Opendata, web and dolomites

RESTASSURED SIGNED

Secure Data Processing in the Cloud

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 RESTASSURED project word cloud

Explore the words cloud of the RESTASSURED project. It provides you a very rough idea of what is the project "RESTASSURED" about.

assure    evolve    vulnerable    successor    regulation    outside    security    directive    geo    solutions    sufficient    protected    personal    longer    hardware    automated    run    pay    business    free    enterprises    sgx    mechanisms    restrictions    whilst    cloud    stakeholders    applicability    pillars    commercial    cle    prevention    single    combining    citizen    providers    care    models    federated    restassured    policies    stakeholder    performance    encryption    social    adults    enablement    usefulness    drive    risk    assurance    dynamically    assuring    mean    regulations    insurance    seamless    movement    decentralized    data    detection    violations    time    location    prediction    dynamic    sensitive    architectures    protection    lifecy    digital    market    homomorphic    conformance    directed    computing    stimulate    provides    imposed    combination    adoption    secure    sticky    privacy    services    decryption    self    demonstrated    nature    runtime    innovation   

Project "RESTASSURED" data sheet

The following table provides information about the project.

Coordinator
IBM ISRAEL - SCIENCE AND TECHNOLOGY LTD 

Organization address
address: 94 DERECH EM-HAMOSHAVOT
city: PETACH TIKVA
postcode: 49527
website: www.haifa.il.ibm.com

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Israel [IL]
 Project website https://restassuredh2020.eu/
 Total cost 4˙996˙298 €
 EC max contribution 4˙996˙297 € (100%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-ICT-2016-1
 Funding Scheme RIA
 Starting year 2017
 Duration (year-month-day) from 2017-01-01   to  2019-12-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    IBM ISRAEL - SCIENCE AND TECHNOLOGY LTD IL (PETACH TIKVA) coordinator 1˙296˙500.00
2    ADAPTANT SOLUTIONS AG DE (DEISENHOFEN) participant 1˙080˙000.00
3    UNIVERSITY OF SOUTHAMPTON UK (SOUTHAMPTON) participant 736˙852.00
4    UNIVERSITAET DUISBURG-ESSEN DE (ESSEN) participant 647˙687.00
5    OXFORD COMPUTER CONSULTANTS LIMITED UK (OXFORD) participant 610˙020.00
6    THALES SIX GTS FRANCE SAS FR (GENNEVILLIERS) participant 375˙742.00
7    THALES SERVICES SAS FR (VELIZY VILLACOUBLAY) participant 249˙496.00

Map

 Project objective

Secure cloud computing is key for business success and end-user adoption of federated and decentralized cloud services and thus essential to stimulate the growth of the European Digital Single Market. RestAssured will provide solutions to specific technical concerns of data protection in the cloud (such as geo-location restrictions on personal data), which are imposed by the dynamic, multi-stakeholder and decentralized nature of federated cloud systems. These concerns mean that privacy and security by design approaches will no longer be sufficient, due to uncertainty at design time of how the cloud and privacy requirements may dynamically evolve and change at run time. To this end, RestAssured provides novel mechanisms and cloud architectures for the runtime detection, prediction and prevention of data protection violations.

RestAssured will assure the protection of sensitive business and citizen data in the cloud by combining four pillars of innovation: (1) combination of fully homomorphic encryption to process data without decryption with cloud enablement of SGX hardware for protected data processing, (2) sticky policies for decentralized data lifecy-cle management, (3) models@runtime for data protection assurance, and (4) automated risk management for run-time data protection. The applicability and usefulness of the RestAssured solutions will be demonstrated through three use cases driven by project partners and involving other stakeholders from outside the consortium; High Performance Computing for commercial enterprises; Pay As You Drive usage based insurance; and self-directed Social care for vulnerable adults and social care providers. The main impact of RestAssured will be to enable the free and seamless movement of data within the EU, whilst assuring conformance to data protection regulations, such as the EU Data Protection Directive and its successor the General Data Protection Regulation.

