- Start date: 01/11/2013
- End date: 30/10/2016
- Duration (months): 36
- Total budget: € 10.500.000
- Lab Budget: € 278.400
- Number of partners: 18
- Partners: Technikon Forschungs und Planungsgesellschaft mbH, SAP AG, Technische Universitaet Darmstadt, Alexandra Instituttet A/S, Arcelik A.S., Bar Ilan University, Cybernetica AS, Julius-Maximilians Universitaet Wuerzburg, Intel GMBH, Katholieke Universiteit Leuven, INESC Porto – INstituto de Engenharia de Sistemas e Computadores do Porto, Aarhus Universitet, Technische Universiteit Eindhoven, University of Bristol, DTA – Distretto Tecnologico Aerospaziale, Università degli Studi di Milano, Partisia, Georg-August-Universitaet Goettingen Körperschaft des oeffentlichen Rechts.
Information processed by businesses, government organizations and individuals often comes with confidentiality and integrity requirements that the processing party must adhere to.
Cloud services promise great benefits in terms of financial savings, easy and convenient access to data and services, as well as business agility. Organizations and individuals outsource their data to the cloud, where an untrusted party is in charge of storage and computation. A major concern for the adoption of cloud computing is the inability of the cloud to build user trust in the information security measures deployed in cloud services. Common computing techniques cannot be applied on encrypted data, and therefore the data and the applications that compute on the data must be decrypted before being run in the cloud infrastructure.
A comprehensive solution for securing the cloud computing infrastructure can be based on cryptographic mechanisms of secure computation. These mechanisms support computation on encrypted data. Several settings need secure computation.
PRACTICE will address all of these settings:
- Hiding user data from other users of the same cloud service.
- Hiding user data from the cloud provider.
- Securing computation between several servers.
- Securing computation between untrusting parties.
- Provide modern and novel technologies for secure computation on encrypted data, allowing the data owners to fully utilize the economies of scale provided by cloud computing while protecting their data from cloud provider insider attacks.
- Create a secure cloud framework allowing for the realisation of advanced but practical cryptographic technologies that are integrated in virtualised environments to provide efficient and sophisticated security and privacy guarantees for users and providers of cloud-based services while reducing trust in the cloud provider to the utmost extent.
- Develop models and techniques to quantify the return on investment for security investment for the deployment of secure computation algorithms. The model will allow for computing the risk landscape associated with outsourcing data and computation, and simulate different scenarios where both the investment in security and the required security level associated with the data can be changed.
- Evaluate the legal aspects related to the outsourcing of data and of computation to the cloud beyond national and European boundaries, and establish guidelines.
In this scenario, the fleet management service provider has to optimize the service on a number of customers that compete each other, aligning the customer needs (identified by the engine work status) to the internal on going and planned activities and to the status of the spare parts inventory.
The research activities has flown as follow:
- Design of the process of fleet management and analysis of security requirements,
- Identification of functional and security requirements for a cloud planning system targeted at the whole supply chain,
- Identification of a methodology for measuring the sensitivity of data involved in the optimized plan computation,
- Measuring the sensitivity through a survey of the industrial staff,
- Identification of a pilot case,
- Preparation of assessment framework to evaluate the business impact of the PRACTICE prototype,
- Execution of the pilot case by leveraging industrial data,
- Evaluation of the quality of the results.
For more information please contact: Antonio Zilli (email@example.com)