CASTOR | Continuum of Trust: Increased Path Agility and Trustworthy Device and Service Provisioning

Summary
Ever since the cloud-centric service provision started becoming incapable for efficiently supporting the emerging end-user needs, compute functionality has been shifted from the cloud, closer to the edge, or delegated to the user equipment at the far-edge. The resources and computing capabilities residing at those locations have been lately considered to collectively make-up a ‘compute continuum’, albeit its unproven assurance to securely accommodate end-to-end information sharing. The continuum-deployed workloads generate traffic that steers through untrusted HW and SW infrastructure (domains) of continuously changing trust-states. CASTOR develops and evaluates technologies to enable trustworthy continuum-wide communications. It departs from the processing of user-expressed high-level requirements for a continuum service, which are turned-to combinations of security needs and network resource requirements, referred to as CASTOR policies. The policies are subsequently enforced on the continuum HW and SW infrastructure to realise an optimised, trusted communication path delivering innovation-breakthroughs to the so-far unsatisfied need: a) for distributed (composable) attestation of the continuum nodes and subsequent elevation of individual outcomes to an adaptive (to changes) continuum trust quantification; b) for the derivation of the optimal path as a joint computation of the continuum trust properties and resources; c) for continuum infrastructure vendor-agnostic trusted path establishment, seamlessly crossing different administrative domains. The CASTOR will be evaluated in operational environments of 4 use-cases whereby varying types of security/safety-critical information is shared. Project innovations will be exhaustively assessed in 3 diverse application domains utilising the carefully-designed CASTOR testbed core for each case. Our results will provide experimental evidence for the CASTOR's efficiency and feed the incomplete trust-relevant (IETF) standards.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: https://cordis.europa.eu/project/id/101167904
Start date: 01-10-2024
End date: 30-09-2027
Total budget - Public funding: 6 835 705,00 Euro - 5 203 611,00 Euro
Cordis data

Original description

Ever since the cloud-centric service provision started becoming incapable for efficiently supporting the emerging end-user needs, compute functionality has been shifted from the cloud, closer to the edge, or delegated to the user equipment at the far-edge. The resources and computing capabilities residing at those locations have been lately considered to collectively make-up a ‘compute continuum’, albeit its unproven assurance to securely accommodate end-to-end information sharing. The continuum-deployed workloads generate traffic that steers through untrusted HW and SW infrastructure (domains) of continuously changing trust-states. CASTOR develops and evaluates technologies to enable trustworthy continuum-wide communications. It departs from the processing of user-expressed high-level requirements for a continuum service, which are turned-to combinations of security needs and network resource requirements, referred to as CASTOR policies. The policies are subsequently enforced on the continuum HW and SW infrastructure to realise an optimised, trusted communication path delivering innovation-breakthroughs to the so-far unsatisfied need: a) for distributed (composable) attestation of the continuum nodes and subsequent elevation of individual outcomes to an adaptive (to changes) continuum trust quantification; b) for the derivation of the optimal path as a joint computation of the continuum trust properties and resources; c) for continuum infrastructure vendor-agnostic trusted path establishment, seamlessly crossing different administrative domains. The CASTOR will be evaluated in operational environments of 4 use-cases whereby varying types of security/safety-critical information is shared. Project innovations will be exhaustively assessed in 3 diverse application domains utilising the carefully-designed CASTOR testbed core for each case. Our results will provide experimental evidence for the CASTOR's efficiency and feed the incomplete trust-relevant (IETF) standards.

Status

SIGNED

Call topic

HORIZON-CL3-2023-CS-01-01

Update Date

29-09-2024
Images
No images available.
Geographical location(s)
Structured mapping
Unfold all
/
Fold all
Horizon Europe
HORIZON.2 Global Challenges and European Industrial Competitiveness
HORIZON.2.3 Civil Security for Society
HORIZON.2.3.3 Cybersecurity
HORIZON-CL3-2023-CS-01
HORIZON-CL3-2023-CS-01-01 Secure Computing Continuum (IoT, Edge, Cloud, Dataspaces)