Home » Marketplace » Information Protection Processes and Procedures

Information Protection Processes and Procedures

SIDE - SWITCH Interactive Development Environment

The SWITCH Interactive Development Environment (SIDE) is a subsystem of SWITCH, responsible for the specification of an application for deployment in a Cloud. SIDE is responsible for ensuring that a given application can be implemented in a cloud context in accordance with both the desires of the developers and the limitations of the cloud providers; it is also responsible for allowing an application to be monitored and controlled by the developer at runtime.

SecureCloud Secure Containers

Ecosystem of cloud facilities characterized by superior security guarantees, providing protection from attacks by privileged users (e.g. the cloud provider or the system administrator) and software (e.g. the hypervisor). SecureCloud is flexible, since it can satisfy a wide range of customers-specific requirements including big data processing, secure intra-cloud communication, precise microservice scheduling and reliable data storage. SecureCloud is interoperable, in that its facilities can be seamlessly integrated with best of breed offerings from the Open Source community.

SCONE

To to improve the Open Rotor and UHBR Fan broadband noise prediction by using high-fidelity Large-Eddy Simulation (LES).

WITDOM Key Manager

The WITDOM Key Management component provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components. Since secrets are required in trusted and untrusted domains, there are two instances of the KM component in the WITDOM architecture with similar functionalities.

WITDOM Anonymization

Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy.

WITDOM Secure Signal Processing

WITDOM’s Secure Signal Processing (SSP) component performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment, by preventing the disclosure of the sensitive information while it is being processed in the untrusted domain.

WITDOM Secure Computation

The Secure Computation component offers data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain.

WITDOM Data Masking

WITDOM’s data masking component is responsible for masking sensitive data classified as direct identifiers. The masking process creates service-and-user-specific tokens that can be updated over time, satisfying two main security requirements: irreversibility and unlinkability.

WITDOM E2EE

The WITDOM End-2-End Encryption (E2EE) component provides protection functionalities in terms of locally encrypting data in the trusted domain before storing them in the untrusted domain for the secure backup purposes.

Data Encryption

This tool provides the means for processing data in different ways, supporting different purposes with different privacy requirements. It includes several components providing the capabilities to encrypt data while preserving the format or ordering of the data. This tool enables users of legacy applications to move their databases to a public cloud, while preserving data privacy and confidentiality. Moreover, the tool provides components for data generalization as means for anonymizing bulk data using k-anonymity techniques.

Pages

News

Wojciech Wideł, Preetam Mukherjee, and Mathias Ekstedt from our partner KTH published in IEEE Access about their work in the SOCCRATES project.

Future Events

In context of the annual Internet Festival in Pisa, the CNR Institute of Informatics and Telematics and Registro.it are organising the workshop Cybersecurity Day 2022.

The event will take place on 7 October 2022 at the Auditorium Giuseppe Moruzzi 1 in Pisa and will be attended by industry experts, researchers, representatives of the business world.

08/10/2022

SOCCRATES provides a deep dive session on the SOCCRATES platform at the ONE Conference 2022. 
 

Within the H2020 EU project SOCCRATES a security decision support platform has been developed for Security Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs). This, so called ‘SOCCRATES Platform’ is targeted at organisation’s inhouse SOC and at Managed Security Service Providers (MSSP) that provide SOC services.

18/10/2022