Skip to main content
Vai all'homepage della Commissione europea (si apre in una nuova finestra)
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Trust-aware, REliable and Distributed Information SEcurity in the Cloud.

CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.

I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .

Risultati finali

Innovation management report (si apre in una nuova finestra)

This document reviews the initial ISP and incorporates modifications if needed. The document reports on the alignment of the project architecture designs and developments to the current technological and market trends.

Final Evaluation report (si apre in una nuova finestra)

This report summarizes the evaluation sessions and the results obtained with regards to the evaluation criteria defined in deliverable D6.3. The conclusions should indicate the TREDISEC framework maturity level (e.g. using NASA TRL levels).

Evaluation criteria (si apre in una nuova finestra)

A report defining the evaluation criteria to be used in the evaluation sessions for measuring the results of the TREDISEC framework in the context of the use cases deployments.

A Proposal on Secure Enforcement of Policies in the Cloud (si apre in una nuova finestra)

This deliverable will present a framework for secure enforcement of policies in the cloud. Our solutions encompass existing state of the art technique and include novel primitives, such as collusion resistant sharing of information and novel All or Nothing Transforms (AONTs) and ABAC-based policies with distributed attributes. The deliverable will also report on the design of secure deletion function in cloud storage nodes for emerging storage systems (e.g., Flash).

Dissemination plan (si apre in una nuova finestra)

This deliverable describes the plan for the dissemination activities to be carried out during the entire project lifetime

A Proposal for Data Confidentiality and Deduplication (si apre in una nuova finestra)

This deliverable will present, analyse, and implement a set of solutions for data confidentiality given a powerful adversary that can compromise the encryption keys. We will also devise solutions that ensure data confidentiality while enabling the cloud to perform data deduplication.

A Proposal for Access Control Models for Multi-tenancy (si apre in una nuova finestra)

This deliverable will assess current approaches for access control and propose novel models, based on current progress in ABAC models, to cope with multi-tenancy requirements and in particular with distributed attributes. A mapping between these ABAC-based models to enforceable policy languages (e.g. XACML) will be proposed, including the design of an enforcement component to parse, interpret and execute access control policies.

Specification and Preliminary Design of Verifiability mechanisms (si apre in una nuova finestra)

This report will introduce initial design of different verifiability primitives.

Project Quality Assurance Plan (si apre in una nuova finestra)

This deliverable will provide guidance to the project partners for common terminology, structure and processes and will help establishing and maintaining an efficient project management.

Requirements and trade-off between verifiability and data reduction (si apre in una nuova finestra)

This deliverable will identify the specific requirements of TREDISEC use cases and analyze the compatibility of existing verifiability solutions with data reduction techniques.

Exploitation report and long term sustainability strategy (si apre in una nuova finestra)

This deliverable explains in detail the TREDISEC exploitation strategy, the individual partners exploitation plans for the results of the project and defines a sustainability path for the continuity of the TREDISEC achievements after the project ends.

Innovation Strategy and Plan (si apre in una nuova finestra)

This document establishes the strategy, processes, milestones and role assignments to ensure an innovation-driven research and that development work is performed during the entire project duration. The ISP includes an early market and technologies assessment to serve as input to the work packages action plan.

Requirements analysis and consolidation (si apre in una nuova finestra)

A list of consolidated and traceable functional and non-functional requirements.

Optimization of outsourcing activities and initial design of privacy preserving data processing primitives (si apre in una nuova finestra)

This deliverable will provide a tool set to optimize the actual outsourcing process, by for example, parallelizing encryption before outsourcing data to the cloud. In this context, we introduce an initial design of privacy preserving primitives for data processing. This deliverable will also comprise the complete design and evaluation of privacy preserving data processing primitives.

Final Innovation management report (si apre in una nuova finestra)

This document reports on the alignment of the project achievements to the current technological and market trends. The document includes an assessment of the maturity of the project results after the deployment and evaluation in the use case scenarios.

Complete Design and Evaluation of Verifiability mechanisms (si apre in una nuova finestra)

This deliverable will provide a complete description of different verifiability solutions which integrate data reduction schemes. Such techniques will also be evaluated in terms of security and performance.

