Skip to main content
European Commission logo
English English
CORDIS - EU research results
CORDIS
CORDIS Web 30th anniversary CORDIS Web 30th anniversary

empoWering prIvacy and securiTy in non-trusteD envirOnMents

Deliverables

Final assessment of privacy framework and tools

A continuous validation process will be conducted thought the whole development process, providing the correction paths where needed. Results and analysis will be reported in this deliverable. Inputs will come from WP3, which sets the basis for the assessment methodology, and from WP4 and WP5. This is the final version of D2.3, and will collect both the refined procedures and the results and analysis of the validation cycle. Contributors: UVIGO (Editor), FCSR, IBM

Report of final Advisory Board Workshop

After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners

Preliminary standardisation Reports

This deliverable will describe the relevant standards, the on-going standardisation efforts, and their priority with respect to the project. Contributors: KU Leuven (Editor), UVIGO, IBM

WITDOM formalized technological requirements

As the tangible result of subtask 3.1.1, the first revision of this deliverable will present the formal definition of the technological security, privacy and verifiability requirements, taking into account the connection with user-centric requirements and European privacy and data protection legislation. It will also gather the identified limitations of technologies for verifiability and security and privacy protection of outsourced process, and initial approaches for tackling them. This revision at M12 will collect the first results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR

Definition of Validation framework and protocols

The final validation activities reported in D2.6 will be based on the validation framework defined within this deliverable. The validation framework will collect the relevant metrics, successful criteria, validation activities and protocols and tools used for validation to assess the requirements defined in D2.1, D2.2, D6.1 and D6.2 and formalized in D3.2. The aim of this deliverable is to align all the partners and prepare the ground for the implementation of the final validation activities focused of the developed platform and prototypes. Contributors: FCSR (Editor), UVIGO

Final specification of an end-to-end secure architecture

The final major data-management components, functional specification, architectural layers, information flows and implementation guidelines will be described and integrated into a coherent view of the system architecture. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, KU Leuven

WITDOM final report on Cryptographic and Privacy-preserving primitives

The final version of this deliverable will contain the research outcomes from Tasks 3.2 to 3.5 (WD3.3, WD 3.4, WD 3.5), including also the detailed description of the developed and adapted techniques, their applicability and a detailed quantitative evaluation in terms of efficiency and achieved security/privacy protection, both at the primitive level and end-to-end when integrated in a whole system within WITDOM evaluation framework. Contributors: UVIGO (Editor), KU Leuven, IBM

Legal validation and recommendations

This deliverable will contain a legal assessment of the general privacy enabling tools and technologies, as well as the specific e-Health and Financial Services scenarios that have been developed in the WITDOM project and will furthermore include draft recommendations on privacy enabling tools and technologies to ensure legally compliant systems. Contributor: KU Leuven (Editor), UVIGO, FCSR

Legal and Ethical framework and privacy and security principles

This deliverable will analyse the soon to be expected revised data protection package and the cybersecurity package on its implications for privacy enhancing technologies in untrusted environments, focusing specifically on the application of privacy and data protection principles, as well as ethical aspects. Editor & Contributor: KU Leuven

Final Scientific and Technical Validation of WITDOM prototypes

By using the validation framework and protocols defined in D2.4 the validation activities will be performed. This deliverable will provide a final result of quantitative and qualitative validation against the project prototypes. All partners that have contributed during the development will be called to assess the requirements of the respective component of the platform and use cases. Contributors: FCSR (Editor), All Partners

Functional analysis and use case identification

While D2.1 is focused on privacy and stakeholder requirements analysis and definition, D2.2 has its focus on the functional analysis and use case identification. Within this deliverable the main business logic and rules will be defined and described. Contributors: FCSR (Editor), BBVA, ATOS, IBM

Initial Exploitation Plan

It will present the first version of the consortium/project-wide as well as partner specific exploitation plans for the WITDOM project, including the impact creation plan. It will include initial market analysis. Contributors: ATOS (Editor), All partners

Final communication Activities Report

This deliverable will be the final report of the completed communication activities from M25 to M36. Contributors: ATOS (Editor), All partners

Final specification of the adaptation layer for Cloud computing

The final characteristics, elements, and interfaces of the extension to Cloud computing developed in T4.4 (i.e. WD4.2) will be collected in this deliverable, together with the implementation guidelines corresponding to the Cloud scenario produced by T4.4. Contributors: IBM (Editor), UVIGO, ATOS, XLAB, FCSR