 Deliverables

List of deliverables.
Initial High Level Architecture Documents, reports 2019-07-18 20:46:04
First High Level Architecture & Methodology Documents, reports 2019-07-18 20:46:04
Final Validation Plan Documents, reports 2019-07-18 20:46:05
First RestAssured Handbook Documents, reports 2019-07-18 20:46:05
First Validation Plan Documents, reports 2019-07-18 20:46:04
First Impact and Innovation Management Summary Report Documents, reports 2019-07-18 20:46:04
Concept for End-User Privacy Policy Violation Detection Documents, reports 2019-07-18 20:46:04
Impact Plan Documents, reports 2019-07-18 20:46:04
Project Management and Quality Assurance Handbook Documents, reports 2019-07-18 20:46:04
RestAssured Security and Privacy Engineering Methodology Documents, reports 2019-07-18 20:46:04
First Validation Results Documents, reports 2019-07-18 20:46:04
Methodology for Decentralized Data Lifecycle Management Documents, reports 2019-07-18 20:46:04

Take a look to the deliverables list in detail:  detailed list of RESTASSURED deliverables.

 Publications

year authors and title journal last update
List of publications.
2018 Zoltán Ádám Mann
Data protection in fog computing through monitoring and adaptation
published pages: , ISSN: , DOI:
KuVS-Fachgespräch Fog Computing 2018 2020-01-28
2019 Julian Bellendorf, Zoltán Ádám Mann
Specification of cloud topologies and orchestration using TOSCA: a survey
published pages: , ISSN: 0010-485X, DOI: 10.1007/s00607-019-00750-3
Computing 2020-01-28
2019 Zoltán Ádám Mann, Andreas Metzger, Klaus Pohl
Situativer Datenschutz im Fog-Computing
published pages: 236-243, ISSN: 0170-6012, DOI: 10.1007/s00287-019-01190-1
Informatik Spektrum 42/4 2020-01-28
2018 Zoltán Ádám Mann Andreas Metzger Stefan Schoenen
Towards a run-time model for data protection in the cloud
published pages: , ISSN: , DOI:
Modellierung 2018 2019-07-18
2018 Zoltán Ádám Mann Andreas Metzger
The special case of data protection and self-adaptation
published pages: , ISSN: , DOI:
IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS 2018) 2019-07-18
2018 Zoltan Adam Mann
Resource Optimization Across the Cloud Stack
published pages: 169-182, ISSN: 1045-9219, DOI: 10.1109/TPDS.2017.2744627
IEEE Transactions on Parallel and Distributed Systems 29/1 2019-07-18
2018 Stefan Schoenen Zoltán Ádám Mann Andreas Metzger
Using risk patterns to identify violations of data protection policies in cloud systems
published pages: , ISSN: , DOI:
13th International Workshop on Engineering Service-Oriented Applications and Cloud Services (WESOACS 2017) 2019-07-18
2017 Zoltán Ádám Mann, Eliot Salant, Mike Surridge, Dhouha Ayed, John Boyle, Maritta Heisel, Andreas Metzger, Paul Mundt
Secure Data Processing in the Cloud
published pages: 149-153, ISSN: , DOI: 10.1007/978-3-319-79090-9_10
Advances in Service-Oriented and Cloud Computing - Workshops of ESOCC 2017 2019-07-18
2018 Zoltán Ádám Mann
Cloud simulators in the implementation and evaluation of virtual machine placement algorithms
published pages: , ISSN: 0038-0644, DOI: 10.1002/spe.2579
Software: Practice and Experience 2019-07-18
2017 Zoltán Ádám Mann
Two are better than one: An algorithm portfolio approach to cloud resource management
published pages: 93-108, ISSN: , DOI: 10.1007/978-3-319-67262-5_8
Proceedings of the 6th European Conference on Service-Oriented and Cloud Computing (ESOCC 2017) 2019-07-18
2018 Palm, Alexander; Mann, Zoltán Ádám; Metzger, Andreas
Modeling Data Protection Vulnerabilities of Cloud Systems using Risk Patterns
published pages: 1-19, ISSN: , DOI: 10.5281/zenodo.1324125
10th International Conference on System Analysis and Modeling Languages, Methods, and Tools for Systems Engineering (SAM 2018) 2018 2019-07-18

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "RESTASSURED" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "RESTASSURED" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

ACCORDION (2020)

Adaptive edge/cloud compute and network continuum over a heterogeneous sparse edge infrastructure to support nextgen applications

Read More  

XEUROPE (2020)

X-Europe

Read More  

NGI FORWARD (2019)

NGI FORWARD

Read More