ATMOSPHERE is a 24-month project aiming at the design and development of a framework and a platform to implement trustworthy cloud services on top of an intercontinental hybrid and federated resource pool.
ATMOSPHERE was one of the innovative projects included during the Cloud Lightning Talks session on 17 April at the Trade Fairs and Congress Center of Málaga. The project was represented by Miguel Caballer who gave an overview of its objectives and explored potential new services for the European Open Science Cloud (EOSC). The Cloud Lightning Talks session aimed to promote the different cloud service providers and new and innovative cloud-based services for the EOSC-hub communities. The session was attended by cloud providers, service developers and members of the user communities interested in cloud-based services. This session will consist of lightning talks from providers and developers of new, cloud-based services.
ATMOSPHERE was one of the innovative projects included during the Cloud Lightning Talks session on 17 April at the Trade Fairs and Congress Center of Málaga. The project was represented by Miguel Caballer who gave an overview of its objectives and explored potential new services for the European Open Science Cloud (EOSC). The Cloud Lightning Talks session aimed to promote the different cloud service providers and new and innovative cloud-based services for the EOSC-hub communities. The session was attended by cloud providers, service developers and members of the user communities interested in cloud-based services. This session will consist of lightning talks from providers and developers of new, cloud-based services.
Patientory Blockchain Privacy, How is it Achieved?Patientory
Patientory.com. Learn how PTOYMatrix network solves limitations currently facing electronic health record systems, primarily privacy limitations.
Your Health, at your fingertips. Visit Now Patientory.com.
11th International conference on Database Management Systems (DMS 2020)dannyijwest
11th International conference on Database Management Systems (DMS 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Database Management Systems. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field and establishing new collaborations in these areas.
11th International conference on Database Management Systems (DMS 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Database Management Systems. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field and establishing new collaborations in these areas.
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018ATMOSPHERE .
ATMOSPHERE presentation at "DI4R - Patrimonio Digital, Dados Abertos e tecnologias de memória" in October 2018. Ignacio Blanquer, European Coordinator of ATMOSPHERE and Professor at Universidad Politécnica de Valencia. The project was the first to be featured among 11 projects as part of the Computing Services sessions that coma in two parts. ATMOSPHERE's paper was accepted as it directly addresses the primary focus area of DI4R which is cross-domain challenges and data exchange across domains. The accepted paper was authored by ATMOSPHERE Coordinators Ignacio Blanquer and Francisco Brasileiro and will be presented by Dr. Blanquer
Trust is built based on guarantees, previous successful experiences, transparency and accountability. Yet, to-date, the technologies and frameworks necessary to raise confidence on cloud and Big Data applications is still lacking. It is crucial to create this confidence to encourage different business sectors to take up this technology and ultimately improve business efficiency and competitiveness. The ATMOSPHERE project focuses on this issue.
ATMOSPHERE will provide a solution to assess trustworthiness of cloud applications dealing with data and support the development of more trustworthy cloud applications.
Goal
Provide a solution to assess trustworthiness of cloud applications dealing with data and support the development of more trustworthy cloud applications
cloud migration service provider - cloud based intelligenceV2Soft2
Experience a seamless transition to the cloud with V2Soft, your trusted cloud migration service provider. Our comprehensive suite of services is designed to guide organizations through the intricacies of migrating to the cloud, ensuring a smooth and efficient journey. With V2Soft's expertise, you can harness the power of cloud-based intelligence to optimize your operations, drive innovation, and enhance overall business agility. Our migration strategies are tailored to your specific needs, whether you're moving applications, data, or your entire infrastructure to the cloud.
V2Soft excels as a cloud migration service provider by offering a holistic approach that incorporates cloud-based intelligence. Leverage the benefits of artificial intelligence, machine learning, and advanced analytics to unlock valuable insights from your data and drive informed decision-making. Our team of experts ensures that your migration journey is not just a move to the cloud but a strategic transformation that leverages intelligent technologies to propel your business forward. With V2Soft, experience a migration that goes beyond just relocation, enabling your organization to thrive in the digital age through the power of cloud-based intelligence.
In a landscape where digital transformation is imperative, V2Soft stands out as a reliable partner for organizations seeking a seamless and intelligent migration to the cloud. As a cloud migration service provider, we prioritize security, scalability, and efficiency, ensuring that your transition is not only successful but positions your business for sustained growth. Trust V2Soft to guide you through the complexities of cloud migration, utilizing cloud-based intelligence to unlock the full potential of your data and applications in the cloud environment.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Patientory Blockchain Privacy, How is it Achieved?Patientory
Patientory.com. Learn how PTOYMatrix network solves limitations currently facing electronic health record systems, primarily privacy limitations.
Your Health, at your fingertips. Visit Now Patientory.com.
11th International conference on Database Management Systems (DMS 2020)dannyijwest
11th International conference on Database Management Systems (DMS 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Database Management Systems. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field and establishing new collaborations in these areas.
