SlideShare a Scribd company logo
witdom participates in:
empoWering prIvacy and securiTy in
non-trusteD envirOnMents
General Presentation
empoWering prIvacy and securiTy in non-trusteD envirOnMents
www.witdom.eu
Duration: 1st January, 2015 – 31st December 2017
Budget: 4.020.281,25 €
What is the focus of witdom?
WITDOM is a framework for end-to-end protection of outsourced
data in untrusted and fast-evolving ICT-based environments.
Framework
Toolkits Building blocks
Reference
Implementations
Guidelines
Platform
Scenarios
Methodology
Practical Level Implementation Level
• Driven by PSbD principles.
• Tools for effective protection of
sensitive data.
• Validation in two realistic application
scenarios with high-demanding
requirements of privacy and security.
Solution proposed
Storage/
Data processing
CLOUD
PROVIDER
Untrusted domain
(i.e: public cloud)
Trusted domain
(i.e: private cloud)
End-users
Public Institution
Regulator
3rd parties
IT DEPARTMENT
Operations
Internal
user
Protected data
Requests
External usersTrusted users
Challenge: Financial scenario
 Protection of large-scale outsourced financial data storage and
processing (financial risk calculation, fraud detection,...)
Challenge: e-Health scenario
 Genetic/proteomic databases protection, shared for large-scale research
analyses and outsourced individual clinical analyses.
Main innovations
Privacy Enhancing
Techniques, perturbation
mechanisms and privacy
metrics
Privacy-
preserving
cryptographic
techniques
supporting
encrypted
processing
Cryptographic techniques
for Integrity and Verifiability
of outsourced processes
European
Legal
Landscape
Privacy metrics for
sensitive outsourced
data and quantifiable
leakage and traces
• Efficient HE
• Current limitations in
terms of full
anonymisation
• Produce efficient data
processing techniques.
• Integrity and
consistency
guarantees
• Overcome current
restrictions to simple
storage services
• Overcomes limitations
in concurrent operation
Evolution of the EU data
protection regulation
Holistic vision,
with
interrelated
and entangled
advance in all
areas
Sought Impacts
 Macro level:
• New paradigm for design and implementation of ICT
• Measurably higher level of security and privacy at marginal
additional cost
• Products compliant with EU Data Protection legislation
 Societal level
• Increased user trust in ICT services and protection of user privacy
• Improved ability to detect breaches in security
• More resilient critical infrast. and services with built-in
trustworthiness
 Research & Innovation level
• Simplified crypto primitives implementation, easy-to-manage
security (reduced complexity of security infrast.)
• Provable improved security than traditionally designed ICT
• User empowerment over data and trust relations (user-centric
tools to define / automatically enforce privacy preferences)
Major publications
9 Scientific publications
– “Don't trust the cloud, verify: Integrity and consistency for cloud object stores” M. Brandenburger, C. Cachin,
and N. Knezevi ˇ (IBM). Presented at the SYSTOR conference.
– “Enhancing Co-Creation with Privacy- and Security-by-design” F. Alberti, S. Vicini (FSCR). Published as
proceedings at ENoLL Research Day Conference.
– “Engineering Privacy by Design Reloaded”. Seda Gurses, Claudia Diaz and Carmela Troncoso
(UVIGO/Gradiant). Amsterdam Privacy Conference 2015
– “Convention 108: the international standard for data protection to come?” G. Verhenneman, F. Coudert (KU
Leuven). Amsterdam Privacy Conference 2015.
– “Co-Creating Security-and-Privacy-by-Design Systems” S. Vicini, F. Alberti, A.Sanna (FSRC), N. Notario, A.
Crespo (ATOS), J.R. Troncoso-Pastoriza (UVIGO). Submitted to the Amsterdam Privacy Conference 2015.
Submitted to SAC16.
– “Enhancing Personas for Well-Being e-Services and Product Service Systems” S. Vicini, F. Alberti, A. Gariglio,
A. Sanna (FSCR). Accepted by DUXU 2016
– “Number Theoretic Transforms for Secure Signal Processing”. J. Troncoso (UVIGO) et al. Submitted to Journal
IEEE Transactions on Information Forensics and Security.
– “Dynamic Privacy-Preserving Genomic Susceptibility Testing”. J. Troncoso (UVIGO) et al. Submitted to 4th
ACM IH & MMSec 2016 (June 2016)
– "Hardware Assisted Fully Homomorphic Function Evaluation". Submitted to CHES 2016 (August 2016).
2 White papers & vision papers
– Contribution to DPSP cluster whitepaper: "Challenges for trustworthy (multi-)Cloud-based services in the
Digital Single Market“
– Contribution to Canopy whitepaper "Enabling Trusted European Cloud"
Identified Future challenges
• Generalization of the approach
– ICT-18-2016: Big data PPP:
privacy-preserving big data technologies
– EUB-01-2017: Cloud Computing
– DS-03-2016: Increasing digital security of
health related data on a systemic level
• Extend
– New algorithms
– New approaches
– New scenarios
• Semi-automatic composer
– E.g. Smart orchestration

