TREDISEC will advance the state of the art in cloud computing by adding security-oriented features on cloud services. To describe these features and to arrive at a set of requirements for them, the TREDISEC end-users as well as the industrial partners developed a set of representative typical usage scenarios where end-to-end security is required, and serve as a basis to derive functional and non-functional requirements. The final set of use cases consists of 6 scenarios driven by four partners of the consortium and covers the full spectrum of technologies to be provided by TREDISEC.
Partner | Cloud Technology | Use Case | TREDISEC Challenge |
---|---|---|---|
GRNET | ~Okeanos Synnefo | UC 1: Enhance Storage Efficiency Securely | Storage Integrity Verifiable Ownership Data Confidentiality and Deduplication Secure Enforcement of Policies in Clouds |
UC 2: Multi-Tenancy and Access Control | Access Control models for multi-tenancy Resource Isolation in Multi-Tenant Systems Secure Enforcement of Policies in Clouds |
||
ARSYS | CloudBuilder GlusterFS | UC 3: Optimised WebDav service for confidential storage | Storage Integrity Access Control models for multi-tenancy Resource Isolation in Multi-Tenant Systems Data Confidentiality and Deduplication Secure Enforcement of Policies in Clouds |
MORPHO | Outsourced cloud computations on Biometric data | UC 4: Enforcement of Biometric-based Access Control | Processing Verifiability Optimizing Encryption for Data Outsourcing Privacy Preserving Primitives for Data Processing |
UC 5: Secure Upgrade of Biometric Systems |
Optimizing Encryption for Data Outsourcing Privacy Preserving Primitives for Data Processing |
||
SAP | Outsourced legacy databases with encryption | UC 6: Database Migration into a Secure Cloud | Resource Isolation in Multi-Tenant Systems Data Provisioning Optimizing Encryption for Data Outsourcing |