Coordinatore | Centro Regionale Information Communication Technology scrl
Organization address
address: via Roma 29 contact info |
Nazionalità Coordinatore | Italy [IT] |
Totale costo | 3˙320˙286 € |
EC contributo | 2˙400˙000 € |
Programma | FP7-ICT
Specific Programme "Cooperation": Information and communication technologies |
Code Call | FP7-ICT-2013-10 |
Funding Scheme | CP |
Anno di inizio | 2013 |
Periodo (anno-mese-giorno) | 2013-11-01 - 2016-04-30 |
# | ||||
---|---|---|---|---|
1 |
Centro Regionale Information Communication Technology scrl
Organization address
address: via Roma 29 contact info |
IT (Aversa) | coordinator | 0.00 |
2 |
CLOUD SECURITY ALLIANCE (EUROPE) LBG
Organization address
address: MELVILLE STREET 34 contact info |
UK (EDINBURGH) | participant | 0.00 |
3 |
EMC INFORMATION SYSTEMS INTERNATIONAL
Organization address
address: IDA INDUSTRIAL SITE Ovens contact info |
IE (OVENS) | participant | 0.00 |
4 |
INSTITUTUL E-AUSTRIA TIMISOARA
Organization address
address: BD. VASILE PARVAN 4-6 contact info |
RO (TIMISOARA) | participant | 0.00 |
5 |
TECHNISCHE UNIVERSITAET DARMSTADT
Organization address
address: Karolinenplatz 5 contact info |
DE (DARMSTADT) | participant | 0.00 |
6 |
XLAB RAZVOJ PROGRAMSKE OPREME IN SVETOVANJE DOO
Organization address
address: Pot za Brdom 100 contact info |
SI (LJUBLJANA) | participant | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
The Cloud offers attractive options to migrate corporate applications without the corporate security manager needing to manage or secure any physical resources. While this 'ease' is appealing, several security issue arise:n* Can the validity of corporate legal compliance regulations still be ensured over remote data storage?n* With security sensitive data residing remotely with the Cloud Service Provider (CSP), can access of unauthorized CSP personnel to your data be restricted?n* How does one assess a CSP's ability to meet the corporate security requirements and the security trades-offs offered by different CSPs?n* Can one monitor and enforce the agreed Cloud security levels with the CSP?nNo comprehensive and easily usable solutions exist for these issues.nSPECS solves this problem, offering:n* Mechanisms to specify Cloud security requirements and assess the standalone and comparative security features offered by CSPs.n* Ability to integrate desired corporate security services (eg. credential and access management) into Cloud services.n* Systematic approaches to negotiate, monitor and enforce the security parameters specified in Service Level Agreements (SLA).n* Approaches to develop and deploy security services that are 'Cloud SLA-aware', implemented as an open-source Platform-as-a-Service (PaaS).nnProviding such comprehensible and enforceable security assurance by CSP's is a critical factor to deploy trustworthy Cloud ecosystems. Targeting ICT-2013.1.5 'Trustworthy ICT', SPECS will develop and implement an open source framework to offer Security-as-a-Service, by relying on the notion of security parameters specified in Service Level Agreements (SLA) and providing the techniques to systematically manage their life-cycle.nnThe SPECS framework addresses both CSP's and users to provide techniques and tools for:na) Enabling user-centric negotiation of security parameters in Cloud SLA, along with a trade-off evaluation process among users and CSPs, in order to compose Cloud services fulfilling a minimum required security level.nb) Monitoring in real-time the fulfillment of SLAs agreed with CSPs, notifying both users and CSPs, when a SLAs not being fulfilled.nc) Enforcing agreed SLA in order to keep a sustained Quality of Security (QoSec) that fulfills the specified security parameters. SPECS' enforcement framework will also 'react and adapt' in real-time to fluctuations in the QoSec by advising/applying the requisite countermeasures.nThe proposed framework will be based on an open-source core, and offer simple interfaces to motivate its adoption. It will offer a set of reusable PaaS components for service developers to enable them to integrate SPECS' SLA-oriented security mechanisms into existing Cloud services.nUsing real case studies SPECS will demonstrate that the contributed framework and architecture can be integrated 'as-a-Service' into real life Cloud environments, with a particular emphasis on small/medium/federated CSP and end users.