Communication strategy and plan (si apre in una nuova finestra)

The project communication activities, actions, channels, procedures and supporting marketing and promotional material will be defined in this deliverable.

Design of Provisioning Framework (si apre in una nuova finestra)

This deliverable will provide the design of the provisioning framework. It will comprise support for evaluating historical queries as well as automated analysis of database metadata such as table structures and data types. There will be support for labelling columns with respect to security, privacy, functionality and cloud processing requirements as well as support for automated optimization.

A Proposal for Resource Isolation in Multi-Tenant Storage Systems (si apre in una nuova finestra)

This deliverable consists of the design and implementation of multi-tenant isolation techniques for cloud systems that can be used in combination with existing application-level methods and leverage (i) OS-and system-based isolation primitives, to enable a second set of security controls, and/or (ii) existing dedicated security hardware (e.g., Trusted Platform Modules, Hardware Security Modules) and existing or new Trusted Execution Environments (TEEs) that are built upon the latter

Implementation of Provisioning, Outsourcing and Processing Frameworks (si apre in una nuova finestra)

This deliverable will provide the implementation of the provisioning framework, as well as a complete description and implementation of privacy preserving data processing primitives. We will show how earlier observations made when outsourcing data into the cloud will influence the privacy-aware processing.

TREDISEC architecture and initial framework design (si apre in una nuova finestra)

This deliverable evaluates the architectural models and selects the appropriate one for the project. This deliverable also provides a first design of the TREDISEC framework.

Final architecture and design of the TREDISEC framework (si apre in una nuova finestra)

This deliverable describes the final design of the TREDISEC framework.

TREDISEC framework implementation (si apre in una nuova finestra)

This deliverable is a set of software elements packaged, implementing the TREDISEC framework, and the supporting generic test cloud environment.

Pubblicazioni

On Information Leakage in Deduplicated Storage Systems (si apre in una nuova finestra)

Autori: Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Čapkun
Pubblicato in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Pagina/e 61-72, ISBN 9781-450345729
Editore: ACM Press
DOI: 10.1145/2996429.2996432

Message-Locked Proofs of Retrievability with Secure Deduplication (si apre in una nuova finestra)

Autori: Dimitrios Vasilopoulos, Melek Önen, Kaoutar Elkhiyaoui, Refik Molva
Pubblicato in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Pagina/e 73-83, ISBN 9781-450345729
Editore: ACM Press
DOI: 10.1145/2996429.2996433

Authenticated Encryption with Variable Stretch (si apre in una nuova finestra)

Autori: Reza Reyhanitabar, Serge Vaudenay, Damian Vizár
Pubblicato in: SIACRYPT 2016: Advances in Cryptology – ASIACRYPT 2016, 2016, Pagina/e 396-425
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-53887-6_15

Encrypting Analytical Web Applications (si apre in una nuova finestra)

Autori: Benny Fuhry, Walter Tighzert, Florian Kerschbaum
Pubblicato in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Pagina/e 35-46, ISBN 9781-450345729
Editore: ACM Press
DOI: 10.1145/2996429.2996438

Poly-Logarithmic Range Queries on Encrypted Data with Small Leakage (si apre in una nuova finestra)

Autori: Florian Hahn, Florian Kerschbaum
Pubblicato in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Pagina/e 23-34, ISBN 9781-450345729
Editore: ACM Press
DOI: 10.1145/2996429.2996437

HardIDX: Practical and Secure Index with SGX (si apre in una nuova finestra)

Autori: Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi
Pubblicato in: DBSec 2017: Data and Applications Security and Privacy XXXI, 2017, Pagina/e 386-408, ISBN 978-3-319-61176-1
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-61176-1_22

Sharing Proofs of Retrievability across Tenants (si apre in una nuova finestra)

Autori: Frederik Armknecht, Jens-Matthias Bohli, David Froelicher, Ghassan Karame
Pubblicato in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security - ASIA CCS '17, 2017, Pagina/e 275-287, ISBN 9781-450349444
Editore: ACM Press
DOI: 10.1145/3052973.3052997

Reconciling Security and Functional Requirements in Multi-tenant Clouds (si apre in una nuova finestra)

Autori: Ghassan Karame, Matthias Neugschwandtner, Melek Önen, Hubert Ritzdorf
Pubblicato in: Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing - SCC '17, 2017, Pagina/e 11-18, ISBN 9781-450349703
Editore: ACM Press
DOI: 10.1145/3055259.3055265

