Catalogue of Recipes

Recipe Primitives Included Description
Verifiable Integrity of Virtual Systems TRAVIS

This recipe includes a packaged version of the TRAVIS primitive, which provides the following functionalities: (i) continuous verification of the integrity of the outsourced business services/applications and the underlying infrastructure, (ii) monitoring and reporting about Integrity aspects in Cloud Services Agreements.

Read More
Access Control and Multi-tenancy EPICA

EPICA (Efficient and Privacy-respectful Interoperable Cloud-based Authorization) is a software implementation that controls access to resources (either services or data) in multi-tenant cloud environments. This Recipe leverages Docker to allow a fully automated deployment and testing of EPICA through the framework.

Read More
Container Isolation Container Isolation

This recipe secures Docker image manipulation throughout its life cycle: The creation, storage and usage.

Read More
Secure storage and deletion

Traditional techniques like encryption and backups address availability and confidentiality concerns but lack transparency on resource usage and assurance that data is made inaccessible when its owner so wishes. Secure Storage and Deletion recipe enables such improved transparency and control for data owners.

Read More
Secure verifiable storage

This recipe offers cloud storage providers the advantage of ensuring a secure and confidential storage of customers' data while satisfying the cloud storage provider' scalability requirements and optimizing their storage savings.

Read More
Secure biometric matching

A Cloud Service using this Recipe will guarantee that the privacy of the data is preserved as all operations occur in the encrypted domain, and by providing reliable cryptographic proofs for each biometric transactions.

Read More
Secure storage with proofs of retrievability

Secure Multi-Cloud Storage emerges as the centerpiece of  tomorrow’s scalable and secure storage technologies, combining the use of multiple cloud storage services and aggressive data deduplication techniques to further reduce storage cost with security and reliability at an unmatched level.

Read More
Robust cloud platform

This recipe consists of primitives designed to mitigate the risk of compromise significantly, leading to cloud platforms that are robust against cyber exploitation.

Read More
Verifiable Computations

This recipe provides some means to cloud users to verify the correctness of operations executed (outsourced) at the cloud server's side.

Read More

These Recipes are a joint effort of various TREDISEC partners. If you are interested in knowing more, please contact us!