WITDOM | empoWering prIvacy and securiTy in non-trusteD envirOnMents

Summary
The advent of the Future Internet prompts fundamental transformations in whole ICT ecosystems, while bringing new opportunities to stakeholders in the availability and rational use of physical resources with large-scale savings in IT investments. It will also pose new security challenges especially for ensuring robust protection of privacy and integrity of personal information, which are a fundamental part of the societal acceptance of new ICT schemes, services and solutions. The consolidation of highly complex Cloud computing paradigms materializes the long-held dream of computing as an on-demand automatically managed utility, but at the same time it calls for the materialisation of technologies to enable tangible levels of trustworthiness and end-to-end security in the new ICT platforms and architectures.
While currently there are solid bases for homomorphic cryptography and secure processing of data, research in WITDOM will go further, aiming at truly efficient and practical privacy enhancing techniques and efficient signal and data processing in the encrypted domain, and develop a holistic security-by-design framework for quantitative evaluation of end-to-end security and privacy, aiming at guaranteing efficient and verifiable provision of privacy in the context of ICT services owned by third-party providers of distributed processing and storage, thereby maximizing independence from stated security and privacy commitments by respective providers. Focusing on specific added-value scenarios, we will deliver automatic and efficient privacy provisioning solutions, which will cover varying needs of privacy for data that must be handled by non-trusted third parties, providing a greater malleability by dynamic adaptation to user needs and privacy preferences.
In summary, privacy is preserved by keeping data confidential (encrypted and privacy-protected) in the un-trusted environment, while the data owner can operate with and make use of the data in the encrypted domain.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/644371
Start date: 01-01-2015
End date: 31-12-2017
Total budget - Public funding: 4 020 281,25 Euro - 2 764 031,00 Euro
Cordis data

Original description

The advent of the Future Internet prompts fundamental transformations in whole ICT ecosystems, while bringing new opportunities to stakeholders in the availability and rational use of physical resources with large-scale savings in IT investments. It will also pose new security challenges especially for ensuring robust protection of privacy and integrity of personal information, which are a fundamental part of the societal acceptance of new ICT schemes, services and solutions. The consolidation of highly complex Cloud computing paradigms materializes the long-held dream of computing as an on-demand automatically managed utility, but at the same time it calls for the materialisation of technologies to enable tangible levels of trustworthiness and end-to-end security in the new ICT platforms and architectures.
While currently there are solid bases for homomorphic cryptography and secure processing of data, research in WITDOM will go further, aiming at truly efficient and practical privacy enhancing techniques and efficient signal and data processing in the encrypted domain, and develop a holistic security-by-design framework for quantitative evaluation of end-to-end security and privacy, aiming at guaranteing efficient and verifiable provision of privacy in the context of ICT services owned by third-party providers of distributed processing and storage, thereby maximizing independence from stated security and privacy commitments by respective providers. Focusing on specific added-value scenarios, we will deliver automatic and efficient privacy provisioning solutions, which will cover varying needs of privacy for data that must be handled by non-trusted third parties, providing a greater malleability by dynamic adaptation to user needs and privacy preferences.
In summary, privacy is preserved by keeping data confidential (encrypted and privacy-protected) in the un-trusted environment, while the data owner can operate with and make use of the data in the encrypted domain.

Status

CLOSED

Call topic

ICT-32-2014

Update Date

26-10-2022
Images
No images available.
Geographical location(s)
Structured mapping
Unfold all
/
Fold all
Horizon 2020
H2020-EU.2. INDUSTRIAL LEADERSHIP
H2020-EU.2.1. INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies
H2020-EU.2.1.1. INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)
H2020-EU.2.1.1.0. INDUSTRIAL LEADERSHIP - ICT - Cross-cutting calls
H2020-ICT-2014-1
ICT-32-2014 Cybersecurity, Trustworthy ICT