SlideShare a Scribd company logo
1 of 14
Download to read offline
Co-funded by the European Commission
Horizon 2020 - Grant #777154
To Trust or not to Trust,
That is the question
atmosphere-eubrazil.eu @AtmosphereEUBR
Open questions
Do you trust Cloud Services?
Do you trust the provider, the VMI,
the PaaS services and the
applications?
What do you need to trust in Cloud
Computing?
Will you upload sensitive data to the
Cloud?
ATMOSPHERE goals & partners
● ATMOSPHERE is a 24-month project aiming at the
design and development of a framework and a
platform to implement trustworthy cloud
services on top of an intercontinental hybrid and
federated resource pool.
○ Supporting the development, build, deployment,
measurement and evolution of trustworthy cloud
resources, data management services and data
processing services,
○ A pilot use case on Medical Imaging Processing.
● Expected results:
○ A Hybrid federated VM and container platform
○ A development framework with three sets of services
■ Trustworthy evaluation and monitoring framework.
■ Trustworthy Distributed Data Management
■ Trustworthy Distributed Data Processing
Trustworthiness properties
Trust. property Explanation
Security
Covering Integrity, Availability, Confidentiality, we define it as the attack resistance and fault tolerance
against malicious attacks.
Privacy assurance Guarantee of an entity to be secure from unauthorized disclosure of sensible info.
Coherence Consistency of the information regardless of the location.
Isolation
The effects of a service do not impact the trustworthiness of other data & services (e.g. crashes, starvation or
privacy issues of a service do not compromise others).
Stability The service produces equivalent outcomes and QoS for equivalent inputs and resources used.
Fairness The assurance of ethical and legal rights.
Transparency
Involves multiple sub-dimensions, such as Awareness, Access, Redress (capability of rectifying),
Explanation, Provenance, Auditability, Traceability and Accountability (assign responsibility to services
and their outcomes).
Dependability
Includes multiple sub-dimensions, such as Integrity (absence of improper system alterations), Availability
(readiness for correct service), Reliability (continuity of correct service), Maintainability (ability to undergo
modifications and repairs), Safety (absence of catastrophic consequences on the user(s) and the
environment), and Performance stability over time (in terms of applications execution time or throughput).
Trustworthiness life-cycle
● Trustworthiness metrics define the properties
that can be evaluated in each one of these
dimensions:
○ A priori and a posteriori evaluation of
vulnerability, performance, integrity, scalability,
resource consumption, fairness, isolation, etc.
○ Enabling creating self-adaptive applications
○ Tracing the degree of compliance of regulations
such as the EU-GDPR.
○ Privacy protection, traceability, confidentiality
warning, etc.
● ATMOSPHERE will provide a continuous,
global score of trust for an application, that can
be used to readjust some parameters to increase
trust.
Layers of the project
● Three main layers:
○ Cloud resources
○ Data management services
○ Data processing services
● A transversal layer to manage trustworthiness for
the entire cloud platform
● Four different user profiles:
○ Application developer: codes and
registers applications.
○ Application manager: deploys
applications and resources.
○ Final users (i.e doctors): use
applications.
○ Resource Manager: maintains the
underlying infrastructure.
Cloud & Container Services
