Objective
KONFIDO advances the state of the art of eHealth technology with respect to four key dimensions of digital security, namely: data preservation, data access and modification, data exchange, and interoperability and compliance. To address the challenges of secure storage and exchange of eHealth data, protection and control over personal data, and security of health related data gathered by mobile devices, KONFIDO takes a holistic approach – i.e. one targeting all the architectural layers of an IT infrastructure, and specifically: storage, dissemination, processing, and presentation. KONFIDO builds on and extends the results of a best of breed selection of successful projects, notably: epSOS, STORK, DECIPHER, EXPAND, and ANTILOPE. The approach will be implemented in a technological framework that relies on six technology pillars: 1) security extensions provided by main CPU vendors; 2) security solutions based on photonic technologies; 3) homomorphic encryption mechanisms; 4) customised STORK-compliant eID support; 5) customized extensions of selected SIEM solutions; and 6) disruptive logging and auditing mechanisms. The usability of the proposed solutions will be tested in a realistic setup, deployed on top of a federated cloud infrastructure, where data will be exchanged and services interoperate cross-border. Experimental evidence will be collected, proving that KONFIDO solutions provide effective protection even against attacks by privileged software (e.g. the Operating System or the Hypervisor) or privileged users (e.g. the System Administrator or the Cloud Provider). Since i) it builds on results that were already widely accepted, and ii) it relies on a handful of complementary technologies (some of which are already at a high level of maturity), KONFIDO has a dramatic potential in terms of innovation in the field of coordinated care towards improved quality of healthcare solutions.
Fields of science
- medical and health scienceshealth scienceshealth care serviceseHealth
- natural sciencescomputer and information sciencessoftwaresoftware applicationssystem softwareoperating systems
- engineering and technologyelectrical engineering, electronic engineering, information engineeringelectronic engineeringcomputer hardwarecomputer processors
- natural sciencescomputer and information sciencescomputer securitycryptography
- natural sciencescomputer and information sciencesdata sciencedata exchange
Programme(s)
Funding Scheme
RIA - Research and Innovation actionCoordinator
E14 3BS London
United Kingdom
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
Participants (15)
57001 Thermi Thessaloniki
See on map
00185 Roma
See on map
75015 PARIS 15
See on map
1000 Bruxelles / Brussel
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
15342 Ag Paraskeyi
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
20124 Milano
See on map
08290 Cerdanyola Del Valles (Barcelona)
See on map
5230 Odense M
See on map
SW7 2AZ LONDON
See on map
80125 NAPOLI
See on map
The organization defined itself as SME (small and medium-sized enterprise) at the time the Grant Agreement was signed.
80122 NAPOLI
See on map
2100 Kobenhavn
See on map
08005 Barcelona
See on map
08036 Barcelona
See on map
Legal entity other than a subcontractor which is affiliated or legally linked to a participant. The entity carries out work under the conditions laid down in the Grant Agreement, supplies goods or provides services for the action, but did not sign the Grant Agreement. A third party abides by the rules applicable to its related participant under the Grant Agreement with regard to eligibility of costs and control of expenditure.
08036 Barcelona
See on map