Requirements analysis for un-trusted environments

At the beginning of WITDOM project an extensive analysis of requirements will be conducted. Requirements will be with high level of abstraction, with no bias towards technology and they will focus mainly on privacy and security issues highlighted by the stakeholder analysis. Requirements will span from general requirements for the whole platform as well as specific requirements for the two use case. This deliverable, in conjunction with D2.2, D6.1 and D6.2 will be the basis to design and develop the whole project. Contributors: FCSR (Editor), BBVA, ATOS, UVIGO, KU Leuven, IBM

Report of second Advisory Board Workshop

After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners

Dissemination Plan

D7.2 will outline the plan for dissemination activities for the various channels described in Task 7.1 and will identify potential avenues for dissemination. It will also contain the first version of the dissemination materials (flyers, leaflet, poster, presentation templates). Contributors: ATOS (Editor), All partners

Report of first Advisory Board Workshop

After each SAB workshop, Atos will write a report with all conclusions, including observations on project results, recommendations for research and on actions for impact creation, among others. Contributors: ATOS (Editor), All partners

Final Exploitation Plan and Report

It will update D7.10 based on the finalised developments and validation of the WITDOM project, and will include a report on exploitation activities performed. It will include a definition of business models suitable for market adoption of project results for enhanced privacy and security in Cloud environments. Contributors: ATOS (Editor), All partners

First dissemination Report& Material

This report will periodically update the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners

Legal requirements on privacy, data protection and security in WITDOM scenarios

This deliverable will specify ethical and legal privacy and security requirements that need to be taken into account for the development of the eHealth and Financial Services scenarios. Contributor: KU Leuven (Editor), FCSR

Final specification of system architectures for WITDOM scenarios

This deliverable will comprise the final scenario-specific architectural description for both use-cases, adequately redefining the initial architecture (WD4.1, D4.1) and the relationships between its elements in order to meet the objectives of this WP. Contributors: UVIGO (Editor), IBM, FCSR, BBVA, ATOS, XLAB, KU Leuven

Final dissemination Report& Material

This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners

Second communication Activities Report

This report will periodically report the completed communication activities from M13 to M24 and the planned activities for next year (M25 to M36). Contributors: ATOS (Editor), All partners

Second dissemination Report& Material

This report updates and constitutes the final version of the dissemination plan, report on the dissemination and awareness creation activities of the past period and will provide updated versions of the dissemination material. Contributors: ATOS (Editor), All partners

WITDOM Holistic Privacy framework, privacy metrics and assessment methodology

This revision of the deliverable will build upon D3.1, will collecting the final results of subtask 3.2.2, namely the description of the holistic privacy framework, the definition of privacy metrics and privacy preferences, and the assessment methodology used to evaluate the end-to-end privacy and security of the solutions developed in WITDOM, reformalizing the gathered requirements to assess that the developed metrics are sufficiently representative and perfectly aligned to the requirements. A preliminary theoretical evaluation of the existing and to-be-developed privacy-enhancing techniques and secure cryptographic signal processing approaches will also be given (WD3.1). This deliverable will also account for the evolving research outcomes in WP3 and from the actual evaluation and assessment in WP2 to refine and improve the framework from D3.1. Contributors: UVIGO (Editor), Atos, KU Leuven, IBM, XLAB, FCSR

Final standardisation Reports

This deliverable will offer a consolidated view of standardisation-related achievements in relation to the project and its outcomes. Contributors: KU Leuven (Editor), UVIGO, IBM

First communication Activities Report

This report will periodically report the completed communication activities from M1 to M12 and the planned activities for next year (M13 to M24). Contributors: ATOS (Editor), All partners

WITDOM Internal Website

The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project, and that can also be used to provide an initial intra-project communication system. In the private area, a project management tool will be made available to facilitate the communication of the partners providing a common workspace. As the project evolves, the information structure and the IT-infrastructure will be adapted according to current needs and requirements. The usual collaboration tools and procedures will be installed and made available to the project partners. It will also be extended with an external portal that will make available information about WITDOM available to the public; that work will be performed in WP7 (see Task 7.1 D7.1, Task 7.2 and D7.3). Editor & Contributor: ATOS

