Implementation Security Primitive Security Requirements Addressed Cloud Description Links
Verifiable Document Redacting Verifiable Computation Computation Efficiency A verifiable document redacting primitive that empowers cloud users to easily remove some part of their already signed document without having an impact on the validity of the signature. Thanks to this new primitive, users will not disclose private information of the document that does not need to be shared with the destined party.
Attack Surface Reduction (KTRIM) Attack Surface Reduction Resource Isolation Multi-Tenancy
Authenticated Encryption Processing on Encrypted Data Privacy-Preserving Processing Data Processing

Authenticated encryption with new security model and construction. StoA authenticated encryption with variable stretch is vulnerable to some attacks that misuse the variable stretch. A new security definition is proposed and followed by a new construction.

Shared Ownership Secure Enforcement of Policies Access Control & Policy Enforcement Data Access

Shared Ownership allows joint access control decisions on collaboratively created cloud data. In our work we present an instantiation of shared ownership that is more efficient than previous work and allows fair accounting through block-chains.

MIRROR PoR and replication Verifiable Storage Storage Efficiency

Proofs of retrievability for data replications. It allows the data replication be handled by the cloud provider, who will then generate proofs of retrievability of these replicas upon user attestation.

SPORT Deduplication and PoR Verifiable Storage Storage Efficiency

De-duplication on the authenticators used for Proofs of Retrievability across multiple users. Relying on key-message homomorphic encryption, the cloud providers are able to merge the PoR authenticators generated by different users using different credentials and the merged authenticators is verifiable by all users.

ML-POR with MLKeygen PoR and Key Management Verifiable Storage Storage Efficiency

Message Locked PoR and Message locked key generation. This primitive enables clients to verify the retrievability of their files while also allowing file-based deduplication based on a dedicated message-locked key generation. Since all keying material are depending on the file itself the encryption and encoding of the files remain the same if the file is the same.

Secure Deletion Secure Enforcement of Policies Access Control & Policy Enforcement Multi-Tenancy, Storage Efficiency

The primitive provides secure deletion on an honest-but-curious cloud storage. Therefore, clients can store all the files on the cloud as usual, but still achieve secure deletion, which cannot be guaranteed otherwise. The solution is based on encryption.

Logical Partitioning Hypervisor Resource Isolation Resource Isolation

Provides light-weight isolation on many-core platforms. Allows management of encrypted and integrity-protected virtual machine images.

Multi-tenancy Access Control (EPICA) Secure Enforcement of Policies Access Control & Policy Enforcement Multi-Tenancy

The aim of the primitive is to provide an enforcement component for distributed attribute-based access control (ABAC) policies that ensures that authorized users always get access to the selected cloud resource (either data or service) whilst the access is refused to malicious parties, in the context of a multi-tenant cloud infrastructure.

TPM-based Remote Attestation (TRAVIS) Remote Attestation System Integrity Computation Efficiency

Remote Attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. The Remote Attestation generates the evidence of whether or not the untrusted cloud platform is running in the expected state, and therefore, the result of the service, application or VM image outsourced to the cloud is trustworthy.

Container Isolation component Container privacy and Isolation Resource Isolation Storage Efficiency

The Container Isolation module provides two functionalities: First, it implements a tool used to extract and encrypt a Docker container image layer in order to safely transfer it into a target Docker host. Second, it enables a container to store its data over encrypted storage mediums, in order to ensure that the confidential data cannot be retrieved by an adversary with access in the host’s storage backend

Key Management for Secure Deduplication (OOPRF) Key Management Data Privacy Storage Efficiency

This scheme is intended to be used in a scenario where multiple users are using a storage system to store data.

IBM's PoW Proof of Ownership Verifiable Ownership Availability, Storage Efficiency

A cryptographic protocol that regulates the interactions between a prover and a verifier. The protocol is usually executed in the context of a storage outsourcing scenario, where the prover is the client and the verifier is the (storage) service provider. The correctness property of PoW schemes require that the owner of a file will succeed in convincing the verifier of this fact.