Management Platform
● Federated network powered
by OpenVSwitch, ONOS
(inter-datacenters) and
VLANs (intra-datacenters).
● Federated Cloud managed
by Fogbow.
● Dashboard based on the
EC3 web service.
● Automatic management and
configuration of virtual elastic
clusters.
● Support for heterogeneous
resources.
● Critical applications dealing
with sensitive data running
on SGX enclaves.
Trustworthiness Monitoring &
Assessment Framework
Available on github: https://github.com/eubr-atmosphere/tma-framework
● In every layer of the ATMOSPHERE platform, the deployed probes are responsible for the active
monitoring tasks. The TMA_Monitor follows a passive strategy.
● Everything is delivered as Kubernetes services, to easily deploy the microservices that compose the
monitoring layer.
Trustworthiness Monitoring &
Assessment Framework
● Five main components:
○ TMA_Monitor: provides a generic interface in which the other layers (through probes) provide
trustworthiness-related information through the RESTful interface.
○ TMA_Analyze: is responsible for continuously listening to the Knowledge microservice,
calculate the trustworthiness scores and, if such scores fall below a threshold, activates the
TMA_Planning microservice.
■ The trustworthiness scores imply merging several metrics. E.g. Privacy can be
computed as the maximum of the privacy risk and the data loss scores for each dataset.
○ TMA_Planning: exposes an interface that allow the TMA_Analyze component to notify it
about the need for adaptations to achieve the required goals, or to recover the desired levels
of trustworthiness.
○ TMA_Execute: provides an interface through which the TMA_Planning component can
submit an adaptation plan to be performed.
○ TMA_Knowledge: stores the collected monitoring data and also stores and manages
information about the application architecture, resources and assets available and their
possible adaptations.
Dashboard
Available at: https://servproject.i3m.upv.es/ec3-atmosphere/
Application deployment (example)
● This gives the possibility of deploying services, running non-Python functions and
scaling-up the cluster directly from the Jupyter notebook.
● Three steps:
1. Deploy the Kubernetes cluster through EC3.
2. Deploy the shared space and copy data.
3. Run the processing application and check the results.
Conclusions: What could you
expect from ATMOSPHERE?
- A quantitative trustworthiness
score on the isolation, reliability,
performance, privacy risks and
stability,.
- Both at design time (virtuous
cycle) and at runtime.
- A set of trustworthy services for
data processing
- A Federated hybrid cloud
infrastructure.
- A convenient and interoperable
cloud orchestrator to deploy
complex applications.
- A broker and a monitoring service
for dynamically assessing and
adjusting the applications.
- A Data analysis framework with
high-level trustworthiness
scores such as fairness and
explainability.
- An environment to safely
process data and expose
processing algorithms with IPR
restrictions.
Don’t miss a beat!
http://www.atmosphere-eubrazil.eu/
@AtmosphereEUBR
linkedin.com/in/atmosphere/
Check our official website
Connect on LinkedIn
Follow on Twitter
REGISTER FOR THE
NEWSLETTER:
www.atmosphere-eubrazil.eu/
user/register
https://github.com/eubr-atmosphere
Official Github organization
Improving
Trustworthiness of
Data Analytics
Contact
Amanda Calatrava (@amcaar)
Instituto de Instrumentación para Imagen Molecular
Universitat Politècnica de València (UPV)
atmosphere-eubrazil.eu
Thanks for your attention!
amcaar@i3m.upv.es
https://amcaar.github.io/

