Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Jesús Villasante - Trust and Security on Cloud Computing


Published on

Jesús Villasante - Trust and Security on Cloud Computing

  • Be the first to comment

  • Be the first to like this

Jesús Villasante - Trust and Security on Cloud Computing

  1. 1. Trust and Security on Cloud Computing Jesús Villasante European Commission Information Society and Media Directorate General Unit F5 - Trust & Security
  2. 2. <ul><li>On Cloud computing </li></ul><ul><li>Study </li></ul><ul><li>The Cloud: Understanding the Security, Privacy and Trust Challenges </li></ul><ul><li>Funding Research through FP7 </li></ul><ul><li>Developing knowledge and technologies for trustworthy ICT   </li></ul><ul><ul><li>71 running projects </li></ul></ul><ul><ul><ul><li>Clouds as part of scope for some projects </li></ul></ul></ul><ul><ul><ul><li>1 specific project on Trustworthy Clouds (TClouds) </li></ul></ul></ul>Information Society and Media Directorate-General Trust and Security Unit
  3. 3. Challenges for Security, Privacy and Trust Monitoring-Auditing tools Breach notification Encryption Transparency Distributed security management Applicable law International harmonisation SLA EU legislation compliance Certification Need for best practices Identity management Interop. accross trust boundaries Threats detection Liability Accountability Consumer protection Securing virtualised archtectures Data protection Legal R&D Operational
  4. 4. TClouds Develop a cloud infrastructure that achieves security and privacy <ul><li>Regulatory Guidance and Business Enablers </li></ul><ul><ul><li>Addressing the legal and business implications of infrastructure clouds </li></ul></ul><ul><ul><li>Regulatory framework for enabling cross-boarder infrastructure clouds </li></ul></ul><ul><li>Infrastructure Security for the Future Internet </li></ul><ul><ul><li>Federated (Cloud-of-clouds) Security Architecture </li></ul></ul><ul><ul><li>Cloud Security Standards and Open APIs </li></ul></ul><ul><ul><li>Prototypes in energy and healthcare </li></ul></ul><ul><ul><li> </li></ul></ul>
  5. 5. What’s next ? <ul><li>Call 8 (26/7/2011 –17/1/2012) </li></ul><ul><ul><ul><ul><ul><li>Work Programme 2011-12 </li></ul></ul></ul></ul></ul><ul><ul><li>Heterogeneous networked service and computing environments </li></ul></ul><ul><ul><li>Trust, eID and Privacy management Infrastructures </li></ul></ul><ul><ul><li>Data policy, governance and socio-economic ecosystems </li></ul></ul><ul><ul><li>Networking and Coordination Activities </li></ul></ul><ul><li>Study: Report coming soon </li></ul><ul><li>Information on: </li></ul>80 M€