Skip to main content
Weiter zur Homepage der Europäischen Kommission (öffnet in neuem Fenster)
Deutsch Deutsch
CORDIS - Forschungsergebnisse der EU
CORDIS

Protecting Sensitive Data in the Computing Continuum

CORDIS bietet Links zu öffentlichen Ergebnissen und Veröffentlichungen von HORIZONT-Projekten.

Links zu Ergebnissen und Veröffentlichungen von RP7-Projekten sowie Links zu einigen Typen spezifischer Ergebnisse wie Datensätzen und Software werden dynamisch von OpenAIRE abgerufen.

Leistungen

Secure Data Container First Technical Report (öffnet in neuem Fenster)

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review.

Secure Data Container Final Technical Report (öffnet in neuem Fenster)

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final project review

Initial FogProtect Handbook (öffnet in neuem Fenster)

First release of the project’s Handbook including the project’s methodology and relevant information to ensure the outcomes adoption by innovators.

Final FogProtect Handbook (öffnet in neuem Fenster)

Final release of the projects Handbook including all relevant outcomes that FogProtect partners have previously agreed to disclose

Initial High-Level Architecture (öffnet in neuem Fenster)

This report will describe the initial technical architecture of FogProtect, providing a blueprint for WP4-WP7.

Dynamic Risk Management Tools: Integrated Prototypes and Final Technical Report (öffnet in neuem Fenster)

This report will summarize the work done in the work package over the second reporting period The results of the work package for this period will be demonstrated in the final review This will include threat diagnosis using a combination of machine learning and knowledgebased machine reasoning techniques to achieve fast diagnosis and recommendations for managing risks through adaptation

Impact Maximization Plan (öffnet in neuem Fenster)

This report includes a detailed dissemination, communication and exploitation plan addressing how the results will be disseminated among targeted communities of interest, how awareness around the project vision will be raised and how exploitation activities will be addressed during the project to ensure its results sustainability. It will include a detailed calendar of activities for the whole project duration and monitoring and assessment strategy.

Final Impact Report (öffnet in neuem Fenster)

Final release of all impact activities and results achieved Besides all communication and dissemination activities it will include all partners complete plans to exploit allinnovations developed in the project and a sustainability strategy targeting open source communities

State of the Art Analysis and Initial Validation Plan (öffnet in neuem Fenster)

This report will document the relevant requirements that the FogProtect solutions will have to satisfy. It will also include an initial validation plan to document the assessment of the integration of the data protection concepts and mechanisms developed by WP4 thru WP7 in trials.

Dynamic Risk Management Tools: First Prototypes and Technical Report (öffnet in neuem Fenster)

This report will summarize the work done in the work package over the first reporting period. The results of the work package for this period will be demonstrated in the first review. This will include separate tools for risk assessment using knowledge based machine reasoning or machine learning approaches, along with mathematical models for combining the approaches, but not at this stage, a combined implementation.

Validation Results of the 2nd Iteration (öffnet in neuem Fenster)

This report will document the validation results of the final implementation phase of the use cases

Intermediate Validation Results of the 2nd Iteration (öffnet in neuem Fenster)

This report will document the intermediate status of the validation results of the 2nd implementation phase of the use cases at M27

Initial Data Protection Policy Management Framework (öffnet in neuem Fenster)

This report will describe a framework that formalizes and manages data protection policies as well as an initial solution for end to end data protection orchestration and enforcement.

Concept for Service Management and Adaptation (öffnet in neuem Fenster)

This report will document the FogProtect approach to data-protection-aware service management and adaptation, including adaptations on application and infrastructure levels.

Validation Results of the 1st Iteration (öffnet in neuem Fenster)

This report will document the validation results of the 1st implementation phase of the use cases.

Project Handbook (öffnet in neuem Fenster)

This deliverable will gather the project common general procedures, including also the quality assurance and risk management plan to guarantee a successful project implementation.

