Skip to main content
European Commission logo print header

Protecting Sensitive Data in the Computing Continuum

Deliverables

Secure Data Container First Technical Report

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review.

Secure Data Container Final Technical Report

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final project review

Initial FogProtect Handbook

First release of the project’s Handbook including the project’s methodology and relevant information to ensure the outcomes adoption by innovators.

Final FogProtect Handbook

Final release of the projects Handbook including all relevant outcomes that FogProtect partners have previously agreed to disclose

Initial High-Level Architecture

This report will describe the initial technical architecture of FogProtect, providing a blueprint for WP4-WP7.

Dynamic Risk Management Tools: Integrated Prototypes and Final Technical Report

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final review This will include threat diagnosis using a combination of machine learning and knowledgebased machine reasoning techniques to achieve fast diagnosis and recommendations for managing risks through adaptation

Impact Maximization Plan

This report includes a detailed dissemination, communication and exploitation plan addressing how the results will be disseminated among targeted communities of interest, how awareness around the project vision will be raised and how exploitation activities will be addressed during the project to ensure its results sustainability. It will include a detailed calendar of activities for the whole project duration and monitoring and assessment strategy.

Final Impact Report

Final release of all impact activities and results achieved Besides all communication and dissemination activities it will include all partners complete plans to exploit allinnovations developed in the project and a sustainability strategy targeting open source communities

State of the Art Analysis and Initial Validation Plan

This report will document the relevant requirements that the FogProtect solutions will have to satisfy. It will also include an initial validation plan to document the assessment of the integration of the data protection concepts and mechanisms developed by WP4 thru WP7 in trials.

Dynamic Risk Management Tools: First Prototypes and Technical Report

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review. This will include separate tools for risk assessment using knowledge based machine reasoning or machine learning approaches, along with mathematical models for combining the approaches, but not at this stage, a combined implementation.

Validation Results of the 2nd Iteration

This report will document the validation results of the final implementation phase of the use cases

Intermediate Validation Results of the 2nd Iteration

This report will document the intermediate status of the validation results of the 2nd implementation phase of the use cases at M27

Initial Data Protection Policy Management Framework

This report will describe a framework that formalizes and manages data protection policies as well as an initial solution for end to end data protection orchestration and enforcement.

Concept for Service Management and Adaptation

This report will document the FogProtect approach to data-protection-aware service management and adaptation, including adaptations on application and infrastructure levels.

Validation Results of the 1st Iteration

This report will document the validation results of the 1st implementation phase of the use cases.

Project Handbook

This deliverable will gather the project common general procedures, including also the quality assurance and risk management plan to guarantee a successful project implementation.

Final Data Protection Policy Management Framework

This report will describe a final version of the end to end data protection policy and orchestration and an enforcement solution for novel fog components and constrained environments

Integrated Approach for Service Management and Adaptation

This report will document the finalized FogProtect approach to dataprotectionaware service management and adaptation in which adaptations on application and infrastructure levels are integrated to optimally balance data protection withperformance cost and energy consumption goals

First High-Level Architecture

This report will describe the overall composition of the FogProtect components of the first release at a functional level, and the interactions between the components, including the conceptual description of their APIs.

First Impact Report and Plan Update

This report compiles all dissemination and communication activities during the reporting period including also the results of the monitoring and assessment strategy. Any update in strategy and planned activities will also be provided as appropriate. An early map of the cloud and fog computing ecosystem and business modelling considerations will be provided together with early adopters, revenue streams, income model, key distribution channels, approach to open source communities and the most efficient route for research and business development.

Final High-Level Architecture

This report will describe the final overall composition of the FogProtect components at a functional level and the interactions between the components including the conceptual description of their APIs

Integration of the 1st Release

Provide the implemented tested and integrated FogProtect solution suite in its 1st release

Data Management Plan

This report provides the data management policies and strategies to be adopted by FogProtect during the course of the project.

Publications

Simulation-based analysis of threats to location privacy in fog computing

Author(s): Theresa Wettig, Zoltan Adam Mann
Published in: 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, Page(s) 736-741, ISBN 978-1-6654-0424-2
Publisher: IEEE
DOI: 10.1109/percomworkshops51409.2021.9431073

A Privacy Preserving System for AI-assisted Video Analytics

Author(s): Clemens Lachner, Thomas Rausch, Schahram Dustdar
Published in: 2021 IEEE 5th International Conference on Fog and Edge Computing (ICFEC), 2021, Page(s) 74-78, ISBN 978-1-6654-0291-0
Publisher: IEEE
DOI: 10.1109/icfec51620.2021.00018

Comparison of simulators for fog computing

Author(s): Christian Kunde, Zoltán Ádám Mann
Published in: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Page(s) 1792-1795, ISBN 9781450368667
Publisher: ACM
DOI: 10.1145/3341105.3375771

FogProtect: Protecting Sensitive Data in the Computing Continuum

Author(s): Dhouha Ayed, Eva Jaho, Clemens Lachner, Zoltán Ádám Mann, Robert Seidl, Mike Surridge
Published in: Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020, Heraklion, Crete, Greece, September 28–30, 2020, Revised Selected Papers, Issue 1360, 2021, Page(s) 179-184, ISBN 978-3-030-71905-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-71906-7_17

DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds

Author(s): Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Roch Glitho, Joaquin Garcia-Alfaro
Published in: IEEE Access, Issue 9, 2021, Page(s) 70192-70213, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3075973

RADAR: Data Protection in Cloud-Based Computer Systems at Run Time

Author(s): Zoltan Adam Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, Klaus Pohl
Published in: IEEE Access, Issue 9, 2021, Page(s) 70816-70842, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3078059

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available