More Related Content

PDF
20161201 witdom bdva summit
PDF
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
PDF
9th International Conference of Security, Privacy and Trust Management (SPTM ...
PDF
Call for Papers - 9th International Conference of Security, Privacy and Trust...
PPTX
#VQEG #QUADRIVIA 2020
DOCX
Call for Papers - 6th International Conference on Cryptography and Informatio...
DOCX
6th International Conference on Cryptography and Information Security (CRIS 2...
PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
20161201 witdom bdva summit
Call for Paper - 9th International Conference of Security, Privacy and Trust ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
Call for Papers - 9th International Conference of Security, Privacy and Trust...
#VQEG #QUADRIVIA 2020
Call for Papers - 6th International Conference on Cryptography and Informatio...
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...

What's hot (20)

PDF
6th International Conference on Cryptography and Information Security (CRIS 2...
PDF
Call for Papers - 15th International Conference on Network Security & Applica...
PDF
Naesys at secure it conference 2017
PDF
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
PDF
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PDF
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
PDF
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
PDF
Etherisc Blockchain Oscar winning pitch
PDF
Cybersecurity governance existing frameworks (nov 2015)
DOCX
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
PDF
Call for Papers - International Conference on Big Data, Blockchain and Securi...
PDF
Etherisc at Ethereum London meetup
PDF
Enabling Security-by-design in Smart Grids: An architecture-based approach
PDF
Call for Papers - 8th International Conference of Security, Privacy and Trust...
PDF
Innovation Connectomics - Mapping Knowledge Flow in Innovation Networks
PDF
International Conference on Big Data, Blockchain and Security (BDBS 2020)
PDF
Etherisc presentation for BlockShow Europe
PDF
Combining structure and semantics for ontology-based corporate wikis
PDF
13th International Conference on Network Security & Applications (CNSA 2020)
PDF
Industrial Control Cybersecurity USA Cyber Senate conference
6th International Conference on Cryptography and Information Security (CRIS 2...
Call for Papers - 15th International Conference on Network Security & Applica...
Naesys at secure it conference 2017
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
CALL FOR PAPERS - 4th International Conference on Networks and Security (NSEC...
Etherisc Blockchain Oscar winning pitch
Cybersecurity governance existing frameworks (nov 2015)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
Call for Papers - International Conference on Big Data, Blockchain and Securi...
Etherisc at Ethereum London meetup
Enabling Security-by-design in Smart Grids: An architecture-based approach
Call for Papers - 8th International Conference of Security, Privacy and Trust...
Innovation Connectomics - Mapping Knowledge Flow in Innovation Networks
International Conference on Big Data, Blockchain and Security (BDBS 2020)
Etherisc presentation for BlockShow Europe
Combining structure and semantics for ontology-based corporate wikis
13th International Conference on Network Security & Applications (CNSA 2020)
Industrial Control Cybersecurity USA Cyber Senate conference
Ad

Similar to WITDOM presentation at Net Futures 2016 (20)

PDF
Witdom overview 2016
PDF
SMi Group's 5th annual European Smart Grid Cyber Security conference
PDF
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
PPT
CyberSecurity-Forum-2010-Mario Hoffmann
PDF
Tackling Data Security and Privacy Challenges of the IoT
PDF
17th International Conference on Network and Communications Security (NCS 2025)
PDF
Cloud Security: Techniques and frameworks for ensuring the security and priva...
PDF
11th International Conference on Cryptography and Information Security (CRYPI...
PDF
Nordic IT Security 2014 agenda
PDF
17th International Conference on Network and Communications Security (NCS 2025)
PDF
8th International Conference on Networks and Security (NSEC 2024)
PDF
Personal & Trusted cloud
PPTX
Implications of GDPR for IoT Big Data Security and Privacy Fabric
PPTX
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
PDF
AM Briefing: Security for the internet of things
PDF
11th International Conference on Cryptography and Information Security (CRYP...
PDF
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
PDF
13th International Conference of Security, Privacy and Trust Management (SPTM...
DOCX
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
PDF
Jacques Bus F I I R L Presentation J B
Witdom overview 2016
SMi Group's 5th annual European Smart Grid Cyber Security conference
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity-Forum-2010-Mario Hoffmann
Tackling Data Security and Privacy Challenges of the IoT
17th International Conference on Network and Communications Security (NCS 2025)
Cloud Security: Techniques and frameworks for ensuring the security and priva...
11th International Conference on Cryptography and Information Security (CRYPI...
Nordic IT Security 2014 agenda
17th International Conference on Network and Communications Security (NCS 2025)
8th International Conference on Networks and Security (NSEC 2024)
Personal & Trusted cloud
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
AM Briefing: Security for the internet of things
11th International Conference on Cryptography and Information Security (CRYP...
CFP Special Session on Machine Learning on Edge for Smart Health in ICCAN 2019
13th International Conference of Security, Privacy and Trust Management (SPTM...
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
Jacques Bus F I I R L Presentation J B
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
“AI and Expert System Decision Support & Business Intelligence Systems”
Diabetes mellitus diagnosis method based random forest with bat algorithm
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Empathic Computing: Creating Shared Understanding
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

