Use Cases

TREDISEC will advance the state of the art in cloud computing by adding security-oriented features on cloud services. To describe these features and to arrive at a set of requirements for them, the TREDISEC end-users as well as the industrial partners developed a set of representative typical usage scenarios where end-to-end security is required, and serve as a basis to derive functional and non-functional requirements. The final set of use cases consists of 6 scenarios driven by four partners of the consortium and covers the full spectrum of technologies to be provided by TREDISEC.

Partner Cloud Technology Use Case TREDISEC Challenge
GRNET ~Okeanos Synnefo UC 1: Enhance Storage Efficiency Securely Storage Integrity
Verifiable Ownership
Data Confidentiality and Deduplication
Secure Enforcement of Policies in Clouds
UC 2: Multi-Tenancy and Access Control Access Control models for multi-tenancy
Resource Isolation in Multi-Tenant Systems
Secure Enforcement of Policies in Clouds
ARSYS CloudBuilder GlusterFS UC 3: Optimised WebDav service for confidential storage Storage Integrity
Access Control models for multi-tenancy
Resource Isolation in Multi-Tenant Systems
Data Confidentiality and Deduplication
Secure Enforcement of Policies in Clouds
MORPHO Outsourced cloud computations on Biometric data UC 4: Enforcement of Biometric-based Access Control Processing Verifiability
Optimizing Encryption for Data Outsourcing
Privacy Preserving Primitives for Data Processing
UC 5: Secure Upgrade of Biometric Systems Optimizing Encryption for Data Outsourcing
Privacy Preserving Primitives for Data Processing
SAP Outsourced legacy databases with encryption UC 6: Database Migration into a Secure Cloud Resource Isolation in Multi-Tenant Systems
Data Provisioning
Optimizing Encryption for Data Outsourcing