WITDOM Internal Website and Communication Infrastructure

The internal portal will be created initially to form a repository of documentary and other information that is relevant to the execution of the project and that can also be used to provide an initial intraproject communication system In the private area a project management tool will be made available to facilitate the communication of the partners providing a common workspace In a second phase ending in month 3 a communication infrastructure consisting in a richer internal Internet portal and set of mailing lists will be provided As the project evolves the information structure and the ITinfrastructure will be adapted according to current needs and requirements The usual collaboration tools and procedures will be installed and made available to the project partners It will also be extended with an external portal that will make available information about WITDOM available to the public that work will be performed in WP7 see Task 71 D71 Task 72 and D73D74Editor Contributor ATOS

Public Web Presence

A public website will be established In the internal projects area a management tool will be made available to facilitate partners communication providing a common workspace A specific restricted area will be designed for SAB members The relationship with focus groups will be facilitated eg by management of mailing lists and electronic newslettersContributors ATOS Editor All partners

Final common trustworthy privacy-preserving platform toolkit

This deliverable comprises the final prototype of the trustworthy privacy-preserving platform toolkit and the necessary reports, detailing the platform from the documentation point of view. This final version will refine the initial revision provided in D5.1, accounting for the successive scientific/technical validations performed in T2.3 and T2.4. Contributors: XLAB (Editor), Atos, UVIGO

Publications

Secure genomic susceptibility testing based on lattice encryption

Author(s): Juan Ramon Troncoso-Pastoriza, Alberto Pedrouzo-Ulloa, Fernando Perez-Gonzalez
Published in: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2017, Page(s) 2067-2071, ISBN 978-1-5090-4117-6
Publisher: IEEE
DOI: 10.1109/ICASSP.2017.7952520

Multivariate lattices for encrypted image processing

Author(s): Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in: 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, Page(s) 1707-1711, ISBN 978-1-4673-6997-8
Publisher: IEEE
DOI: 10.1109/ICASSP.2015.7178262

Orchestrating Privacy Enhancing Technologies and Services with BPM Tools - The WITDOM Data Protection Orchestrator

Author(s): Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-7, ISBN 9781-450352574
Publisher: ACM Press
DOI: 10.1145/3098954.3104057

Rollback and Forking Detection for Trusted Execution Environments Using Lightweight Collective Memory

Author(s): Marcus Brandenburger, Christian Cachin, Matthias Lorenz, Rudiger Kapitza
Published in: 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2017, Page(s) 157-168, ISBN 978-1-5386-0542-4
Publisher: IEEE
DOI: 10.1109/dsn.2017.45

Outsourcing Genomic Data. Trust in the untrusted.

Author(s): Griet Verhenneman
Published in: 2017
Publisher: European Conference on Health Law edition:6 location:Bergen, Norway date:27-29 September 2017

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition

Author(s): Abdelrahaman Aly, Aysajan Abidin, and Svetla Nikova
Published in: 2018
Publisher: Financial Cryptography and Data Security - 22nd International Conference, FC 2018

Co-creating Security-and-Privacy-by-Design Systems

Author(s): Sauro Vicini, Francesco Alberti, Nicolas Notario, Alberto Crespo, Juan Ramon Troncoso Pastoriza, Alberto Sanna
Published in: 2016 11th International Conference on Availability, Reliability and Security (ARES), 2016, Page(s) 768-775, ISBN 978-1-5090-0990-9
Publisher: IEEE
DOI: 10.1109/ARES.2016.74

Image denoising in the encrypted domain

Author(s): Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in: 2016 IEEE International Workshop on Information Forensics and Security (WIFS), 2016, Page(s) 1-6, ISBN 978-1-5090-1138-4
Publisher: IEEE
DOI: 10.1109/WIFS.2016.7823916

Enhancing Co-Creation with Privacy and Security-by-Design methodologies

Author(s): F. Alberti, S. Vicini
Published in: ENoLL Research Day Conference Proceedings 2015, 2015, ISBN 9789-082102741
Publisher: ENoLL - European Network of Living Labs

Don't trust the cloud, verify - integrity and consistency for cloud object stores

Author(s): Marcus Brandenburger, Christian Cachin, Nikola Knežević
Published in: Proceedings of the 8th ACM International Systems and Storage Conference on - SYSTOR '15, 2015, Page(s) 1-11, ISBN 9781-450336079
Publisher: ACM Press
DOI: 10.1145/2757667.2757681

Engineering Privacy by Design Reloaded

Author(s): Seda Gurses, Claudia Diaz and Carmela Troncoso
Published in: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Publisher: Amsterdam Platform for Privacy Research (APPR)

Dynamic Privacy-Preserving Genomic Susceptibility Testing

Author(s): Mina Namazi, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
Published in: Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security - IH&MMSec '16, 2016, Page(s) 45-50, ISBN 9781-450342902
Publisher: ACM Press
DOI: 10.1145/2909827.2930791

Convention 108: the international standard for data protection to come?

