SlideShare a Scribd company logo
1 of 17
Download to read offline
PRISMACLOUD
Privacy and Security Maintaining Services in the Cloud
Thomas Loruenser
AIT Austrian Institute of Technology GmbH
FOC2015
Vienna / 17.06.2015
Challenges for Future ICT Systems
• Cloud computing will be at the heart of future ICT systems
• The cloud will pervade all aspects of our life
• New information security and privacy risks arise
• The cloud service provider necessarily needs to be trusted
• Cloud computing builds on a problematic trust model
• This inhibits many companies to make use of the cloud
• State of the art cryptography does not provide the agility to
protect data in the cloud
• No end-to-end encryption/security available for cloud usage
2
End-to-End Security
3
End-to-End Security (cont.)
4
End-to-End Security (cont.)
5
Cloud Computing
6
Current Situation in the Cloud
7
Trustworthy Cloud Computing
8
Cloud Security 2.0
9
What about Privacy?
10
• Cloud computing is also an outsourcing model
• Centralized data collection and aggregation can lead to
privacy issues
• If personal data is stored and processed data privacy
regulations have to be fulfilled
• “Safe Harbor” before the EU Court of Justice (CJEU)
http://www.europe-v-facebook.org
• Big Data wants as much data as possible – contradicts privacy
requirements
• EU data protection rules are currently tightened
• ENISA recommends privacy and data protection by design
Project Metadata
Call: H2020-ICT-2014-1
Acronym: PRISMACLOUD
Type of Action: RIA
Number: 644962
Partners: 16
Duration: 42 months
Start Date: 2015-02-01
Estimated Project Cost: approx. 8.5M Euro
Requested EU Contribution: approx. 8M Euro
Coordinator: Austrian Institute of Technology GmbH
11
Project Objectives
Development of cryptographic tools to protect the security of data
during its lifecycle in the cloud. Development of cryptographic primitives,
protocols and schemes for application in cloud environments.
Development of cryptographic tools and methods to protect
privacy of users. Development of cryptographic mechanisms to preserve privacy
of user interacting with cloud services to only reveal necessary information.
Creation of enabling technologies for cloud infrastructures. Provision
of software and hardware implementations of relevant cryptographic mechanisms
and techniques to certify the structure of cloud topologies.
Development of a methodology for secure service composition.
Development of a holistic security model methods for secure service composition.
Examination of usability aspects as well as novel business models for secure services.
Experimental evaluation and validation of project results. Evaluation
and validation of project results in different domains dealing with sensitive data.
Provisioning of baselines and best practices for tool usage.
12
Innovations
13
Verifiability of data and infrastructure use
protect the results of computation (maintain authenticity, enable verifiability), enable
methods for infrastructure attestation
User privacy enhancing technologies
data minimization technologies, data anonymization
Securing data at rest
secure distributed information sharing, long-term security, security for structured data
Secure and efficient implementations
high-quality software and hardware implementations of primitives with prototyping, security
testing of developed components
Methodology, tools and guidelines for fast adoption
holistic security models and tools for secure service composition, business models and
standardization
Technology Readiness Level
• Verifiability of data and
infrastructure use
• User privacy and
anonymization
• Securing data at rest
• Secure and efficient
implementations
• Methodology, tools and
guidelines for fast adoption
14
The main idea and ambition of PRISMACLOUD is to enable end-to-end security for
cloud users and provide tools to protect their privacy with the best technical means
possible - by cryptography.
Demonstration
Smart City Pilot:
• ICT implementation of the European Disable
Badge (http://www.simon-project.eu)
• Surveillance CCTV cameras for law enforcement
units (http://http://www.paris-project.org)
E-Government Pilot:
• Advance electronic identity system
• Digital archiving
• Security for open data
E-Health Pilot:
• Enable shift of parts of existing healthcare IT
systems to the cloud (Healthcare TPaaS,
http://www.tclouds-project.eu )
15
PRISMACLOUD Partners
17
Contact
Website:
https://www.prismacloud.eu
Coordinator Contact:
Thomas Loruenser
thomas.loruenser@ait.ac.at
PRISMACLOUD is also on:
LinkedIn: https://in.linkedin.com/in/prismacloud
Twitter: https://twitter.com/prismacloud (@prismacloud)

