Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

TRUSTEE (data pRivacy and cloUd Security clustEr Europe) Flyer

13 views

Published on

TRUSTEE (data pRivacy and cloUd Security clustEr Europe) is a network of 11 research projects funded by the European Union that was established within the Common Dissemination Booster initiative.

Published in: Software
  • Be the first to comment

  • Be the first to like this

TRUSTEE (data pRivacy and cloUd Security clustEr Europe) Flyer

  1. 1. Cloud computing allows users to access scalable, shareable, elastic pool of computing resources (such as networks, servers, storage, applications and services) hosted remotely, instead of investing capital in their own IT infrastructure. Cloud Computing has been gaining an increasing attention due to its considerable advantages on cost reduction and positive impact on both job and business creation across Europe. However, there are concerns regarding security, privacy and data protection that are inhibiting cloud adoption. If cloud services are not trusted, it is most likely that the transition to cloud hosting will not happen soon. Gaining user’s trust is key. There are ways to largely eliminate concerns of potential cloud users by taking advantage of numerous existing technological possibilities, including trust building measures, like cryptography, isolation and many more. New services towards highly-secure and privacy-friendly Cloud Computing Ten EC-funded projects, CREDENTIAL, MUSA, PRISMACLOUD, SecureCloud, SERECA, SPECS, SUNFISH, SWITCH, TREDISEC and UNICORN are amongst the European projects increasing trust on cloud technologies, for both private and public sector, by enabling secure and trustworthy cloud-based services. Their services increase European Industry competitiveness in cybersecurity in Cloud and multi-cloud applications, while contributing for the Digital Single Market. Increasing trustworthy, security and privacy levels on cloud computing across Europe These projects have received support from the European Commission’s Common Dissemination Booster Usage of security primitives to support data compression and data deduplication. Enabling cloud providers to efficiently search and process encrypted data. Enabling public cryptographic protocols and methods to securely store and share identity data in the cloud. Early cyber-risk assessment, with automatic & continuous generation of application Security Service Level Agreement. • • • • • • • • Storage and data sharing security based on cryptography. Secure and efficient processing of sensitive data in untrusted clouds. Privacy-preserving services compliant with GDPR & other privacy regulations. Security even in presence of malicious cloud provider operators. Security & Privacy Data Storage and Processing Provision of Openness, interoperability and adaptability of open solution, to be integrated in service providers solutions. Integration of services from organisation’s own private cloud with data and services provided by external clouds. Federation as a Service and Blockchain approach. Enabling controlled management of the whole application’s lifecycle, from design, development and execution. Provision of Innovative solutions for continuous security monitoring during the operation of a Cloud service. Open Solutions & Hybrid Clouds • • • • •
  2. 2. Who benefits? The impact on Cloud Computing users These projects have received funding from the European Union’s Horizon 2020 (H2020) Research and Innovation programme under Grant Agreements: CREDENTIAL 653454; FENTEC 780108; MUSA 644429; PAPAYA 786767; PRISMACLOUD 644962; SECURECLOUD 690111; SERECA 645011; SPECS 610795; SUNFISH 644666; SWITCH 643963; TREDISEC 644412; UNICORN 731846 The EU cluster of research projects increasing trust & privacy on cloud technologies Industry: Cloud service providers, Telco operators, Security and privacy providers & SMEs Policymakers, Standardizations bodies and alliances & Public sector (government, health, industry) Research & Development Community: Academia researchers; Industry researchers; Students; Other European and national projects Data Privacy and cloud security clusters General Public: Non-specialists & Potential users of cloud-based services Businesses protection, by ensuring that the business is not at risk from potential threats. Personal info protection, the most valuable commodities in the digital age, against to third-parties. Productivity Protection, avoiding bring an entire business to a standstill. Increment of confidence, by ensuring that businesses are effectively protected against all kinds of cyber threats. Scalability, Flexibility and agility of cloud services, while being compliant with data protection regulations. Provision of compelling cost savings, including lower implementation and maintenance costs. Competitiveness due to flexible and agile computing platforms, providing for scalability and high-performance resources and highly reliable and available applications and data. Enables end-to-end security and improving privacy in cloud identity management services for managing secure access control, through advancing novel cryptographic technologies and authentication mechanisms. Offers an integrated tool framework that integrates security-by-design and security assurance support to applications that are distributed in or use heterogeneous cloud services. Enables secure and trustworthy cloud-based services by improving and adopting novel tools from cryptographic research. Provides an ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users and software. Removes technical impediments to secure cloud computing and allows the execution of sensitive code on Cloud platforms, without the need of trusting the public cloud providers. Develops and implements an open source framework to offer Security-as-a-Service, by relying on the notion of security parameters specified in Service Level Agreements (SLA), and also providing the techniques to systematically manage their life-cycle. Provides an integrated software that enables secure cloud federation as required by the Public Sector, by integrating different clouds that ensure information security. Provides an interactive environment for developing applications and controlling their execution, a real-time infrastructure planner for deploying applications in Clouds, and an autonomous system adaptation platform for monitoring and adapting system behaviour. Develops systems and techniques that make the cloud a secure and efficient place to store data, while offering strong data confidentiality, integrity and availability guarantees. Facilitates the design and deployment of cloud applications and services and improve developers’ productivity by reducing cloud application design time via code annotations and blueprints for security. Develops new Functional Encryption (FE) as an efficient alternative to the all-or-nothing approach of traditional encryption, which are application oriented and can be used in a wide range of scenarios. Addresses the privacy concerns when data analytics tasks are performed by untrusted third-party data processors, by enabling data owners to extract valuable information from protected data, while being cost-effective and accurate.

×