Opendata, web and dolomites

SecureCloud

Secure Big Data Processing in Untrusted Clouds

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "SecureCloud" data sheet

The following table provides information about the project.

Coordinator
TECHNISCHE UNIVERSITAET DRESDEN 

Organization address
address: HELMHOLTZSTRASSE 10
city: DRESDEN
postcode: 1069
website: http://www.tu-dresden.de/

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Germany [DE]
 Project website https://www.securecloudproject.eu/
 Total cost 2˙285˙377 €
 EC max contribution 1˙499˙627 € (66%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-EUB-2015
 Funding Scheme RIA
 Starting year 2016
 Duration (year-month-day) from 2016-01-01   to  2018-12-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    TECHNISCHE UNIVERSITAET DRESDEN DE (DRESDEN) coordinator 499˙624.00
2    IMPERIAL COLLEGE OF SCIENCE TECHNOLOGY AND MEDICINE UK (LONDON) participant 499˙252.00
3    SYNC LAB SRL IT (NAPOLI) participant 201˙250.00
4    CHOCOLATE CLOUD APS DK (AALBORG OST) participant 199˙500.00
5    THE ISRAEL ELECTRIC CORPORATION LIMITED IL (HAIFA) participant 100˙000.00
6    CLOUDSIGMA AG CH (ZURICH) participant 0.00
7    UNIVERSITE DE NEUCHATEL CH (NEUCHATEL) participant 0.00

Map

 Project objective

SecureCloud addresses the confidentiality, integrity and availability of applications executed in the cloud. Data at rest or in transit on the network is already nowadays protected by encryption. The main problem that we face is how to ensure the confidentiality of data while being processed. Our approach is based on upcoming hardware extensions of commodity CPUs like Intel's Secure Guard Extensions (SGX). By the help of these hardware extensions, we reduce the trusted computing base dramatically by excluding from it the millions of lines of source code of the cloud stack, operating systems and hypervisor. This permits us to ensure the confidentiality of computations even if the computers are under a different administrative control (like a cloud provider) or there is no physical security of the computers. Moreover, we ensure the confidentiality even if attackers would take control of the cloud stack, the hypervisor or the operating systems. As long as the hardware extensions of the CPU can be trusted, we can ensure the confidentiality of the computations. SecureCloud focuses on ensuring the confidential and dependable processing of Big Data. To keep the trusted computing base small, we use the concept of microservices: only the application logic that processes data (e.g., operators) is protected while all functionality that, e.g., shuffles and stores encrypted data is outside the trusted computing base. By monitoring the microservices, we can restart services that run on compromised hosts. We will evaluate and demonstrate our approach in the context of smart grids. In this use case context, we need to run across a physically distributed computing infrastructure with no or little physical security and partly untrusted administrators. We need to process large volumes of data and this big data processing would benefit by partial offloading into the cloud. In SecureCloud, we will show how to do this in a secure fashion even if clouds are untrusted.

