Skip to main content

A Holistic Data Privacy and Security by Design Platform-as-a-Service Framework Introducing Distributed Encrypted Persistence in Cloud-based Applications

Deliverables

Context-aware Security Model

This Deliverable will provide a model for semantically describing associations between types of access depending on the data objects and circumstances under which this access should be allowed.

Communication Activities Report

Report documenting the communication activities of the project partners with interim versions Month M12 and M24.

Publishable Final Report

Publishable version of the final report on the achievements of the project.

PaaSword Technical Requirements

Documentation of the clear and basic technical requirements that will guide the development of the IT components of PaaSword.

Scientific Workshops Report

Report documenting the PaaSword scientific workshops activities with interim versions Month M14, M22.

PaaSword Security Requirements

Documentation of the clear and basic security requirements that will guide the definition of the capabilities of the IT components and the conceptualization of the context-aware access and group policy models of PaaSword.

PaaSword Methodology

Results of Task 6.8. This deliverable will document the methodology for the deployment of the PaaSword results in new and existing software solutions in the form of adoption guidelines for practitioners from the European software industry.

Dissemination Activities Report

Report documenting the dissemination, clustering and standardization activities as well as the CS-IFG related activities of the project partners and updates of the Data Management Plan with interim versions Month M12 and M24.

Access Policies Model

This Deliverable will ontologically describe access control policies for defining sensitivity levels of data objects along with the necessary encryption and/or physical distribution that these dictate. This model will also take into account group access issues in a unified way.

Evaluation Framework and Demonstrators Planning

Results of Task 6.1. This document will contain the PaaSword evaluation framework, the validation scenario definitions and the organization of the pilot showcases, highlighting the PaaSword concepts that will be evaluated and included in each one of the involved pilot implementations.

PaaSword Reference Architecture

Documentation of the overall architecture describing the main components and artifacts of PaaSword, the interconnection scheme and the specific interfaces for exchange of information among them will be designed and described in detail.

Data Management Plan

Report documenting how research data will be handled during the project and after its completion.

PaaSword Impact Assessment

Results of Task 6.9. Report on the qualitative and quantitative impact assessment of the project's activities.

Distribution Algorithms and Encryption Schemes

Results of Task 4.1 – 4.3. This document lists all the distribution and encryption algorithms. The algorithms are rated for their ability to satisfy security needs like privacy, integrity and availability. The result is a document with the architecture, algorithms and the explanation of design choices. Finally, the architecture is presented and it is shown how the algorithms are used in the database proxy.

Searching for OpenAIRE data...

Publications

Sicherer mobiler Zugriff auf Unternehmensdaten

Author(s): Gunther Schiefer
Published in: 2015, Page(s) 336

Architektur eines relationalen Datenbanksystems zur verschlüsselten und verteilten Datenspeicherung in der Cloud

Author(s): Maximilian Brunner
Published in: Issue 31 March 2015, 2015, Page(s) 36

Enhancing Privacy and Functionality in a Distributed Secure Database Outsourcing Scheme

Author(s): Kateryna Yurchenko
Published in: 2016

The BXT-Bitmap - An Efficient Searchable Symmetric Encryption Scheme

Author(s): Malin Lindström and Christian Nordahl
Published in: 2016

Kontext-sensitive Berechtigungen für Cloud-Plattformen zur Erhöhung der Datensicherheit

Author(s): Schork, Sebastian
Published in: 2016

Integration sicherer Datenspeicher in Cloud-Plattformen

Author(s): Jens Gierke
Published in: 2016

Daten verschlüsselt speichern und verarbeiten in der Cloud

Author(s): Jörn Müller-Quade, Matthias Huber, Tobias Nilges
Published in: Datenschutz und Datensicherheit - DuD, Issue Volume 39, Issue 8, 2015, Page(s) pp 531–535, ISSN 1614-0702
DOI: 10.1007/s11623-015-0465-x

A Report on Design and Implementation of Protected Searchable Data in IaaS

Author(s): Rafael Dowsley, Antonis Michalas, Matthias Nagel
Published in: Technical Report, 2016

Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market

Author(s): Aljosa Pasic, Beatriz Gallego, Bernd Zwattendorfer, Bojan Suzic, Elsa Prieto, Erkuden Rios, Josep Domingo-Ferrer, Julia Vuong, Massimiliano Rak, Nicholas Ferguson, Nuria Rodríguez, Peter H. Deussen, Pierangela Samarati, Roberto Cascella, Sabrina de Capitani, Simone Braun, Stephan Krenn, Stephanie Parker, Thomas Länger, Thomas Lorünser, Zhiming Zhao
Published in: Issue 28 January 2016, 2016

Research and Innovation Challenges in Data Protection, Security and Privacy in the Cloud: Map of synergies of the clustered projects – Version 2.0

Author(s): Beatriz Gallego-Nicasio Crespo, Elsa Prieto, Erkuden Rios, Massimiliano Rak, Peter Deussen, Pierangela Samarati, Roberto Cascella, Simone Braun, Stephan Krenn, Thomas Lörunser
Published in: Issue 15 January 2016, 2016

