Skip to main content

Online Privacy Enforcement, Rights Assurance and Optimization

Deliverables

CS Release Candidate

Software components that will implement the privacy extensions to a complete and testable set of functions and all the findings from the MVP trial validation.

Final (MVP) version of business driven tools

This deliverable will contain the second version of the business driven tools.

Release candidate PA I/F and User Management

This software release is a complete implementation of all components according to specifications. Fully integrated, usable platform. This (agile) version will be used to continue end-user trials and generate case studies until the end of the project.

Final (Product) version of business driven tools

This deliverable will contain the final version of the business driven tools.

Healthcare trial results-update

This deliverable will update D8.7 with the final results of the healthcare trials .

Source Code for research innovations

This deliverable will provide the source code implementing all the research findings of WP4.

Initial (Prototype) version of privacy enhanced tools

This deliverable will include the design and implementation of the first version of the privacy enhanced mechanisms and tools to be included in the PA platform, that will perform the enforcement of the privacy protection of the users’ personal data controlled by the OPERANDO system, including data collection, processing and storage. The software released will be accompanied with a technical design document.

Final release PA Interfaces and User Management

This software release is a full Solution: working, tested, and validated product. Implementation of all field trial feedbacks. Complete fix of all known bugs.

Final (MVP) version of security aware tools

This deliverable will contain the second version of the security enhanced mechanisms and tools to be included in the PA platform. The focus on this stage is the usage of the component features by the users.

Final (Product) version of security aware tools

This deliverable will contain the final version of the security enhanced mechanisms and tools to be included in the PA platform.

Initial (Prototype) version of business driven tools

This deliverable will specify and implement the first version of the methods and tools that enable PSPs to control, monitor and measure the use of the online services executed in the PA. Some main aspects that will be considered being in a cloud-based approach that deals with high volume of data are load balancing, monitoring, scalability, resource usage, and multi-tenancy. Furthermore, aspects for a privacy-for-benefit negotiation service in order to support negotiated access to magnetisable personal data under user consent will be dealt with in this deliverable

CS Final product

Software components that will implement the findings and feedback from the end users and OSP based on Release Candidate

CS Beta Release

Software components that will implement a complete set of UAA on all targeted user devices, according to the specifications. A privacy extensions component (library) will be developed with a core set of functions to enable the highest level of reputation for applications that use it

Final (MVP) version of privacy enhanced tools

This deliverable will contain the second version of the privacy enhanced mechanisms and tools to be included in the PA platform. The focus on this stage is the usage of the component features by the users.

Public administration trial results

This deliverable will describe the results of the performed public administration trials and the lessons learned.

Initial (Prototype) version of security aware tools

This deliverable will include the design and implementation of the first version of the security enhanced mechanisms and tools to be included in the PA platform.

Final (Product) version of privacy enhanced tools

This deliverable will contain the final version of the privacy enhanced mechanisms and tools to be included in the PA platform.

Healthcare trial results

This deliverable will describe the results of the performed healthcare trials and the lessons learned.

CS MVP (Minimal Valuable Product)

Software components that will enhance the core functions of UPG and UAM to the defined MVP functions. The basic UPP (User Privacy Policies) will be developed as a subset of the UAA will be developed accompanied by the necessary interface functions with UAM.

Public administration trial results-update

This deliverable will update D8.7 with the final results of the public administration trials.

Use cases of OSP end users

Documentation of envisaged applications of the platform by the participating OSPs and their end users.

Model PSP Business Plan

A reference business plan document to be used by prospective PSPs, allowing them to prepare their actual business plan and simulate business outcomes, in order to reach a decision to enter the PSP business.

Project & Quality Management Manual

This manual defines the processes by which the project will be run and the quality of its deliverables assured. The manual states plans for communication within the consortium and includes risk management processes. It identifies industry standard project management tools to assure the quality of deliverables including templates, guidelines and standards for the elaboration of deliverables as well as workflow for their assessment.

Initial dissemination and communication package

It will include: project corporate image with logo, letterhead, and guidelines. Creation of the project/consortium website, official mail system and social network accounts (LinkedIn, Twitter, SlideShare, Youtube)

Final PA platform specification and guide

This is the final version of the integrated platform and accompanying guides and specifications

Trust Models Study Report

A report describing a variety of trust model concepts that are essential for the adoption of PSPs' service by consumers and OSPs.

RC PA platform specification and guide

This deliverable will focus on the integration of all components coming from tasks 6.1 - 6.3 that will result integrated Privacy Authority platform. This version will be the first version of the integrated platform. In addition to the software, the deliverable will include a specification document as well as a users' guide

Updated D2.1, D2.2, D2.3

Ongoing updates to the consumer- and OSP use cases and PSP Business Models.