More Related Content

Similar to ATMOSPHERE at IBERGRID 2018

ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018ATMOSPHERE .
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?ATMOSPHERE .
 
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE .
 
ATMOSPHERE Objectives
ATMOSPHERE ObjectivesATMOSPHERE Objectives
ATMOSPHERE ObjectivesATMOSPHERE .
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Dr. Richard Otieno
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guaranteesKamal Spring
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksWilliam McBorrough
 
Mark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfMark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfshourya112007
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment reportAhmad El Tawil
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing securitymaheralgamdi
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingINFOGAIN PUBLICATION
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud ComputingIRJET Journal
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabusViolet Violet
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...ATMOSPHERE .
 

Similar to ATMOSPHERE at IBERGRID 2018 (20)

ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018
 
How much can I trust my cloud services?
How much can I trust my cloud services?How much can I trust my cloud services?
How much can I trust my cloud services?
 
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
 
ATMOSPHERE Objectives
ATMOSPHERE ObjectivesATMOSPHERE Objectives
ATMOSPHERE Objectives
 
1 (1).pptx
1 (1).pptx1 (1).pptx
1 (1).pptx
 
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
Enhancing Data Security in Cloud Computation Using Addition-Composition Fully...
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Providing user security guarantees
Providing user security guaranteesProviding user security guarantees
Providing user security guarantees
 
Cloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and RisksCloud Computing - Security Benefits and Risks
Cloud Computing - Security Benefits and Risks
 
Mark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdfMark Attendance Recognition Systems .pdf
Mark Attendance Recognition Systems .pdf
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Cloud computing risk assesment report
Cloud computing risk assesment reportCloud computing risk assesment report
Cloud computing risk assesment report
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Various Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud ComputingVarious Security Issues and their Remedies in Cloud Computing
Various Security Issues and their Remedies in Cloud Computing
 
IRJET- Survey on Security Threats and Remedies in Cloud Computing
IRJET-  	  Survey on Security Threats and Remedies in Cloud ComputingIRJET-  	  Survey on Security Threats and Remedies in Cloud Computing
IRJET- Survey on Security Threats and Remedies in Cloud Computing
 
cloud computing notes for anna university syllabus
cloud computing notes for anna university syllabuscloud computing notes for anna university syllabus
cloud computing notes for anna university syllabus
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
 

More from ATMOSPHERE .

On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...
On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...
On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...ATMOSPHERE .
 
Control Plane Data Characterisation for an 5G NFV Environment
Control Plane Data Characterisation for an 5G NFV EnvironmentControl Plane Data Characterisation for an 5G NFV Environment
Control Plane Data Characterisation for an 5G NFV EnvironmentATMOSPHERE .
 
Designing an Open IoT Ecosystem
Designing an Open IoT EcosystemDesigning an Open IoT Ecosystem
Designing an Open IoT EcosystemATMOSPHERE .
 
Cloud Robotics: Cognitive Augmentation for Robots via the Cloud
Cloud Robotics: Cognitive Augmentation for Robots via the CloudCloud Robotics: Cognitive Augmentation for Robots via the Cloud
Cloud Robotics: Cognitive Augmentation for Robots via the CloudATMOSPHERE .
 
Artificial Neural Networks for Resource Allocation in 5G Remote Areas
Artificial Neural Networks for Resource Allocation in 5G Remote AreasArtificial Neural Networks for Resource Allocation in 5G Remote Areas
Artificial Neural Networks for Resource Allocation in 5G Remote AreasATMOSPHERE .
 
Compliance of the privacy regulations in an international Europe-Brazil context
Compliance of the privacy regulations in an international Europe-Brazil contextCompliance of the privacy regulations in an international Europe-Brazil context
Compliance of the privacy regulations in an international Europe-Brazil contextATMOSPHERE .
 
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...ATMOSPHERE .
 
Optimization Models for on-demand GPUs in the Cloud
Optimization Models for on-demand GPUs in the CloudOptimization Models for on-demand GPUs in the Cloud
Optimization Models for on-demand GPUs in the CloudATMOSPHERE .
 
SBC Thematic Groups Organisation
SBC Thematic Groups OrganisationSBC Thematic Groups Organisation
SBC Thematic Groups OrganisationATMOSPHERE .
 
Cloud Computing Interest Group
Cloud Computing Interest GroupCloud Computing Interest Group
Cloud Computing Interest GroupATMOSPHERE .
 
5G-Range - 5G networks for remote areas
5G-Range - 5G networks for remote areas5G-Range - 5G networks for remote areas
5G-Range - 5G networks for remote areasATMOSPHERE .
 
NECOS Project: Lightweight Slicing of CloudFederated Infrastructures
NECOS Project: Lightweight Slicing of CloudFederated InfrastructuresNECOS Project: Lightweight Slicing of CloudFederated Infrastructures
NECOS Project: Lightweight Slicing of CloudFederated InfrastructuresATMOSPHERE .
 
SWAMP: Smart Water Management Platform
SWAMP: Smart Water Management PlatformSWAMP: Smart Water Management Platform
SWAMP: Smart Water Management PlatformATMOSPHERE .
 
