Opendata, web and dolomites

RESTASSURED SIGNED

Secure Data Processing in the Cloud

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 RESTASSURED project word cloud

Explore the words cloud of the RESTASSURED project. It provides you a very rough idea of what is the project "RESTASSURED" about.

restassured    services    decentralized    risk    lifecy    sgx    assure    pillars    encryption    computing    movement    outside    solutions    runtime    stimulate    sensitive    secure    whilst    prevention    prediction    evolve    adults    performance    demonstrated    privacy    business    security    assuring    seamless    enterprises    regulations    automated    detection    nature    directive    policies    cloud    decryption    sufficient    commercial    drive    single    imposed    combining    successor    geo    citizen    digital    mechanisms    federated    care    restrictions    protection    enablement    provides    directed    vulnerable    conformance    mean    self    sticky    assurance    social    adoption    architectures    usefulness    pay    violations    protected    regulation    innovation    stakeholders    free    models    insurance    cle    providers    stakeholder    applicability    dynamically    market    location    time    run    personal    homomorphic    combination    data    hardware    longer    dynamic   

Project "RESTASSURED" data sheet

The following table provides information about the project.

Coordinator
IBM ISRAEL - SCIENCE AND TECHNOLOGY LTD 

Organization address
address: 94 DERECH EM-HAMOSHAVOT
city: PETACH TIKVA
postcode: 49527
website: www.haifa.il.ibm.com

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Israel [IL]
 Project website https://restassuredh2020.eu/
 Total cost 4˙996˙298 €
 EC max contribution 4˙996˙297 € (100%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-ICT-2016-1
 Funding Scheme RIA
 Starting year 2017
 Duration (year-month-day) from 2017-01-01   to  2019-12-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    IBM ISRAEL - SCIENCE AND TECHNOLOGY LTD IL (PETACH TIKVA) coordinator 1˙296˙500.00
2    ADAPTANT SOLUTIONS AG DE (DEISENHOFEN) participant 1˙080˙000.00
3    UNIVERSITY OF SOUTHAMPTON UK (SOUTHAMPTON) participant 736˙852.00
4    UNIVERSITAET DUISBURG-ESSEN DE (ESSEN) participant 647˙687.00
5    OXFORD COMPUTER CONSULTANTS LIMITED UK (OXFORD) participant 610˙020.00
6    THALES SIX GTS FRANCE SAS FR (GENNEVILLIERS) participant 375˙742.00
7    THALES SERVICES SAS FR (VELIZY VILLACOUBLAY) participant 249˙496.00

Map

 Project objective

Secure cloud computing is key for business success and end-user adoption of federated and decentralized cloud services and thus essential to stimulate the growth of the European Digital Single Market. RestAssured will provide solutions to specific technical concerns of data protection in the cloud (such as geo-location restrictions on personal data), which are imposed by the dynamic, multi-stakeholder and decentralized nature of federated cloud systems. These concerns mean that privacy and security by design approaches will no longer be sufficient, due to uncertainty at design time of how the cloud and privacy requirements may dynamically evolve and change at run time. To this end, RestAssured provides novel mechanisms and cloud architectures for the runtime detection, prediction and prevention of data protection violations.

RestAssured will assure the protection of sensitive business and citizen data in the cloud by combining four pillars of innovation: (1) combination of fully homomorphic encryption to process data without decryption with cloud enablement of SGX hardware for protected data processing, (2) sticky policies for decentralized data lifecy-cle management, (3) models@runtime for data protection assurance, and (4) automated risk management for run-time data protection. The applicability and usefulness of the RestAssured solutions will be demonstrated through three use cases driven by project partners and involving other stakeholders from outside the consortium; High Performance Computing for commercial enterprises; Pay As You Drive usage based insurance; and self-directed Social care for vulnerable adults and social care providers. The main impact of RestAssured will be to enable the free and seamless movement of data within the EU, whilst assuring conformance to data protection regulations, such as the EU Data Protection Directive and its successor the General Data Protection Regulation.