11th International conference on Database Management Systems (DMS 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Database Management Systems. The goal of this conference is to bring together researchers and practitioners from academia and industry to focus on understanding Modern developments in this field and establishing new collaborations in these areas.
ATMOSPHERE at Digital Infrastructure for Research (DI4R) 2018ATMOSPHERE .
ATMOSPHERE presentation at "DI4R - Patrimonio Digital, Dados Abertos e tecnologias de memória" in October 2018. Ignacio Blanquer, European Coordinator of ATMOSPHERE and Professor at Universidad Politécnica de Valencia. The project was the first to be featured among 11 projects as part of the Computing Services sessions that coma in two parts. ATMOSPHERE's paper was accepted as it directly addresses the primary focus area of DI4R which is cross-domain challenges and data exchange across domains. The accepted paper was authored by ATMOSPHERE Coordinators Ignacio Blanquer and Francisco Brasileiro and will be presented by Dr. Blanquer
Trust is built based on guarantees, previous successful experiences, transparency and accountability. Yet, to-date, the technologies and frameworks necessary to raise confidence on cloud and Big Data applications is still lacking. It is crucial to create this confidence to encourage different business sectors to take up this technology and ultimately improve business efficiency and competitiveness. The ATMOSPHERE project focuses on this issue.
ATMOSPHERE will provide a solution to assess trustworthiness of cloud applications dealing with data and support the development of more trustworthy cloud applications.
Goal
Provide a solution to assess trustworthiness of cloud applications dealing with data and support the development of more trustworthy cloud applications
cloud migration service provider - cloud based intelligenceV2Soft2
Experience a seamless transition to the cloud with V2Soft, your trusted cloud migration service provider. Our comprehensive suite of services is designed to guide organizations through the intricacies of migrating to the cloud, ensuring a smooth and efficient journey. With V2Soft's expertise, you can harness the power of cloud-based intelligence to optimize your operations, drive innovation, and enhance overall business agility. Our migration strategies are tailored to your specific needs, whether you're moving applications, data, or your entire infrastructure to the cloud.
V2Soft excels as a cloud migration service provider by offering a holistic approach that incorporates cloud-based intelligence. Leverage the benefits of artificial intelligence, machine learning, and advanced analytics to unlock valuable insights from your data and drive informed decision-making. Our team of experts ensures that your migration journey is not just a move to the cloud but a strategic transformation that leverages intelligent technologies to propel your business forward. With V2Soft, experience a migration that goes beyond just relocation, enabling your organization to thrive in the digital age through the power of cloud-based intelligence.
In a landscape where digital transformation is imperative, V2Soft stands out as a reliable partner for organizations seeking a seamless and intelligent migration to the cloud. As a cloud migration service provider, we prioritize security, scalability, and efficiency, ensuring that your transition is not only successful but positions your business for sustained growth. Trust V2Soft to guide you through the complexities of cloud migration, utilizing cloud-based intelligence to unlock the full potential of your data and applications in the cloud environment.
An educational overview of the Cloud Computing Ecosystem or Framework. This presentation is geared toward those who are just beginning to understand Cloud Computing.
Let us understand some of the infrastructural and
security challenges that every organization faces today
before delving into the concept of securing the cloud
data lake platform. Though Data lakes provide scalability,
agility, and cost-effective features, it possesses a unique
infrastructure and security challenges.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Enhanced Data Partitioning Technique for Improving Cloud Data Storage SecurityEditor IJMTER
Cloud computing is a model for enabling for on demand network access to shared
configurable computing resources (e.g. networks, servers, storage, applications, and services).It is
based on virtualization and distributed computing technologies. Cloud Data storage systems enable
user to store data efficiently on server without any trouble of data resources. User can easily store
and retrieve their data remotely. The two biggest concerns about cloud data storage are reliability and
security. Clients aren’t like to entrust their data to another third party or companies without a
guarantee that they will be able to access therein formations whenever they want. In the existing
system, the data are stored in the cloud using dynamic data operation with computation which makes
the user need to make a copy for further updating and verification of the data loss. Different
distributed storing auditing techniques are used for overcoming the problem of data loss. Recent
work of this paper has show that data partitioning technique used for data storage by providing
Digital signature to every partitioning data and user .this technique allow user to upload or retrieve
the data with matching the digital signatures provided to them. This method ensures high cloud
storage integrity, enhanced error localization and easy identification of misbehaving server and
unauthorized access to the cloud server. Hence this work aims to store the data securely in reduced
space with less time and computational cost.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Similar to ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil) (20)
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...ATMOSPHERE .
In this webinar, Francisco Brasileiro and Ignacio Blanquer will discuss the trustworthiness requirements of big-data applications deployed atop cloud infrastructures, and how the ATMOSPHERE platform can be used to handle them. This will be explained using as example a medical application developed in the context of the ATMOSPHERE project, and deployed over a transatlantic federated cloud infrastructure.
On the development of a Visual-Temporal-awareness Rheumatic Heart Disease cla...ATMOSPHERE .