OCARIoT - Smart Childhood Obesity Caring Solution using IoT Potential
OCARIoT - Smart Childhood Obesity Caring Solution using IoT PotentialOCARIoT - Smart Childhood Obesity Caring Solution using IoT Potential
OCARIoT - Smart Childhood Obesity Caring Solution using IoT PotentialATMOSPHERE .
 
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...ATMOSPHERE .
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunitiesATMOSPHERE .
 
Integration of the Trustworthiness Assessment with Industry Systems
Integration of the Trustworthiness Assessment with Industry SystemsIntegration of the Trustworthiness Assessment with Industry Systems
Integration of the Trustworthiness Assessment with Industry SystemsATMOSPHERE .
 
Trustworthy cloud services for Medical Imaging Biomarkers
Trustworthy cloud services for Medical Imaging BiomarkersTrustworthy cloud services for Medical Imaging Biomarkers
Trustworthy cloud services for Medical Imaging BiomarkersATMOSPHERE .
 
ATMOSPHERE: An architecture for trustworthy cloud services
ATMOSPHERE: An architecture for trustworthy cloud servicesATMOSPHERE: An architecture for trustworthy cloud services
ATMOSPHERE: An architecture for trustworthy cloud servicesATMOSPHERE .
 
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...Connecting Robots to the Connected World of Modern Technology via Cloud Compu...
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...ATMOSPHERE .
 

More from ATMOSPHERE . (20)

On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...
On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...
On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...
 
Control Plane Data Characterisation for an 5G NFV Environment
Control Plane Data Characterisation for an 5G NFV EnvironmentControl Plane Data Characterisation for an 5G NFV Environment
Control Plane Data Characterisation for an 5G NFV Environment
 
Designing an Open IoT Ecosystem
Designing an Open IoT EcosystemDesigning an Open IoT Ecosystem
Designing an Open IoT Ecosystem
 
Cloud Robotics: Cognitive Augmentation for Robots via the Cloud
Cloud Robotics: Cognitive Augmentation for Robots via the CloudCloud Robotics: Cognitive Augmentation for Robots via the Cloud
Cloud Robotics: Cognitive Augmentation for Robots via the Cloud
 
Artificial Neural Networks for Resource Allocation in 5G Remote Areas
Artificial Neural Networks for Resource Allocation in 5G Remote AreasArtificial Neural Networks for Resource Allocation in 5G Remote Areas
Artificial Neural Networks for Resource Allocation in 5G Remote Areas
 
Compliance of the privacy regulations in an international Europe-Brazil context
Compliance of the privacy regulations in an international Europe-Brazil contextCompliance of the privacy regulations in an international Europe-Brazil context
Compliance of the privacy regulations in an international Europe-Brazil context
 
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...
Using Computational Back-ends for Artificial Intelligence in Childhood Cancer...
 
Optimization Models for on-demand GPUs in the Cloud
Optimization Models for on-demand GPUs in the CloudOptimization Models for on-demand GPUs in the Cloud
Optimization Models for on-demand GPUs in the Cloud
 
SBC Thematic Groups Organisation
SBC Thematic Groups OrganisationSBC Thematic Groups Organisation
SBC Thematic Groups Organisation
 
Cloud Computing Interest Group
Cloud Computing Interest GroupCloud Computing Interest Group
Cloud Computing Interest Group
 
5G-Range - 5G networks for remote areas
5G-Range - 5G networks for remote areas5G-Range - 5G networks for remote areas
5G-Range - 5G networks for remote areas
 
NECOS Project: Lightweight Slicing of CloudFederated Infrastructures
NECOS Project: Lightweight Slicing of CloudFederated InfrastructuresNECOS Project: Lightweight Slicing of CloudFederated Infrastructures
NECOS Project: Lightweight Slicing of CloudFederated Infrastructures
 
SWAMP: Smart Water Management Platform
SWAMP: Smart Water Management PlatformSWAMP: Smart Water Management Platform
SWAMP: Smart Water Management Platform
 
