D6.4 - Final Evaluation report

This deliverable evaluates different TREDISEC primitives in the context of six Use Cases and a framework. Each of the Use Cases and the Framework represent a scenario where we describe how different primitives have been evaluated within their test environments and the framework itself, testing new functionalities and security solutions. The overall goal is to check and validate whether requirements that were identified at the beginning of the project are met. So according to D6.3, we describe here how each of the scenarios (6 Use Cases and the framework) have been tested, what methodologies have been used (as of described in D6.2), how all the works related to the evaluation process were planned and executed (Use Cases processes, test cases, results, etc.), and finally, if the results we obtain are in line with expected results and fulfil all requirements.

D6.1 - TREDISEC framework implementation

The solutions are offered through the framework in the form of security primitive patterns, security primitive implementations and TREDISEC Recipes. Deliverables D2.3 and D2.4 described the architecture design of the TREDISEC framework, and detailed the lifecycle of security primitives, in their three flavours, and how the framework supports that, providing different functionalities and specific features to the four user roles identified, namely: TREDISEC Security Admin, TREDISEC end-user, Security Expert engineer, Security Technology Provider. Deliverable D6.1 is a software implementation of the TREDISEC framework architecture design, as it is described in its final version in D2.4.

D5.3 - Implementation of Provisioning, Outsourcing and Processing Frameworks

This report overviews the complete specification and the evaluation of four different TREDISEC primitives that enable a cloud server to process data while not being able to access its content. Thanks to these primitives, cloud customers can delegate their computationally expensive operations to the untrusted cloud server and hence benefit from the performance advantages offered by this new technology while preserving data privacy.

D4.3 - A Proposal for Data Confidentiality and Deduplication

Cloud storage services have become an integral part of our daily lives. With more and more people operating multiple devices, cloud storage promises a convenient means for users to store, access, and seamlessly synchronize their data from multiple devices. With the ever increasing amount of data produced worldwide, the cloud offers a cheaper and more reliable alternative to local storage. Existing cloud service providers such as Amazon S3, Microsoft Azure, or Dropbox guarantee a good trade-off between quality of service and cost effectiveness.

D4.2 - A Proposal for Resource Isolation in Multi-Tenant Storage Systems

Cloud providers that offer multi-tenancy solutions face an inevitable dilemma. On one hand, they have to ensure that tenants’ resources are well isolated from one another, because a breach in resource isolation can result in information leakage or even compromise. On the other hand, this contradicts a cloud provider’s incentive of making efficient use of their resources—resources that are not shared might lie idle, such as a CPU core that is not in use or a disk that holds only a small amount of data.

D3.3 - Complete Design and Evaluation of Verifiability mechanisms

This deliverable overviews the complete specification and evaluation of nine different TREDISEC primitives that enable a cloud customer to remotely verify the correctness of cloud operations including storage, processing. Thanks to these primitives, cloud users acquire more confidence to outsource their storage and processing operations to the cloud. On the other hand, thanks to their compatibility with cloud functional operations such as file deduplication or data replication, cloud servers can maintain the cost efficiency of current infrastructures and offer these new security guarantees at the same time.

D1.7 Final Innovation management report

This document reports the final assessment of the TREDISEC project from the point of view of Innovation Management activities. Recall that the main purpose of innovation management is to ensure that the project research activities, technological developments, and achievements, are kept well connected to outside technology developments. An additional goal of innovation management here is to maintain low risk level for the project and to prevent the project’s results from losing relevance given the evolving trends in the market.