium 5July 7th, 2016 CloudScape Brazil
  • 6. SecureCloud project is funded by the 3rd EU-Brazil coordinated call within the Horizon 2020 program. European Commission Horizon 2020 Brazil Federal Government MCTI – RNP – CTIC Swiss Confederation State Secretariat for Education, Research and Innovation July 7th, 2016 CloudScape Brazil 9