OCARIoT - Smart Childhood Obesity Caring Solution using IoT Potential
OCARIoT - Smart Childhood Obesity Caring Solution using IoT PotentialOCARIoT - Smart Childhood Obesity Caring Solution using IoT Potential
OCARIoT - Smart Childhood Obesity Caring Solution using IoT Potential
 
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...
ATMOSPHERE - Adaptive, Trustworthy, Manageable, Orchestrated, Secure Privacy-...
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunities
 
Integration of the Trustworthiness Assessment with Industry Systems
Integration of the Trustworthiness Assessment with Industry SystemsIntegration of the Trustworthiness Assessment with Industry Systems
Integration of the Trustworthiness Assessment with Industry Systems
 
Trustworthy cloud services for Medical Imaging Biomarkers
Trustworthy cloud services for Medical Imaging BiomarkersTrustworthy cloud services for Medical Imaging Biomarkers
Trustworthy cloud services for Medical Imaging Biomarkers
 
ATMOSPHERE: An architecture for trustworthy cloud services
ATMOSPHERE: An architecture for trustworthy cloud servicesATMOSPHERE: An architecture for trustworthy cloud services
ATMOSPHERE: An architecture for trustworthy cloud services
 
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...Connecting Robots to the Connected World of Modern Technology via Cloud Compu...
Connecting Robots to the Connected World of Modern Technology via Cloud Compu...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