 Deliverables

List of deliverables.
Initial High Level Architecture Documents, reports 2019-07-18 20:46:04
First High Level Architecture & Methodology Documents, reports 2019-07-18 20:46:04
Final Validation Plan Documents, reports 2019-07-18 20:46:05
First RestAssured Handbook Documents, reports 2019-07-18 20:46:05
First Validation Plan Documents, reports 2019-07-18 20:46:04
First Impact and Innovation Management Summary Report Documents, reports 2019-07-18 20:46:04
Concept for End-User Privacy Policy Violation Detection Documents, reports 2019-07-18 20:46:04
Impact Plan Documents, reports 2019-07-18 20:46:04
Project Management and Quality Assurance Handbook Documents, reports 2019-07-18 20:46:04
RestAssured Security and Privacy Engineering Methodology Documents, reports 2019-07-18 20:46:04
First Validation Results Documents, reports 2019-07-18 20:46:04
Methodology for Decentralized Data Lifecycle Management Documents, reports 2019-07-18 20:46:04

Take a look to the deliverables list in detail:  detailed list of RESTASSURED deliverables.

 Publications

year authors and title journal last update
List of publications.
2018 Zoltán Ádám Mann
Data protection in fog computing through monitoring and adaptation
published pages: , ISSN: , DOI:
KuVS-Fachgespräch Fog Computing 2018 2020-01-28
2019 Julian Bellendorf, Zoltán Ádám Mann
Specification of cloud topologies and orchestration using TOSCA: a survey
published pages: , ISSN: 0010-485X, DOI: 10.1007/s00607-019-00750-3
Computing 2020-01-28
2019 Zoltán Ádám Mann, Andreas Metzger, Klaus Pohl
Situativer Datenschutz im Fog-Computing
published pages: 236-243, ISSN: 0170-6012, DOI: 10.1007/s00287-019-01190-1
Informatik Spektrum 42/4 2020-01-28
2018 Zoltán Ádám Mann Andreas Metzger Stefan Schoenen
Towards a run-time model for data protection in the cloud
published pages: , ISSN: , DOI:
Modellierung 2018 2019-07-18
2018 Zoltán Ádám Mann Andreas Metzger
The special case of data protection and self-adaptation
published pages: , ISSN: , DOI:
IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2018) 2019-07-18
2018 Zoltan Adam Mann
Resource Optimization Across the Cloud Stack
published pages: 169-182, ISSN: 1045-9219, DOI: 10.1109/TPDS.2017.2744627
IEEE Transactions on Parallel and Distributed Systems 29/1 2019-07-18
2018 Stefan Schoenen Zoltán Ádám Mann Andreas Metzger
Using risk patterns to identify violations of data protection policies in cloud systems
published pages: , ISSN: , DOI:
13th International Workshop on Engineering Service-Oriented Applications and Cloud Services (WESOACS 2017) 2019-07-18
2017 Zoltán Ádám Mann, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, Paul Mundt
Secure Data Processing in the Cloud
published pages: 149-153, ISSN: , DOI: 10.1007/978-3-319-79090-9_10
Advances in Service-Oriented and Cloud Computing - Workshops of ESOCC 2017 2019-07-18
2018 Zoltán Ádám Mann
Cloud simulators in the implementation and evaluation of virtual machine placement algorithms
published pages: , ISSN: 0038-0644, DOI: 10.1002/spe.2579
Software: Practice and Experience 2019-07-18
2017 Zoltán Ádám Mann
Two are better than one: An algorithm portfolio approach to cloud resource management
published pages: 93-108, ISSN: , DOI: 10.1007/978-3-319-67262-5_8
Proceedings of the 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017) 2019-07-18
2018 Palm, Alexander; Mann, Zoltán Ádám; Metzger, Andreas
Modeling Data Protection Vulnerabilities of Cloud Systems using Risk Patterns
published pages: 1-19, ISSN: , DOI: 10.5281/zenodo.1324125
10th International Conference on System Analysis and Modeling Languages, Methods, and Tools for Systems Engineering (SAM 2018) 2018 2019-07-18

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "RESTASSURED" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "RESTASSURED" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

5E (2019)

Federating European Electronics Ecosystems for Competitive Electronics Industries

Read More  

SODALITE (2019)

SOftware Defined AppLication Infrastructures managemenT and Engineering

Read More  

HiPEAC (2019)

High Performance Embedded Architecture and Compilation

Read More