Towards Trusted eHealth Services in the Cloud

Author(s): Antonis Michalas, Rafael Dowsley
Published in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Page(s) 618-623

Context-aware Security Models for PaaS-enabled Access Control

Author(s): Simeon Veloudis, Yiannis Verginadis, Ioannis Patiniotakis, Iraklis Paraskakis, Gregoris Mentzas
Published in: Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Page(s) 202-212
DOI: 10.5220/0005918602020212

A Survey on Context Security Policies

Author(s): Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Published in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Issue December 7-10, 2015, 2015, Page(s) 589 - 594
DOI: 10.1109/UCC.2015.103

Towards Secure Multi-tenant Virtualized Networks

Author(s): Nicolae Paladi, Christian Gehrmann
Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, Issue The 13th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2015, Page(s) 1180-1185
DOI: 10.1109/Trustcom.2015.502

Towards Secure SDN Policy Management

Author(s): Nicolae Paladi
Published in: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), 2015, Page(s) 607 - 611
DOI: 10.1109/UCC.2015.106

Data Distribution and Encryption Modelling for PaaS-enabled Cloud Security

Author(s): Yiannis Verginadis, Ioannis Patiniotakis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis
Published in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Page(s) 497-502
DOI: 10.1109/CloudCom.2016.0087

Searchable Encrypted Relational Databases: Risks and Countermeasures

Author(s): Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann
Published in: 2017, Page(s) 70-85
DOI: 10.1007/978-3-319-67816-0_5

Performance and Security Evaluation of SDN Networks in OMNeT++/INET

Author(s): Marco Tiloca, Alexandra Stagkopoulou, Gianluca Dini
Published in: OMNeT++ Community Summit 2016, 2016

IoT Protection through Device to Cloud Synchronization

Author(s): Christian Gehrmann, Mohamed Ahmed Abdelraheem
Published in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Page(s) 527-532
DOI: 10.1109/CloudCom.2016.0092

TruSDN: Bootstrapping Trust in Cloud Network Infrastructure

Author(s): Nicolae Paladi, Christian Gehrmann
Published in: 2017, Page(s) 104-124
DOI: 10.1007/978-3-319-59608-2_6

Executing Boolean Queries on an Encrypted Bitmap Index

Author(s): Mohamed Ahmed Abdelraheem, Christian Gehrmann, Malin Lindström, Christian Nordahl
Published in: Proceedings of the 2016 ACM on Cloud Computing Security Workshop - CCSW '16, 2016, Page(s) 11-22
DOI: 10.1145/2996429.2996436

Application of the holistic Data Privacy and Security Framework PaaSword - A focus on the integration in industrial Pilots

Author(s): Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-10
DOI: 10.1145/3098954.3104060

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Author(s): Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Published in: Proceedings of the 5th International Conference on Cloud Computing and Services Science, 2015, Page(s) 206-213
DOI: 10.5220/0005489302060213

Security in a Distributed Key Management Approach

Author(s): Gunther Schiefer, Matthias Gabel, Jeremias Mechler, Andreas Schoknecht, Murat Citak
Published in: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Page(s) 816-821
DOI: 10.1109/CBMS.2017.151

A Distributed Key Management Approach

Author(s): Rafael Dowsley, Matthias Gabel, Gerald Hubsch, Gunther Schiefer, Antonia Schwichtenberg
Published in: 2016 IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2016, Page(s) 509-514
DOI: 10.1109/CloudCom.2016.0089

Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution

Author(s): Matthias Gabel, Jeremias Mechler
Published in: 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), 2017, Page(s) 799-804
DOI: 10.1109/CBMS.2017.141

Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Solutions

Author(s): Julia Vuong, Simone Braun
Published in: 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15), 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), Issue 10 December 2015, 2015, Page(s) 612 - 617
DOI: 10.1109/UCC.2015.107

ASArP: Automated Security Assessment & Audit of Remote Platforms using TCG-SCAP synergies

Author(s): Mudassar Aslam, Christian Gehrmann, Mats Björkman
Published in: Journal of Information Security and Applications, Issue 22, 2015, Page(s) 28-39, ISSN 2214-2126
DOI: 10.1016/j.jisa.2014.09.001

Providing User Security Guarantees in Public Infrastructure Clouds

Author(s): Nicolae Paladi, Christian Gehrmann, Antonis Michalas
Published in: IEEE Transactions on Cloud Computing, Issue 5/3, 2017, Page(s) 405-419, ISSN 2168-7161
DOI: 10.1109/TCC.2016.2525991

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services

Author(s): Yiannis Verginadis, Antonis Michalas, Panagiotis Gouvas, Gunther Schiefer, Gerald Hübsch, Iraklis Paraskakis
Published in: Journal of Grid Computing, Issue 15/2, 2017, Page(s) 219-234, ISSN 1570-7873
DOI: 10.1007/s10723-017-9394-2

Security-by-Design in der Cloud-Anwendungsentwicklung

Author(s): Andreas Schoknecht, Gunther Schiefer, Murat Citak, Andreas Oberweis
Published in: HMD Praxis der Wirtschaftsinformatik, Issue 53/5, 2016, Page(s) 688-697, ISSN 1436-3011
DOI: 10.1365/s40702-016-0258-1