Final Data Protection Policy Management Framework (öffnet in neuem Fenster)

This report will describe a final version of the end to end data protection policy and orchestration and an enforcement solution for novel fog components and constrained environments

Integrated Approach for Service Management and Adaptation (öffnet in neuem Fenster)

This report will document the finalized FogProtect approach to dataprotectionaware service management and adaptation in which adaptations on application and infrastructure levels are integrated to optimally balance data protection withperformance cost and energy consumption goals

First High-Level Architecture (öffnet in neuem Fenster)

This report will describe the overall composition of the FogProtect components of the first release at a functional level, and the interactions between the components, including the conceptual description of their APIs.

First Impact Report and Plan Update (öffnet in neuem Fenster)

This report compiles all dissemination and communication activities during the reporting period including also the results of the monitoring and assessment strategy. Any update in strategy and planned activities will also be provided as appropriate. An early map of the cloud and fog computing ecosystem and business modelling considerations will be provided together with early adopters, revenue streams, income model, key distribution channels, approach to open source communities and the most efficient route for research and business development.

Final High-Level Architecture (öffnet in neuem Fenster)

This report will describe the final overall composition of the FogProtect components at a functional level and the interactions between the components including the conceptual description of their APIs

Integration of the 1st Release (öffnet in neuem Fenster)

Provide the implemented tested and integrated FogProtect solution suite in its 1st release

Integration of the 2nd Release (öffnet in neuem Fenster)

Provide the implemented, tested, and integrated FogProtect solution suite in its 2nd (final) release

Data Management Plan (öffnet in neuem Fenster)

This report provides the data management policies and strategies to be adopted by FogProtect during the course of the project.

Veröffentlichungen

Simulation-based analysis of threats to location privacy in fog computing (öffnet in neuem Fenster)

Autoren: Theresa Wettig, Zoltan Adam Mann
Veröffentlicht in: 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), 2021, Seite(n) 736-741, ISBN 978-1-6654-0424-2
Herausgeber: IEEE
DOI: 10.1109/percomworkshops51409.2021.9431073

A Privacy Preserving System for AI-assisted Video Analytics (öffnet in neuem Fenster)

Autoren: Clemens Lachner, Thomas Rausch, Schahram Dustdar
Veröffentlicht in: 2021 IEEE 5th International Conference on Fog and Edge Computing (ICFEC), 2021, Seite(n) 74-78, ISBN 978-1-6654-0291-0
Herausgeber: IEEE
DOI: 10.1109/icfec51620.2021.00018

Comparison of simulators for fog computing (öffnet in neuem Fenster)

Autoren: Christian Kunde, Zoltán Ádám Mann
Veröffentlicht in: Proceedings of the 35th Annual ACM Symposium on Applied Computing, 2020, Seite(n) 1792-1795, ISBN 9781450368667
Herausgeber: ACM
DOI: 10.1145/3341105.3375771

FogProtect: Protecting Sensitive Data in the Computing Continuum (öffnet in neuem Fenster)

Autoren: Dhouha Ayed, Eva Jaho, Clemens Lachner, Zoltán Ádám Mann, Robert Seidl, Mike Surridge
Veröffentlicht in: Advances in Service-Oriented and Cloud Computing - International Workshops of ESOCC 2020, Heraklion, Crete, Greece, September 28–30, 2020, Revised Selected Papers, Ausgabe 1360, 2021, Seite(n) 179-184, ISBN 978-3-030-71905-0
Herausgeber: Springer International Publishing
DOI: 10.1007/978-3-030-71906-7_17

DECA: A Dynamic Energy Cost and Carbon Emission-Efficient Application Placement Method for Edge Clouds (öffnet in neuem Fenster)

Autoren: Ehsan Ahvar, Shohreh Ahvar, Zoltan Adam Mann, Noel Crespi, Roch Glitho, Joaquin Garcia-Alfaro
Veröffentlicht in: IEEE Access, Ausgabe 9, 2021, Seite(n) 70192-70213, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3075973

RADAR: Data Protection in Cloud-Based Computer Systems at Run Time (öffnet in neuem Fenster)

Autoren: Zoltan Adam Mann, Florian Kunz, Jan Laufer, Julian Bellendorf, Andreas Metzger, Klaus Pohl
Veröffentlicht in: IEEE Access, Ausgabe 9, 2021, Seite(n) 70816-70842, ISSN 2169-3536
Herausgeber: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3078059

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor

Mein Booklet 0 0