Vulnerability Discovery Fuzz Testing Resource Isolation

This tool behaves like a classic fuzz tester, by supplying mutated input to a program and observing its behaviour. Often, mutated input leads to crashes, and the crashes reveal ways of exploiting the program. Standard fuzzers however do not take into account the distributed nature of some of the software that powers the cloud. The distributed fuzzer will be optimized for distributed programs and components. The output is a series of crash reports including back-traces and the developer/tester can manually intervene to fix the bug and harden the code.

Software Hardening (MEMCAT) Attack Surface Reduction Resource Isolation Multi-Tenancy

This mechanism includes a wide set of tools that ensures that an attacker has the smallest amount of resources at its disposal to attack a system. This is valuable because several zero-day exploits target unused features of the kernel.

Secure De-duplications Data confidentiality & Dedup Data Privacy Storage Efficiency

Files are encrypted on the client side before being uploaded to the cloud, and will be decrypted on the client side after being downloaded to local. The encryption key is kept by the clients. The encryption keys are acquired by the clients from some remote entity, in a privacy-preserving way that the remote entity is not able to infer or distinguish the file content from the requests from all clients, but this remote entity will ensure that the same file content will derive the same encryption key. Thanks to this feature, files across multiple clients can be de-duplicated. Only one copy of a file with unique content (in its encrypted form) will be stored in the cloud server. When duplicated files are deleted, only the links of the ownership will be removed. The file copy in the cloud will be removed only when the file is unique across all clients.

Advanced Encryption Resilient to Key-Leakage Data confidentiality & Dedup Data Privacy Storage Efficiency

The encryption primitive encrypts and partitions the file, in a way that the file can be decrypted only when all the partitions of the encrypted data as well as the decryption key are available.

PoR Storage Integrity with Proofs of Retrievability (PoR) Verifiable Storage Availability, Storage Efficiency

Proofs of Retrievability (PoR) are cryptographic proofs that enable a cloud provider to prove that the tenant can retrieve his file in its entirety. A tenant can ask the cloud provider to provide such proofs of a requested file without the need to download the file The aim of providing the PoR primitive is to provide strong assurance of storage integrity to the tenants.

Multi-Tenancy Enabled Encrypted Database Data Confidentiality Data Privacy Multi-Tenancy

If data is deployed on a server in an untrusted environment (e.g. the cloud), the data owner might be afraid of honest-but-curious database administrators or other personnel or external attackers who have access to the server. Our processing mechanism uses adjustable query-based encryption: The data is encrypted in so called onion encryption layers where the weakest encryption schemes are the innermost layers, which are then encrypted with other encryption schemes.

Secure Data Migration Service Data provisioning & Optimized Encryption Privacy-Preserving Data Outsourcing Storage Efficiency

This tool allows cloud customers to migrate relational SQL databases into the cloud such that confidentiality is provided against the service provider but the database can still be queried.

MUSE Privacy preserving word search Privacy-Preserving Processing Data Processing

A multi-user searchable encryption solution that allows users (called writers) to outsource their encrypted documents. Afterwards, other users (called readers) can perform some word search operations without the need of re-downloading the entire document and only if they are authorized to do so.

Biometric Features Extraction in the Encrypted Domain Privacy-preserving Data processing Privacy-Preserving Processing Data Processing

This primitive could be used to prove the user/citizen/customer that some processing (like the liveness detection) has indeed been computed on the authentication data, thus enabling to check the conformance to (e.g. governmental) rules/standards.

Verifiable Matching of Biometric Templates Processing verifiability Verifiable Computation Computation Efficiency

This primitive could be offered as a service to perform biometric authentication on trusted servers while preserving the privacy of the data. It could also be simply adapted to validate ID doc against trusted data sources

Verifiable Matrix Multiplication Processing verifiability Verifiable Computation Computation Efficiency

It is a cryptographic scheme that enables a cloud provider to compute the multiplication of a given vector with the matrix and to prove to a user that the output is actually correct. The goal of the solution is to render the verification of the proof as efficient as possible.