More Related Content

What's hot

Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Marco Lisi
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computingNexgen Technology
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
NCDC Smart Grid Presentation
NCDC Smart Grid Presentation NCDC Smart Grid Presentation
NCDC Smart Grid Presentation Allan Eustis
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1fcleary
 
International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...ijcseit
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trustfcleary
 
Collaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingCollaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingieeepondy
 
Project Topics Information Technology
Project Topics Information TechnologyProject Topics Information Technology
Project Topics Information TechnologyPhdtopiccom
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingieeepondy
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Mahmuda Rahman
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory complianceUlf Mattsson
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattssonUlf Mattsson
 

What's hot (20)

CSA v4 Topology
CSA v4 TopologyCSA v4 Topology
CSA v4 Topology
 
secued cloud ppt
 secued cloud ppt secued cloud ppt
secued cloud ppt
 
Secued Cloud
 Secued  Cloud Secued  Cloud
Secued Cloud
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computing
 
6
66
6
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Steganography
SteganographySteganography
Steganography
 
NCDC Smart Grid Presentation
NCDC Smart Grid Presentation NCDC Smart Grid Presentation
NCDC Smart Grid Presentation
 
Surveillance Presentation
Surveillance PresentationSurveillance Presentation
Surveillance Presentation
 
Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1Effect splus systems-and-network-cluster-results-draft-v1
Effect splus systems-and-network-cluster-results-draft-v1
 
International Journal of Computer Science, Engineering and Information Techn...
International Journal of Computer Science, Engineering and  Information Techn...International Journal of Computer Science, Engineering and  Information Techn...
International Journal of Computer Science, Engineering and Information Techn...
 
Workshop summary software assurance and trust
Workshop summary software assurance and trustWorkshop summary software assurance and trust
Workshop summary software assurance and trust
 
Collaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computingCollaborative network security in multi tenant data center for cloud computing
Collaborative network security in multi tenant data center for cloud computing
 
Project Topics Information Technology
Project Topics Information TechnologyProject Topics Information Technology
Project Topics Information Technology
 
A safety design of
A safety design ofA safety design of
A safety design of
 
Analysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computingAnalysis of classical encryption techniques in cloud computing
Analysis of classical encryption techniques in cloud computing
 
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
Analysis-of-Security-Algorithms-in-Cloud-Computing [Autosaved]
 
Cloud gateways for regulatory compliance
Cloud gateways for regulatory complianceCloud gateways for regulatory compliance
Cloud gateways for regulatory compliance
 
Bio cv ulf mattsson
Bio cv ulf mattssonBio cv ulf mattsson
Bio cv ulf mattsson
 

Similar to EU H2020 PRISMACLOUD Project Overview

It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...David Terrar
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologiesUma Rangaraj
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databasesIJARIIT
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptxSasal6
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaAchSulav
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...ATMOSPHERE .
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdprUlf Mattsson
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 

Similar to EU H2020 PRISMACLOUD Project Overview (20)

B018211016
B018211016B018211016
B018211016
 
It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...It's More than Cloud - Digital Disruption - your business model is under thre...
It's More than Cloud - Digital Disruption - your business model is under thre...
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologies
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
Cloud security
Cloud security Cloud security
Cloud security
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Oral.pptx
Oral.pptxOral.pptx
Oral.pptx
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav AcharyaUnit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
 
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
Managing Trustworthy Big-data Applications in the Cloud with the ATMOSPHERE P...
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Ph d abstract
Ph d abstractPh d abstract
Ph d abstract
 
cloud abstract
cloud abstractcloud abstract
cloud abstract
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta   ulf mattsson - do you have a roadmap for eu gdprIsaca atlanta   ulf mattsson - do you have a roadmap for eu gdpr
Isaca atlanta ulf mattsson - do you have a roadmap for eu gdpr
 
Cloud security
Cloud securityCloud security
Cloud security
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 

Recently uploaded

Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfWadeK3
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...jana861314
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...anilsa9823
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxAleenaTreesaSaji
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 

Recently uploaded (20)

Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdfNAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
NAVSEA PEO USC - Unmanned & Small Combatants 26Oct23.pdf
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
Traditional Agroforestry System in India- Shifting Cultivation, Taungya, Home...
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
Lucknow 💋 Russian Call Girls Lucknow Finest Escorts Service 8923113531 Availa...
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
GFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptxGFP in rDNA Technology (Biotechnology).pptx
GFP in rDNA Technology (Biotechnology).pptx
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 

EU H2020 PRISMACLOUD Project Overview

  • 1. PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015
  • 2. Challenges for Future ICT Systems • Cloud computing will be at the heart of future ICT systems • The cloud will pervade all aspects of our life • New information security and privacy risks arise • The cloud service provider necessarily needs to be trusted • Cloud computing builds on a problematic trust model • This inhibits many companies to make use of the cloud • State of the art cryptography does not provide the agility to protect data in the cloud • No end-to-end encryption/security available for cloud usage 2
  • 7. Current Situation in the Cloud 7
  • 10. What about Privacy? 10 • Cloud computing is also an outsourcing model • Centralized data collection and aggregation can lead to privacy issues • If personal data is stored and processed data privacy regulations have to be fulfilled • “Safe Harbor” before the EU Court of Justice (CJEU) http://www.europe-v-facebook.org • Big Data wants as much data as possible – contradicts privacy requirements • EU data protection rules are currently tightened • ENISA recommends privacy and data protection by design
  • 11. Project Metadata Call: H2020-ICT-2014-1 Acronym: PRISMACLOUD Type of Action: RIA Number: 644962 Partners: 16 Duration: 42 months Start Date: 2015-02-01 Estimated Project Cost: approx. 8.5M Euro Requested EU Contribution: approx. 8M Euro Coordinator: Austrian Institute of Technology GmbH 11
  • 12. Project Objectives Development of cryptographic tools to protect the security of data during its lifecycle in the cloud. Development of cryptographic primitives, protocols and schemes for application in cloud environments. Development of cryptographic tools and methods to protect privacy of users. Development of cryptographic mechanisms to preserve privacy of user interacting with cloud services to only reveal necessary information. Creation of enabling technologies for cloud infrastructures. Provision of software and hardware implementations of relevant cryptographic mechanisms and techniques to certify the structure of cloud topologies. Development of a methodology for secure service composition. Development of a holistic security model methods for secure service composition. Examination of usability aspects as well as novel business models for secure services. Experimental evaluation and validation of project results. Evaluation and validation of project results in different domains dealing with sensitive data. Provisioning of baselines and best practices for tool usage. 12
  • 13. Innovations 13 Verifiability of data and infrastructure use protect the results of computation (maintain authenticity, enable verifiability), enable methods for infrastructure attestation User privacy enhancing technologies data minimization technologies, data anonymization Securing data at rest secure distributed information sharing, long-term security, security for structured data Secure and efficient implementations high-quality software and hardware implementations of primitives with prototyping, security testing of developed components Methodology, tools and guidelines for fast adoption holistic security models and tools for secure service composition, business models and standardization
  • 14. Technology Readiness Level • Verifiability of data and infrastructure use • User privacy and anonymization • Securing data at rest • Secure and efficient implementations • Methodology, tools and guidelines for fast adoption 14 The main idea and ambition of PRISMACLOUD is to enable end-to-end security for cloud users and provide tools to protect their privacy with the best technical means possible - by cryptography.
  • 15. Demonstration Smart City Pilot: • ICT implementation of the European Disable Badge (http://www.simon-project.eu) • Surveillance CCTV cameras for law enforcement units (http://http://www.paris-project.org) E-Government Pilot: • Advance electronic identity system • Digital archiving • Security for open data E-Health Pilot: • Enable shift of parts of existing healthcare IT systems to the cloud (Healthcare TPaaS, http://www.tclouds-project.eu ) 15
  • 17. 17 Contact Website: https://www.prismacloud.eu Coordinator Contact: Thomas Loruenser thomas.loruenser@ait.ac.at PRISMACLOUD is also on: LinkedIn: https://in.linkedin.com/in/prismacloud Twitter: https://twitter.com/prismacloud (@prismacloud)