Author(s): G. Verhenneman, F. Coudert
Published in: Proceedings of the Amsterdam Privacy Conference 2015 (APC 2015), 2015
Publisher: Amsterdam Platform for Privacy Research (APPR)

On Ring Learning with Errors over the Tensor Product of Number Fields

Author(s): A. Pedrouzo-Ulloa, J.R. Troncoso-Pastoriza, Fernando Pérez-González
Published in: 2017
Publisher: Arxiv e-prints, (arXiv:1607.05244v2)

An open-source tool for managing time-evolving variant annotation

Author(s): Ilio Catallo, Eleonora Ciceri, Stefania Stenirri, Stefania Merella, Alberto Sanna, Maurizio Ferrari, Paola Carrera, Sauro Vicini.
Published in: 2017
Publisher: Proceedings of CIBB

Updatable Tokenization: Formal Definitions and Provably Secure Constructions

Author(s): Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann
Published in: 2017, Page(s) 59-75
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70972-7_4

Enhancing Personas for Well-Being e-Services and Product Service Systems

Author(s): Sauro Vicini, Adriano Gariglio, Francesco Alberti, Elettra Oleari, Alberto Sanna
Published in: Design, User Experience, and Usability: Design Thinking and Methods, 2016, Page(s) 365-376, ISBN 978-3-319-40409-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-40409-7_35

A Masked Ring-LWE Implementation

Author(s): Oscar Reparaz, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede
Published in: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 683-702, ISBN 978-3-662-48324-4
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48324-4_34

Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation

Author(s): Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil Dimitrov, Ingrid Verbauwhede
Published in: Cryptographic Hardware and Embedded Systems -- CHES 2015, 2015, Page(s) 164-184, ISBN 978-3-662-48324-4
Publisher: Springer Berlin Heidelberg
DOI: 10.1007/978-3-662-48324-4_9

Number Theoretic Transforms for Secure Signal Processing

Author(s): Alberto Pedrouzo-Ulloa, Juan Ramon Troncoso-Pastoriza, Fernando Perez-Gonzalez
Published in: IEEE Transactions on Information Forensics and Security, Issue 12/5, 2017, Page(s) 1125-1140, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2016.2647223

Towards Inferring Communication Patterns in Online Social Networks

Author(s): Ero Balsa, Cristina Pérez-Solà, Claudia Diaz
Published in: ACM Transactions on Internet Technology, Issue 17/3, 2017, Page(s) 1-21, ISSN 1533-5399
Publisher: Association for Computing Machinary, Inc.
DOI: 10.1145/3093897

Hardware Assisted Fully Homomorphic Function Evaluation and Encrypted Search

Author(s): Sujoy Sinha Roy, Frederik Vercauteren, Jo Vliegen, Ingrid Verbauwhede
Published in: IEEE Transactions on Computers, Issue 66/9, 2017, Page(s) 1562-1572, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TC.2017.2686385

Design of Pool Mixes Against Profiling Attacks in Real Conditions

Author(s): Simon Oya, Fernando Perez-Gonzalez, Carmela Troncoso
Published in: IEEE/ACM Transactions on Networking, 2016, Page(s) 1-14, ISSN 1063-6692
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TNET.2016.2547391

Widening and strengthening the appeal of Convention 108

Author(s): Griet Verhenneman, Fanny Coudert
Published in: Data Protection Law & Policy, Issue vol:12 issue:3, 2015, Page(s) 8-10, ISSN 1743-6605
Publisher: Cecile Park Publishing

WITDOM: Empowering Privacy and Security in Non-trusted Environments

Author(s): Juan Ramón Troncoso-Pastoriza, Elsa Prieto Pérez
Published in: ERCIM News. Tackling Big Data in the Life Sciences., Issue 104, 2015, ISSN 0926-4981
Publisher: ERCIM EEIG

Intellectual Property Rights

Data Masking

Application/Publication number: 15/ 417851
Date: 2017-01-27
Applicant(s): IBM RESEARCH GMBH

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available