ICT 2015 networking session: “Key challenges in end-to-end privacy/security in untrusted environments”

22/ Oct/ 2015

The H2020 projects WITDOM (www.witdom.eu), TREDISEC (www.tredisec.eu) and PRISMACLOUD (www.prismacloud.eu), addressing to the H2020-ICT-2014-1 call, organize a joint networking session at the ICT 2015 – Innovate, Connect, Transform event, held on October 22nd 2015 at 14:50CET in Room 8 of Centro de Congressos de Lisboa, Lisbon (Portugal). The joint networking session will discuss challenges to both security and end-users´ privacy when outsourcing data to untrusted environments, such as privacy protection, integrity, data storage efficiency or multi-tenancy.

The networking session organized by WITDOM, TREDISEC and PRISMACLOUD is also supported by the project WISER (www.cyberwiser.eu) from the call H2020-DS-2014-1, acting as conductor of the session.
Mr. Nick Ferguson from Trust-IT Services and coordinator of the EC-funded CloudWATCH2 project, will set the stage with a presentation focussing on the key challenges related to the cloud. These challenges will be later presented by recognized researchers in the field to discuss where the trends are moving. Finally, a questions and answers slot is offered to interact with the audience about the proposed topics.

Presentation 1: “Cloud challenges to high-demanding privacy scenarios.” Abstract: “Distributed environments, in particular cloud ones, are generally perceived as being untrusted for storing sensitive personal data. Unless specific data protection measures are implemented, Cloud Providers and malicious parties could gain access to such data and make an unlawful use of them, beyond the specific context of explicitly authorized purposes. In case of scenarios with high-demanding privacy needs (such as eHealth or financial data), moving operations to the cloud requires the provisioning of strict guarantees to all involved parties, in full compliance with the law and according to state-of-the-art technology and best privacy-by-design and cloud security practices. In this talk some of these privacy challenges will be presented, as well as some approaches to overcome them.”
Speaker: Nicolas Notario McDonnell (Atos). Project WITDOM.

Presentation 2: “Verifiability and Authenticity of Data and Beyond” Abstract: “In this talk we discuss aspects related to reliably checking that third party infrastructure (i.e., the cloud) behaves as expected when storing and processing data. The focus is on cryptographic measures that ensure and sometimes even enforce honest behaviour and at least allow cryptographically holding the cloud accountable when it deviates from the expected behaviour.”
Speaker: Mr. Henrich C. Pöhls (Passau University). Project PRISMACLOUD.

Presentation 3: “Data protection versus storage efficiency and multi-tenancy” Abstract: “Implementing existing end-to-end security solutions unfortunately may reduce the advantages of the cloud technology such as cost effective storage. We will talk about the challenges resulting from the combination of security, functional and non- functional requirements such as storage efficiency and multi-tenancy.”
Speaker: Ghassan Karame (NEC). Project TREDISEC.