 Deliverables

List of deliverables.
Description of dependability mechanism used by the micro-service framework Documents, reports 2020-02-25 15:50:47
Services for trust management for secure resources Other 2020-02-25 15:50:47
Requirements & architecture specification – final version Documents, reports 2020-02-25 15:50:48
Standardization activities Documents, reports 2020-02-25 15:50:48
Periodic project exploitation and use plan (2 versions) Documents, reports 2020-02-25 15:50:46
Demonstrator for strict-QoS application with realistic workloads running in a secure cloud Demonstrators, pilots, prototypes 2020-02-25 15:50:48
Description of programming model for new micro-services Documents, reports 2020-02-25 15:50:47
Monitoring and orchestration services for large, high-responsive applications Demonstrators, pilots, prototypes 2020-02-25 15:50:46
Cloud-native applications for billing, fraud detection, energy balance, energy delivering and fault detection Other 2020-02-25 15:50:48
Periodic research newsletter (3 versions) Documents, reports 2020-02-25 15:50:49
Integrated implementation of the micro-services for distributed big data applications Documents, reports 2020-02-25 15:50:47
Perdiodic dissemination and clustering activities report (3 versions) Documents, reports 2020-02-25 15:50:47
Specification and implementation of the micro-service framework and API Demonstrators, pilots, prototypes 2020-02-25 15:50:44
Requirements & architecture specification – intermediate version Documents, reports 2020-02-25 15:50:44
Data management plan Documents, reports 2020-02-25 15:50:44
Demonstrator for the end-to-end secure and privacy-friendly application for smart meter data Documents, reports 2020-02-25 15:50:43
Specification and implementation of reusable secure micro-services Demonstrators, pilots, prototypes 2020-02-25 15:50:44
Project web site Websites, patent fillings, videos etc. 2020-02-25 15:50:43
Specification and design of the micro-services for distributed big data applications Documents, reports 2020-02-25 15:50:43
Analysis of existing technologies Documents, reports 2020-02-25 15:50:44
First implementation of the micro-services for distributed big data applications Demonstrators, pilots, prototypes 2020-02-25 15:50:44
Requirements & architecture specification – initial version Documents, reports 2020-02-25 15:50:42
Preliminary implementation of the communication and storage mechanisms Demonstrators, pilots, prototypes 2020-02-25 15:50:43

Take a look to the deliverables list in detail:  detailed list of SecureCloud deliverables.

 Publications

year authors and title journal last update
List of publications.
2017 BOBERG, D. ; GOMES-JR, L. C. ; ROSA, M. O. ; FONSECA, K. V. O
Developing a secure SQL/key-value translation service
published pages: , ISSN: , DOI:
PROCEEDINGS OF THE WORKSHOP DE PESQUISA EM COMPUTAÇÃO DOS CAMPOS GERAIS - 2017 (WPCCG’2017) 2020-02-25
2017 Pierre-Louis Aublin, Florian Kelbert, Dan O’Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David Eyers, Peter Pietzuch
LibSEAL: Detecting Service Integrity Violations Using Trusted Execution
published pages: , ISSN: , DOI:
Proceedings of the Twelth European Conference on Computer Systems (EuroSys) 2020-02-25
2017 Pierre-Louis Aublin, Florian Kelbert, Dan O\'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David Eyers and Peter Pietzuch
TaLoS: Secure and Transparent TLS Termination inside SGX Enclaves
published pages: , ISSN: , DOI:
2020-02-25
2017 Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter Pietzuch, Emin Gun Sirer
Teechain: Scalable Blockchain Payments using Trusted Execution Environments
published pages: , ISSN: , DOI:
2020-02-25
2016 Christof Fetzer
Building Critical Applications Using Microservices
published pages: 86-89, ISSN: 1540-7993, DOI: 10.1109/msp.2016.129
IEEE Security & Privacy 14/6 2020-02-25
2018 Guilmour Rossi, Luiz Gomes-Jr, Marcelo Rosa, Keiko Fonseca
Privacy-preserving recommendations for Online Social Networks using Trusted Execution
published pages: 41-48, ISSN: , DOI:
Xviii Simpósio Brasileiro Em Segurança Da Informação E De Sistemas Computacionais 2020-02-25
2018 Ricardo de S. Costa, Daniel F. Pigatto, Keiko V. O. Fonseca, Marcelo de O. Rosa
Securing VoD Content with SGX: A Decryption Performance Evaluation in Client-Side
published pages: 127-140, ISSN: , DOI:
Anais do Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais (SBSeg) 2020-02-25

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SECURECLOUD" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "SECURECLOUD" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

EuConNeCts4 (2019)

European Conferences on Networks and Communications (EuCNC)

Read More  

NGIAtlantic.eu (2020)

A Collaborative platform for EU-US NGI experiments

Read More  

IMPACT EdTech (2019)

Incubating High-IMPACT New Generation EdTech Disruptors for Inclusive & Personalised Learning

Read More