ATMOSPHERE at IBERGRID 2018

  • 1. Co-funded by the European Commission Horizon 2020 - Grant #777154 To Trust or not to Trust, That is the question atmosphere-eubrazil.eu @AtmosphereEUBR
  • 2. Open questions Do you trust Cloud Services? Do you trust the provider, the VMI, the PaaS services and the applications? What do you need to trust in Cloud Computing? Will you upload sensitive data to the Cloud?
  • 3. ATMOSPHERE goals & partners ● ATMOSPHERE is a 24-month project aiming at the design and development of a framework and a platform to implement trustworthy cloud services on top of an intercontinental hybrid and federated resource pool. ○ Supporting the development, build, deployment, measurement and evolution of trustworthy cloud resources, data management services and data processing services, ○ A pilot use case on Medical Imaging Processing. ● Expected results: ○ A Hybrid federated VM and container platform ○ A development framework with three sets of services ■ Trustworthy evaluation and monitoring framework. ■ Trustworthy Distributed Data Management ■ Trustworthy Distributed Data Processing
  • 4. Trustworthiness properties Trust. property Explanation Security Covering Integrity, Availability, Confidentiality, we define it as the attack resistance and fault tolerance against malicious attacks. Privacy assurance Guarantee of an entity to be secure from unauthorized disclosure of sensible info. Coherence Consistency of the information regardless of the location. Isolation The effects of a service do not impact the trustworthiness of other data & services (e.g. crashes, starvation or privacy issues of a service do not compromise others). Stability The service produces equivalent outcomes and QoS for equivalent inputs and resources used. Fairness The assurance of ethical and legal rights. Transparency Involves multiple sub-dimensions, such as Awareness, Access, Redress (capability of rectifying), Explanation, Provenance, Auditability, Traceability and Accountability (assign responsibility to services and their outcomes). Dependability Includes multiple sub-dimensions, such as Integrity (absence of improper system alterations), Availability (readiness for correct service), Reliability (continuity of correct service), Maintainability (ability to undergo modifications and repairs), Safety (absence of catastrophic consequences on the user(s) and the environment), and Performance stability over time (in terms of applications execution time or throughput).
  • 5. Trustworthiness life-cycle ● Trustworthiness metrics define the properties that can be evaluated in each one of these dimensions: ○ A priori and a posteriori evaluation of vulnerability, performance, integrity, scalability, resource consumption, fairness, isolation, etc. ○ Enabling creating self-adaptive applications ○ Tracing the degree of compliance of regulations such as the EU-GDPR. ○ Privacy protection, traceability, confidentiality warning, etc. ● ATMOSPHERE will provide a continuous, global score of trust for an application, that can be used to readjust some parameters to increase trust.
  • 6. Layers of the project ● Three main layers: ○ Cloud resources ○ Data management services ○ Data processing services ● A transversal layer to manage trustworthiness for the entire cloud platform ● Four different user profiles: ○ Application developer: codes and registers applications. ○ Application manager: deploys applications and resources. ○ Final users (i.e doctors): use applications. ○ Resource Manager: maintains the underlying infrastructure.
  • 7. Cloud & Container Services Management Platform ● Federated network powered by OpenVSwitch, ONOS (inter-datacenters) and VLANs (intra-datacenters). ● Federated Cloud managed by Fogbow. ● Dashboard based on the EC3 web service. ● Automatic management and configuration of virtual elastic clusters. ● Support for heterogeneous resources. ● Critical applications dealing with sensitive data running on SGX enclaves.
  • 8. Trustworthiness Monitoring & Assessment Framework Available on github: https://github.com/eubr-atmosphere/tma-framework ● In every layer of the ATMOSPHERE platform, the deployed probes are responsible for the active monitoring tasks. The TMA_Monitor follows a passive strategy. ● Everything is delivered as Kubernetes services, to easily deploy the microservices that compose the monitoring layer.
  • 9. Trustworthiness Monitoring & Assessment Framework ● Five main components: ○ TMA_Monitor: provides a generic interface in which the other layers (through probes) provide trustworthiness-related information through the RESTful interface. ○ TMA_Analyze: is responsible for continuously listening to the Knowledge microservice, calculate the trustworthiness scores and, if such scores fall below a threshold, activates the TMA_Planning microservice. ■ The trustworthiness scores imply merging several metrics. E.g. Privacy can be computed as the maximum of the privacy risk and the data loss scores for each dataset. ○ TMA_Planning: exposes an interface that allow the TMA_Analyze component to notify it about the need for adaptations to achieve the required goals, or to recover the desired levels of trustworthiness. ○ TMA_Execute: provides an interface through which the TMA_Planning component can submit an adaptation plan to be performed. ○ TMA_Knowledge: stores the collected monitoring data and also stores and manages information about the application architecture, resources and assets available and their possible adaptations.
  • 11. Application deployment (example) ● This gives the possibility of deploying services, running non-Python functions and scaling-up the cluster directly from the Jupyter notebook. ● Three steps: 1. Deploy the Kubernetes cluster through EC3. 2. Deploy the shared space and copy data. 3. Run the processing application and check the results.
  • 12. Conclusions: What could you expect from ATMOSPHERE? - A quantitative trustworthiness score on the isolation, reliability, performance, privacy risks and stability,. - Both at design time (virtuous cycle) and at runtime. - A set of trustworthy services for data processing - A Federated hybrid cloud infrastructure. - A convenient and interoperable cloud orchestrator to deploy complex applications. - A broker and a monitoring service for dynamically assessing and adjusting the applications. - A Data analysis framework with high-level trustworthiness scores such as fairness and explainability. - An environment to safely process data and expose processing algorithms with IPR restrictions.
  • 13. Don’t miss a beat! http://www.atmosphere-eubrazil.eu/ @AtmosphereEUBR linkedin.com/in/atmosphere/ Check our official website Connect on LinkedIn Follow on Twitter REGISTER FOR THE NEWSLETTER: www.atmosphere-eubrazil.eu/ user/register https://github.com/eubr-atmosphere Official Github organization
  • 14. Improving Trustworthiness of Data Analytics Contact Amanda Calatrava (@amcaar) Instituto de Instrumentación para Imagen Molecular Universitat Politècnica de València (UPV) atmosphere-eubrazil.eu Thanks for your attention! amcaar@i3m.upv.es https://amcaar.github.io/