D5.1 Design of distributed storage systems without single-point-of- failure
Cloud computing is a major trend in the IT world and brings completely new delivery models for computing and storage resources to customers. The shift from locally hosted and specifically tailored IT systems to externally hosted and maintained IT...
DetailsD4.6 First year research report on Privacy-enhancing cryptography
PRISMACLOUD aims at bringing novel cryptographic concepts and methods to practical application to improve the security and privacy of cloud based services and make them usable for providers and users. The purpose of this report is to document the progress...
DetailsPrivately and Publicly Verifiable Computing Techniques: A Survey
This work is the first comprehensive overview and comparison of all existing constructions and provides a good introduction to the research field of verifiable computing. This survey provides a good overview of the literature and helps people to understand this...
DetailsEnterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo
Cloud computing has been a great enabler for both the Internet of Things and Big Data. However, as with all new computing developments, development of the technology is usually much faster than consideration for, and development of, solutions for...
DetailsUnikernel for Cloud Services: How Single-Responsibility can Reduce Complexity
Unikernels allow application deployment through custom-built minimal virtual machines. The authors investigate how unikernels and their inherent minimalism benefit system security. The analysis starts with common security vulnerability classes and their possible remediation. A platonic unikernel framework is used...
DetailsExchanging Database Writes with Modern Cryptography
Modern cryptography provides for new ways of solving old problems. This paper details how Keyed-Hash Message Authentication Codes (HMACs) or Authenticated Encryption with Associated Data (AEAD) can be employed as an alternative to a traditional server-side temporal session store....
DetailsD2.5 Risk and Threat Analysis with Security Requirements
Absolute security does not exist and, in any system, security definition has first to start with a threat analysis (attacker profiling) and a definition of the information to protect (and against what), second, to define security policies (how to...
DetailsD2.1 Legal, Social and HCI Requirements
This Deliverable presents legal, social, and HCI (Human Computer Interaction) requirements for the PRISMACLOUD project, which were elicited within the first nine months of the project for clarifying the legal status of novel signature schemes to be used in...
DetailsD5.8 Overview of verifiable computing techniques providing private and public verification
Cloud computing is an increasing trend within IT outsourcing that allows vendors to offer traditional IT facilities, such as storage and/or computational systems, via the Internet. Clearly, such a business model brings many benefits and often allows customers to...
DetailsD4.9 Analysis of the State of the Art of FPE, OPE and Tokenization schemes
This deliverable provides an overview of the state of the art on Format Preserving Encryption and Order Preserving Encryption. Based on the requirements and needs of the PRISMACLOUD project use cases, we refine and layout the specific requirements of...
Details