Ethical trial protocols, scenarios and requirements

This deliverable will describe the design of the ethical trial protocols including the data management procedures. It will also include the technical requirements for supporting these protocols.

OSP Use Cases Document

Document summarizing a study of Data Protection and Privacy requirements imposed on the OSPs, either by themselves or by regulations; describing use cases and providing insights on services that will be offered to OSPs by PSPs.

Characterization of enabling technologies

This Deliverable will provide a theoretically and practically oriented overview of available privacy preserving and security-enabling techniques for the cloud that will constitute the base for the research of tasks 4.3 & 4.4.

CS final technical documentation and guide

Final version of the documents that will describe the detailed design and the implementation on source code level of each component accompanied by guides for the usage of these components

Security & Privacy for cloud data Innovations report

This report will document the novel methods in security, privacy and authentication of cloud services relevant to OPERANDO that allow users to selectively share access of their data and their authenticity.

Report of evaluation of competing technologies

Document outlining the competitive landscape of the market for OPERANDO platform, and comparative analysis with competing technologies and solutions.

Guidelines for data anonymization report

This report comprises a includes a profile of the data stored and processed by OPERANDO, a review of data anonymization techniques with their respective strengths and weaknesses, a description of novel algorithms for data anonymization and document sanitization as well as the cryptographic primitives and protocols and an identification of the distinctive approach of OPERANDO.

Initial PA platform specification

This deliverable will contain the first version of the specification of the methods, tools and services that complement and interact with each other in the OPERANDO cloud-based PA platform. As well as how the PA platform interoperates with other OPERANDO platform modules and other external stakeholders such as OSPs.

CS technical documentation and guide

Documents that will describe the detailed design and the implementation on source code level of each component accompanied by guides for the usage of these components

Innovations in data publication & mining report

This report will highlight the new techniques for privacy-aware data-mining, data publication, collaborative filtering and for document sanitization that will be developed for OPERANDO

PSP Business Models Study Report

Report of a study of various business models that can be used by PSPs, in respect to PSPs' target market, competitive landscape, and profitability goals.

Guidelines on legal aspects

This deliverable will analyse relevant ethical values and legal data protection principles for OPERANDO market segments.

Consumer Use Cases Document

Document summarizing a study of consumer online privacy needs, elaborating on typical use cases where privacy of consumers is insufficiently protected.

Specifications for Cloud Security & Privacy algorithms

This report will provide the requirements and specifications for the security, privacy methods that will be implemented in PDR.

Private Data Repository architecture Specifications

This Deliverable will define the platform requirements, identify the roles, attributes, behaviour, and interactions of the different entities. It will also define the functionality of the PDR components and the operations performed on data.

Updated D2.6, D2.7, D2.8

Ongoing updates to the requirements and specifications documents.

Dissemination and open source report Y3

Report describing the activities done by the consortium about dissemination and open source strategy in the third year

Dissemination and open source report Y2

Report describing the activities done by the consortium about dissemination and open source strategy in the second year

Dissemination, communication and collaboration plan

Paper summarizing the action of each member of the Consortium about the activities to do in order to maximize the dissemination., the involvement of stakeholders and the implementation of new collaborations

Open Source Strategy

Document summarizing the activity for engaging OSS communities. Identification of the potential OSS communities, engagement of these communities towards OPERANDO, and management of the open source repository.

Dissemination and open source report Y1

Report describing the activities done by the consortium about dissemination and open source strategy in the first year

Searching for OpenAIRE data...

Publications

Agile development and operation of complex systems in multi-technology and multi-company environments: Following a DevOps approach

Author(s): Gorka Benguria, Juncal Alonso, Iñaki Etxaniz, Leire Orue-Echevarria and Marisa Escalante
Published in: EuroAsiaSPI 2018, 2018

Towards a Model of User-centered Privacy Preservation

Author(s): Paul Grace, Mike Surridge
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-8
DOI: 10.1145/3098954.3104054

Identifying privacy risks in distributed data services: A model-driven approach

Author(s): Paul Grace, Daniel Burns, Geoffrey Neumann, Brian Pickering, Panagiotis Melas and Mike Surridge
Published in: 38th IEEE International Conference on Distributed Computing Systems, 2018

Knock-Knock: The Unbearable Lightness of Android Notifications

Author(s): Constantinos Patsakis, Efthimios Alepis
Published in: Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018, Page(s) 52-61
DOI: 10.5220/0006603200520061

Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: SPACE 2017: Security, Privacy, and Applied Cryptography Engineering pp 53-73, 2017, Page(s) 53-73
DOI: 10.1007/978-3-319-71501-8_4

Analysis of Privacy and Security Exposure in Mobile Dating Applications

Author(s): Constantinos Patsakis, Athanasios Zigomitros, Agusti Solanas
Published in: MSPN 2015 Selected Papers of the First International Conference on Mobile, Secure, and Programmable Networking, 2015, Page(s) 151-162
DOI: 10.1007/978-3-319-25744-0_13