Erickson Nascimento, Federal University of Minas Gerais - "On the development of a Visual-Temporal-awareness Rheumatic Heart Disease classifier for Echocardiographic Videos"
ATMOSPHERE: An architecture for trustworthy cloud servicesATMOSPHERE .
Francisco Brasileiro, ATMOSPHERE Brazilian Coordinator & Federal University of Campina Grande - "ATMOSPHERE: An architecture for trustworthy cloud services”
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
ATMOSPHERE Objectives of the Project (ICT Week Brasilia - Brazil)
1. Co-funded by the European Commission Horizon 2020 -
Grant #777154
Objectives of the Project
atmosphere-eubrazil.eu @AtmosphereEUBR
2. ATMOSPHERE is a 24-month project
aiming at the design and development of a
framework and a platform to implement
trustworthy cloud services on top of an
intercontinental hybrid and federated
resource pool.
Considering a broad spectrum of
trustworthiness properties and their measures.
Supporting the development, build,
deployment, measurement and evolution of
trustworthy cloud resources, data management
services and data processing services,
Demonstrated on a sensitive scenario of
distributed telemedicine.
ATMOSPHERE GOALS &
PARTNERS
3. Activities
Trustworthiness Assessment &
Monitoring Framework
Cloud services managing
federated and hybrid resources
Distributed Trustworthy
Data Management Services
Trustworthy Data
Processing Services
Pilot & Use
Cases
CommunityEngagement,Communication&Impact
ExploitationandSustainability
4. Trustworthiness is considered in its multiple
dimensions
Security, Privacy, Coherence, Isolation, Stability,
Fairness, Transparency and Dependability.
Trustworthiness metrics define the
properties that can be evaluated in each one
of these dimensions
A priori and a posteriori evaluation of vulnerability,
performance, integrity, robustness, scalability, resource
consumption, fairness, isolation, etc.
Enabling creating self-adaptive applications
Tracing the degree of compliance of regulations such
as the EU-GDPR
Privacy protection, traceability, confidentiality warning,
etc.
Trustworthiness life-cycle
5. A hybrid and federated platform to evaluate trustworthiness
Considerng both Virtual Machines and LxD containers as first class hypervisors.
Develop a federation model for LXD containers providing an AAI based on existing IdPs, a synchronized
repository of microimages, a CLI and a service specification for managing the whole platform.
Execution of applications through a function-oriented Dashboard.
Federated Network management beyond the boundaries of the sites,
Providing Network as a Service NFV and facing issues such as the scarce of public IPs.
ATMOSPHERE will offer a multi-site network federation
mechanism to enable the migration of configured
resources without needing to change IP
configuration and securely isolating
multi-tenant federated networks.
Considering containers as first-class
resources for network federation.
Hybrid federated container
platform
6. ATMOSPHERE not only measures trustworthiness but provides a set of
services to improve it.
A Distributed Data Management Platform will be developed such services as
storage, retrieval, update and access of data in a cloud, guaranteeing
features such as confidentiality and revocation and access authorization.
Policy engines for Secure Data Management.
Based on enclaves and focusing
on SQL and NoSQL Databases.
Supporting Spark.
Privacy preservation and
annotation.
Distributed Trustworthy Data
Management Services
Data
sources
PSFT in DTDMS
Sensitive Data
Original
Data
Derived
Data
Anonymized
Data
PSFTAssurance
Forgotten PSFT date
External
Systems
generates
maintains
removes
7. A layer of data analytic techniques implemented as a set of building blocks,
as well as a framework for the development of applications from the building
blocks on top of the Data Management Platform.
Trustworthy evaluation in design and
runtime
Evaluation of privacy risks, estimation of
execution deadlines for a given resource
allocation.
Detailed monitoring for the evaluation of
performance, fairness, robustness and
scalability with adaptive measures.
Workflow orchestration.
Trustworthy Data Processing
Services
8. The use case of the project focuses on telemedicine based on the processing
of echocardio images
Depending on the features of the images and the processing services, different risks can
be assumed.
Processing services that could lead to the identification of personal data must comply a
higher level of protection.
Application will serve to measure trustworthiness a priori and dynamically in a
broader sense, which will enable creating self-adaptive applications and
tracing the compliance of regulations such as the EU-GDPR.
Applications that cannot reach a defined level of
certification can be still trustful for specific operations
with lower risks, such as pure anonymised data, best
effort computations and long-term research.
Use Case
9. ATMOSPHERE will provide
A definition of Trustworthiness
Metrics.
A platform to measure such
metrics.
A hybrid and federated
container-based infrastructure.
Performance modelling services
for the applications.
Trustworthy Data Management
and Processing services.
A use case on telemedicine
Expected Outputs &
Exploitation plan
10. Improving
Trustworthiness of
Data Analytics
Contact
Ignacio Blanquer – iblanque@dsic.upv.es - (Universitat Politècnica de
València)
Francisco Brasileiro – fubica@computacao.ufcg.edu.br -
(Universidade Federal de Campina Grande)
atmosphere-eubrazil.eu