AURA: Recovering from Transient Failures in Cloud Deployments (si apre in una nuova finestra)

Autori: Ioannis Giannakopoulos, Ioannis Konstantinou, Dimitrios Tsoumakos, Nectarios Koziris
Pubblicato in: 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), 2017, Pagina/e 762-765, ISBN 978-1-5090-6611-7
Editore: IEEE
DOI: 10.1109/CCGRID.2017.133

Verifiable Document Redacting (si apre in una nuova finestra)

Autori: Hervé Chabanne, Rodolphe Hugel, Julien Keuffer
Pubblicato in: 2017, Pagina/e 334-351
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-66402-6_20

Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy (si apre in una nuova finestra)

Autori: Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
Pubblicato in: 2017, Pagina/e 485-505
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-72359-4_29

ROTE: Rollback Protection for Trusted Execution

Autori: Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun
Pubblicato in: USENIX Security Symposium 2017 proceedings, 2017, ISBN 978-1-931971-40-9
Editore: USENIX

Practical and Secure Substring Search (si apre in una nuova finestra)

Autori: F. hahn, N. Loza, F. Kerschbaum
Pubblicato in: SIGMOD/PODS ’18: 2018 International Conference on Management of Data, 2018, ISBN 978-1-4503-4703-7
Editore: SIGMOD
DOI: 10.1145/3183713.3183754

Secure and Scalable Multi-User Searchable Encryption (si apre in una nuova finestra)

Autori: C. Van Rompay, R. Molva, M. Önen
Pubblicato in: International Workshop on Security in Cloud Computing, 2018, ISBN 978-1-4503-5759-3
Editore: International Workshop on Security in Cloud Computing
DOI: 10.1145/3201595.3201597

POROS: Proof of Data Reliability for Outsourced Storage (si apre in una nuova finestra)

Autori: D. Vasilopoulos, K. Elkhiyaoui, R. Molva, M. Önen
Pubblicato in: International Workshop on Security in Cloud Computing, 2018, ISBN 978-1-4503-5759-3
Editore: International Workshop on Security in Cloud Computing
DOI: 10.1145/3201595.3201600

Study of a Verifiable Biometric Matching (si apre in una nuova finestra)

Autori: Hervé Chabanne, Julien Keuffer, Roch Lescuyer
Pubblicato in: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16, 2016, Pagina/e 183-184, ISBN 9781-450342902
Editore: ACM Press
DOI: 10.1145/2909827.2931097

Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud

Autori: Frederik Armknecht, Ludovic Barman, Jens-Matthias Bohli, Ghassan Karame
Pubblicato in: 2016, ISBN 978-1-931971-32-4
Editore: USENIX Association

Efficient Techniques for Publicly Verifiable Delegation of Computation (si apre in una nuova finestra)

Autori: Kaoutar Elkhiyaoui, Melek Önen, Monir Azraoui, Refik Molva
Pubblicato in: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16, 2016, Pagina/e 119-128, ISBN 9781-450342339
Editore: ACM Press
DOI: 10.1145/2897845.2897910

A transparent defense against USB eavesdropping attacks (si apre in una nuova finestra)

Autori: Matthias Neugschwandtner, Anton Beitler, Anil Kurmus
Pubblicato in: Proceedings of the 9th European Workshop on System Security - EuroSec '16, 2016, Pagina/e 1-6, ISBN 9781-450342957
Editore: ACM Press
DOI: 10.1145/2905760.2905765

Logical Partitions on Many-Core Platforms (si apre in una nuova finestra)

Autori: Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun
Pubblicato in: Proceedings of the 31st Annual Computer Security Applications Conference on - ACSAC 2015, 2015, Pagina/e 451-460, ISBN 9781-450336826
Editore: ACM Press
DOI: 10.1145/2818000.2818026

Transparent Data Deduplication in the Cloud (si apre in una nuova finestra)

Autori: Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Franck Youssef
Pubblicato in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15, 2015, Pagina/e 886-900, ISBN 9781-450338325
Editore: ACM Press
DOI: 10.1145/2810103.2813630