There’s Wally! Location Tracking in Android without Permissions

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017, Page(s) 278-284
DOI: 10.5220/0006125502780284

Trapped by the UI: The Android Case

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: International Symposium on Research in Attacks, Intrusions, and Defenses RAID 2017: Research in Attacks, Intrusions, and Defenses, 2017, Page(s) 334-354
DOI: 10.1007/978-3-319-66332-6_15

AndroPatchApp: Taming Rogue Ads in Android

Author(s): Vasilis Tsiakos, Constantinos Patsakis
Published in: International Conference on Mobile, Secure, and Programmable Networking MSPN 2016, 2016, Page(s) 183-196
DOI: 10.1007/978-3-319-50463-6_15

Mapping the Wireless Coverage Grid for Carrier and User Recommendations through Crowdsourcing

Author(s): Efthimios Alepis, Aristea Kontogianni, Constantinos Patsakis
Published in: 2017 IEEE 29th International Conference on Tools with Artificial Intelligence (ICTAI), 2017, Page(s) 822-829
DOI: 10.1109/ictai.2017.00129

A practical k-anonymous recommender system



DOI: 10.1109/iisa.2016.7785379

The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage SpaCCS 2017, 2017, Page(s) 93-107
DOI: 10.1007/978-3-319-72389-1_9

Persistent vs Service IDs in Android: Session Fingerprinting from Apps

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: International Conference on Mobile Networks and Management MONAMI 2017, 2017, Page(s) 14-29
DOI: 10.1007/978-3-319-90775-8_2

Empowering Services based Software in the Digital Single Market to Foster an Ecosystem of Trusted, Interoperable and Legally Compliant Cloud-Services

Author(s): Juncal Alonso Ibarra, Leire Orue-Echevarria, Marisa Escalante, Gorka Benguria
Published in: Proceedings of the 6th International Conference on Cloud Computing and Services Science, 2016, Page(s) 283-288
DOI: 10.5220/0005893302830288

Levels of Privacy for eHealth Systems in the Cloud Era

Author(s): Sinica Alboaie, Lenuta Alboaie, Andrei Panu
Published in: 24th International Conference on Information Systems Development (ISD), 2015

I know what you streamed last night: On the security and privacy of streaming

Author(s): Alexios Nikas, Efthimios Alepis, Constantinos Patsakis
Published in: Digital Investigation, Issue 25, 2018, Page(s) 78-89, ISSN 1742-2876
DOI: 10.1016/j.diin.2018.03.004

Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

Author(s): Eugenia Politou, Efthimios Alepis, Constantinos Patsakis
Published in: Journal of Cybersecurity, 2018, ISSN 2057-2093

Monkey Says, Monkey Does: Security and Privacy on Voice Assistants

Author(s): Efthimios Alepis, Constantinos Patsakis
Published in: IEEE Access, Issue 5, 2017, Page(s) 17841-17851, ISSN 2169-3536
DOI: 10.1109/access.2017.2747626

The market's response toward privacy and mass surveillance: The Snowden aftermath


Published in: ISSN 0167-4048
DOI: 10.1016/j.cose.2017.11.002

Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice

Author(s): Achilleas Papageorgiou, Michael Strigkos, Eugenia Politou, Efthimios Alepis, Agusti Solanas, Constantinos Patsakis
Published in: IEEE Access, Issue 6, 2018, Page(s) 9390-9403, ISSN 2169-3536
DOI: 10.1109/access.2018.2799522

Lightweight private proximity testing for geospatial social networks

Author(s): Panayiotis Kotzanikolaou, Constantinos Patsakis, Emmanouil Magkos, Michalis Korakakis
Published in: Computer Communications, Issue 73, 2016, Page(s) 263-270, ISSN 0140-3664
DOI: 10.1016/j.comcom.2015.07.017

Broadcast anonymous routing (BAR): scalable real-time anonymous communication

Author(s): Panayiotis Kotzanikolaou, George Chatzisofroniou, Mike Burmester
Published in: International Journal of Information Security, 2016, ISSN 1615-5262
DOI: 10.1007/s10207-016-0318-0

Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption

Author(s): Constantinos Patsakis, Jeroen van Rest, Michał Choraś, Mélanie Bouroche
Published in: Data Privacy Management, and Security Assurance, 2016, Page(s) 169-182
DOI: 10.1007/978-3-319-29883-2_11

Private Proximity Testing on Steroids: An NTRU-based Protocol

Author(s): Constantinos Patsakis, Panayiotis Kotzanikolaou, Mélanie Bouroche
Published in: Security and Trust Management, 2015, Page(s) 172-184
DOI: 10.1007/978-3-319-24858-5_11