WITDOM presentation at Net Futures 2016

  • 1. witdom participates in: empoWering prIvacy and securiTy in non-trusteD envirOnMents General Presentation
  • 2. empoWering prIvacy and securiTy in non-trusteD envirOnMents www.witdom.eu Duration: 1st January, 2015 – 31st December 2017 Budget: 4.020.281,25 €
  • 3. What is the focus of witdom? WITDOM is a framework for end-to-end protection of outsourced data in untrusted and fast-evolving ICT-based environments. Framework Toolkits Building blocks Reference Implementations Guidelines Platform Scenarios Methodology Practical Level Implementation Level • Driven by PSbD principles. • Tools for effective protection of sensitive data. • Validation in two realistic application scenarios with high-demanding requirements of privacy and security.
  • 4. Solution proposed Storage/ Data processing CLOUD PROVIDER Untrusted domain (i.e: public cloud) Trusted domain (i.e: private cloud) End-users Public Institution Regulator 3rd parties IT DEPARTMENT Operations Internal user Protected data Requests External usersTrusted users
  • 5. Challenge: Financial scenario  Protection of large-scale outsourced financial data storage and processing (financial risk calculation, fraud detection,...)
  • 6. Challenge: e-Health scenario  Genetic/proteomic databases protection, shared for large-scale research analyses and outsourced individual clinical analyses.
  • 7. Main innovations Privacy Enhancing Techniques, perturbation mechanisms and privacy metrics Privacy- preserving cryptographic techniques supporting encrypted processing Cryptographic techniques for Integrity and Verifiability of outsourced processes European Legal Landscape Privacy metrics for sensitive outsourced data and quantifiable leakage and traces • Efficient HE • Current limitations in terms of full anonymisation • Produce efficient data processing techniques. • Integrity and consistency guarantees • Overcome current restrictions to simple storage services • Overcomes limitations in concurrent operation Evolution of the EU data protection regulation Holistic vision, with interrelated and entangled advance in all areas
  • 8. Sought Impacts  Macro level: • New paradigm for design and implementation of ICT • Measurably higher level of security and privacy at marginal additional cost • Products compliant with EU Data Protection legislation  Societal level • Increased user trust in ICT services and protection of user privacy • Improved ability to detect breaches in security • More resilient critical infrast. and services with built-in trustworthiness  Research & Innovation level • Simplified crypto primitives implementation, easy-to-manage security (reduced complexity of security infrast.) • Provable improved security than traditionally designed ICT • User empowerment over data and trust relations (user-centric tools to define / automatically enforce privacy preferences)
  • 9. Major publications 9 Scientific publications – “Don't trust the cloud, verify: Integrity and consistency for cloud object stores” M. Brandenburger, C. Cachin, and N. Knezevi ˇ (IBM). Presented at the SYSTOR conference. – “Enhancing Co-Creation with Privacy- and Security-by-design” F. Alberti, S. Vicini (FSCR). Published as proceedings at ENoLL Research Day Conference. – “Engineering Privacy by Design Reloaded”. Seda Gurses, Claudia Diaz and Carmela Troncoso (UVIGO/Gradiant). Amsterdam Privacy Conference 2015 – “Convention 108: the international standard for data protection to come?” G. Verhenneman, F. Coudert (KU Leuven). Amsterdam Privacy Conference 2015. – “Co-Creating Security-and-Privacy-by-Design Systems” S. Vicini, F. Alberti, A.Sanna (FSRC), N. Notario, A. Crespo (ATOS), J.R. Troncoso-Pastoriza (UVIGO). Submitted to the Amsterdam Privacy Conference 2015. Submitted to SAC16. – “Enhancing Personas for Well-Being e-Services and Product Service Systems” S. Vicini, F. Alberti, A. Gariglio, A. Sanna (FSCR). Accepted by DUXU 2016 – “Number Theoretic Transforms for Secure Signal Processing”. J. Troncoso (UVIGO) et al. Submitted to Journal IEEE Transactions on Information Forensics and Security. – “Dynamic Privacy-Preserving Genomic Susceptibility Testing”. J. Troncoso (UVIGO) et al. Submitted to 4th ACM IH & MMSec 2016 (June 2016) – "Hardware Assisted Fully Homomorphic Function Evaluation". Submitted to CHES 2016 (August 2016). 2 White papers & vision papers – Contribution to DPSP cluster whitepaper: "Challenges for trustworthy (multi-)Cloud-based services in the Digital Single Market“ – Contribution to Canopy whitepaper "Enabling Trusted European Cloud"
  • 10. Identified Future challenges • Generalization of the approach – ICT-18-2016: Big data PPP: privacy-preserving big data technologies – EUB-01-2017: Cloud Computing – DS-03-2016: Increasing digital security of health related data on a systemic level • Extend – New algorithms – New approaches – New scenarios • Semi-automatic composer – E.g. Smart orchestration