Explore the words cloud of the TREDISEC project. It provides you a very rough idea of what is the project "TREDISEC" about.
The following table provides information about the project.
ATOS SPAIN SA
|Coordinator Country||Spain [ES]|
|Total cost||6˙470˙618 €|
|EC max contribution||4˙412˙063 € (68%)|
1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
|Duration (year-month-day)||from 2015-04-01 to 2018-03-31|
Take a look of project's partnership.
|1||ATOS SPAIN SA||ES (MADRID)||coordinator||860˙895.00|
|3||SAP SE||DE (WALLDORF)||participant||598˙750.00|
|4||IDEMIA IDENTITY & SECURITY FRANCE||FR (COURBEVOIE)||participant||526˙413.00|
|5||NEC LABORATORIES EUROPE GMBH||DE (HEIDELBERG)||participant||496˙717.00|
|6||NATIONAL INFRASTRUCTURES FOR RESEARCH AND TECHNNOLOGY||EL (ATHINA)||participant||472˙250.00|
|7||ARSYS INTERNET S.L.||ES (LOGROÑO)||participant||379˙156.00|
|8||NEC EUROPE LTD||UK (LONDON)||participant||370˙283.00|
|9||EIDGENOESSISCHE TECHNISCHE HOCHSCHULE ZUERICH||CH (ZUERICH)||participant||0.00|
|10||IBM RESEARCH GMBH||CH (RUESCHLIKON)||participant||0.00|
'The current trend for data placement shows a steady shift towards 'the cloud'. The advent of cloud storage and computation services however comes at the expense of data security and user privacy. To remedy this, customers nowadays call for end-to-end security whereby only end-users and authorized parties have access to their data and no-one else. This is especially true after the outbreak of data breaches and global surveillance programs last year. In the TREDISEC project, we address this problem and we develop systems and techniques which make the cloud a secure and efficient heaven to store data. We plan to step away from a myriad of disconnected security protocols or cryptographic algorithms, and to converge on a single framework where all objectives are met. More specifically, TREDISEC addresses the confidentiality and integrity of outsourced data in the presence of a powerful attacker who controls the entire network. In addition, our proposed security primitives support data compression and data deduplication, while providing the necessary means for cloud providers to efficiently search and process encrypted data. By doing so, TREDISEC aims at creating technology that will impact existing businesses and will generate new profitable business opportunities long after the project is concluded. '
|A Proposal for Resource Isolation in Multi-Tenant Storage Systems||Documents, reports||2019-05-31 11:50:43|
|Complete Design and Evaluation of Verifiability mechanisms||Documents, reports||2019-05-31 11:50:58|
|TREDISEC framework implementation||Demonstrators, pilots, prototypes||2019-05-31 11:50:51|
|A Proposal for Data Confidentiality and Deduplication||Documents, reports||2019-05-31 11:50:55|
|Implementation of Provisioning, Outsourcing and Processing Frameworks||Other||2019-05-31 11:50:58|
|Final Innovation management report||Documents, reports||2019-05-31 11:50:54|
|Final Evaluation report||Documents, reports||2019-05-31 11:50:51|
|Exploitation report and long term sustainability strategy||Documents, reports||2019-05-31 11:50:51|
|Evaluation criteria||Documents, reports||2019-05-30 12:20:49|
|TREDISEC architecture and initial framework design||Other||2019-05-30 12:20:55|
|Specification and Preliminary Design of Verifiability mechanisms||Documents, reports||2019-05-30 12:20:49|
|Design of Provisioning Framework||Documents, reports||2019-05-30 12:20:38|
|A Proposal for Access Control Models for Multi-tenancy||Documents, reports||2019-05-30 12:20:45|
|Innovation Strategy and Plan||Documents, reports||2019-05-30 12:20:54|
|A Proposal on Secure Enforcement of Policies in the Cloud||Documents, reports||2019-05-30 12:20:42|
|Final architecture and design of the TREDISEC framework||Other||2019-05-30 12:20:45|
|Requirements analysis and consolidation||Documents, reports||2019-05-30 12:20:51|
|Requirements and trade-off between verifiability and data reduction||Documents, reports||2019-05-30 12:20:44|
|Communication strategy and plan||Documents, reports||2019-01-10 15:25:22|
|Innovation management report||Documents, reports||2019-01-10 15:25:22|
|Project Quality Assurance Plan||Documents, reports||2019-01-10 15:25:22|
|TREDISEC public website||Websites, patent fillings, videos etc.||2019-01-10 15:25:22|
|Optimization of outsourcing activities and initial design of privacy preserving data processing primitives||Documents, reports||2019-01-10 15:25:22|
|Dissemination plan||Documents, reports||2019-01-10 15:25:22|
Take a look to the deliverables list in detail: detailed list of TREDISEC deliverables.
|year||authors and title||journal||last update|
Beatriz Gallego-Nicasio Crespo, Melek Ã–nen, Ghassan Karame
Towards Realizing a Truly Secure and Trustworthy Cloud
published pages: , ISSN: 0926-4981, DOI:
Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun
Towards Shared Ownership in the Cloud
published pages: 1-1, ISSN: 1556-6013, DOI: 10.1109/TIFS.2018.2837648
|IEEE Transactions on Information Forensics and Security||2019-05-30|
Reza Reyhanitabar, Serge Vaudenay, Damian VizÃ¡r
Authenticated Encryption with Variable Stretch
published pages: 396-425, ISSN: , DOI: 10.1007/978-3-662-53887-6_15
|SIACRYPT 2016: Advances in Cryptology â€“ ASIACRYPT 2016||2019-05-30|
ClÃ©mentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy
published pages: 485-505, ISSN: , DOI: 10.1007/978-3-319-72359-4_29
Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun
Securing Cloud Data under Key Exposure
published pages: 1-1, ISSN: 2168-7161, DOI: 10.1109/TCC.2017.2670559
|IEEE Transactions on Cloud Computing||2019-05-30|
HervÃ© Chabanne, Julien Keuffer, Roch Lescuyer
A verifiable system for automated face identification
published pages: , ISSN: , DOI:
HervÃ© Chabanne, Rodolphe Hugel, Julien Keuffer
Verifiable Document Redacting
published pages: 334-351, ISSN: , DOI: 10.1007/978-3-319-66402-6_20
CÃ©dric Van Rompay, Refik Molva, Melek Ã–nen
A Leakage-Abuse Attack Against Multi-User Searchable Encryption
published pages: , ISSN: 2299-0984, DOI: 10.1515/popets-2017-0034
|Proceedings on Privacy Enhancing Technologies 2017/3||2019-05-30|
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "TREDISEC" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (email@example.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "TREDISEC" are provided by the European Opendata Portal: CORDIS opendata.