Initial Encryption of large Searchable Data Sets using Hadoop (si apre in una nuova finestra)

Autori: Feng Wang, Mathias Kohler, Andreas Schaad
Pubblicato in: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies - SACMAT '15, 2015, Pagina/e 165-168, ISBN 9781-450335560
Editore: ACM Press
DOI: 10.1145/2752952.2752960

A verifiable system for automated face identification

Autori: Hervé Chabanne, Julien Keuffer, Roch Lescuyer
Pubblicato in: 2016
Editore: --

Some applications of verifiable computation to biometric verification (si apre in una nuova finestra)

Autori: Julien Bringer, Herve Chabanne, Firas Kraiem, Roch Lescuyer, Eduardo Soria-Vazquez
Pubblicato in: 2015 IEEE International Workshop on Information Forensics and Security (WIFS), 2015, Pagina/e 1-6, ISBN 978-1-4673-6802-5
Editore: IEEE
DOI: 10.1109/WIFS.2015.7368568

Securing Cloud Data under Key Exposure (si apre in una nuova finestra)

Autori: Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
Pubblicato in: IEEE Transactions on Cloud Computing, 2017, Pagina/e 1-1, ISSN 2168-7161
Editore: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/TCC.2017.2670559

A Leakage-Abuse Attack Against Multi-User Searchable Encryption (si apre in una nuova finestra)

Autori: Cédric Van Rompay, Refik Molva, Melek Önen
Pubblicato in: Proceedings on Privacy Enhancing Technologies, Numero 2017/3, 2017, ISSN 2299-0984
Editore: DE GRUYTER OPEN
DOI: 10.1515/popets-2017-0034

Towards Shared Ownership in the Cloud (si apre in una nuova finestra)

Autori: Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
Pubblicato in: IEEE Transactions on Information Forensics and Security, 2018, Pagina/e 1-1, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2018.2837648

Towards Realizing a Truly Secure and Trustworthy Cloud

Autori: Beatriz Gallego-Nicasio Crespo, Melek Önen, Ghassan Karame
Pubblicato in: ERCIM News, 2016, ISSN 0926-4981
Editore: ERCIM

Deniable Functional Encryption (si apre in una nuova finestra)

Autori: Angelo De Caro, Vincenzo Iovino, Adam O’Neill
Pubblicato in: Public-Key Cryptography – PKC 2016, 2016, Pagina/e 196-222, ISBN 978-3-662-49384-7
Editore: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-49384-7_8

AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves (si apre in una nuova finestra)

Autori: Nico Weichbrodt, Anil Kurmus, Peter Pietzuch, Rüdiger Kapitza
Pubblicato in: Computer Security – ESORICS 2016, 2016, Pagina/e 440-457, ISBN 978-3-319-45744-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-45744-4_22

Searchable Encryption for Biometric Identification Revisited (si apre in una nuova finestra)

Autori: Ghassane Amchyaa, Julien Bringer, Roch Lescuyer
Pubblicato in: Data Privacy Management and Security Assurance, 2016, Pagina/e 113-129, ISBN 978-3-319-47072-6
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-47072-6_8

PerfectDedup: Secure Data Deduplication (si apre in una nuova finestra)

Autori: Pasquale Puzio, Refik Molva, Melek Önen, Sergio Loureiro
Pubblicato in: Data Privacy Management, and Security Assurance, 2016, Pagina/e 150-166, ISBN 978-3-319-29883-2
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-29883-2_10

Delegating Biometric Authentication with the Sumcheck Protocol (si apre in una nuova finestra)

Autori: Hervé Chabanne, Julien Keuffer, Roch Lescuyer
Pubblicato in: Information Security Theory and Practice, 2016, Pagina/e 236-244, ISBN 978-3-319-45931-8
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-45931-8_15

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud (si apre in una nuova finestra)

Autori: Julien Bringer, Beatriz Gallego, Ghassan Karame, Mathias Kohler, Panos Louridas, Melek Önen, Hubert Ritzdorf, Alessandro Sorniotti, David Vallejo
Pubblicato in: E-Democracy – Citizen Rights in the World of the New Computing Paradigms, 2015, Pagina/e 193-197, ISBN 978-3-319-27164-4
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-27164-4_14

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile

Il mio fascicolo 0 0