PRISMACLOUD

Blog Standard

D5.1 Design of distributed storage systems without single-point-of- failure

Cloud computing is a major trend in the IT world and brings completely new delivery models for computing and storage resources to customers. The shift from locally hosted and speci fically tailored IT systems to externally hosted and maintained IT...

Details

D4.6 First year research report on Privacy-enhancing cryptography

PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...

Details

Privately and Publicly Verifiable Computing Techniques: A Survey

This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing. This survey provides a good overview of the literature and helps people to understand this...

Details

Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo

Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for...

Details

Unikernel for Cloud Services: How Single-Responsibility can Reduce Complexity

Unikernels allow application deployment through custom-built minimal virtual machines. The authors investigate how unikernels and their inherent minimalism benefit system security. The analysis starts with common security vulnerability classes and their possible remediation. A platonic unikernel framework is used...

Details

Exchanging Database Writes with Modern Cryptography

Modern cryptography provides for new ways of solving old problems. This paper details how Keyed-Hash Message Authentication Codes (HMACs) or Authenticated Encryption with Associated Data (AEAD) can be employed as an alternative to a traditional server-side temporal session store....

Details

D2.5 Risk and Threat Analysis with Security Requirements

Absolute security does not exist and, in any system, security definition has first to start with a threat analysis (attacker profiling) and a definition of the information to protect (and against what), second, to define security policies (how to...

Details

D2.1 Legal, Social and HCI Requirements

This Deliverable presents legal, social, and HCI (Human Computer Interaction) requirements for the PRISMACLOUD project, which were elicited within the first nine months of the project for clarifying the legal status of novel signature schemes to be used in...

Details

D5.8 Overview of verifiable computing techniques providing private and public verification

Cloud computing is an increasing trend within IT outsourcing that allows vendors to offer traditional IT facilities, such as storage and/or computational systems, via the Internet. Clearly, such a business model brings many bene fits and often allows customers to...

Details

D4.9 Analysis of the State of the Art of FPE, OPE and Tokenization schemes

This deliverable provides an overview of the state of the art on Format Preserving Encryption and Order Preserving Encryption. Based on the requirements and needs of the PRISMACLOUD project use cases, we refine and layout the specific requirements of...

Details

Element

Become a Member


Continue