SlideShare a Scribd company logo
1 of 10
Download to read offline
www.paasword.eu
No More Dark Clouds with PaaSword
Dr. Simone Braun
CAS Software AG
PaaSword CS-IFG Workshop
Nov 10, 2016, Athens, Greece
PaaSword: An Innovative
Cloud Security-by-Design Framework
Address security and data privacy concerns in a holistic way:
Safeguard personal & business data in the cloud
Protect the data persistency layer and the database itself
Support cloud application developers
Thus,
Bolster trust of individuals & corporate customers
Accelerate adoption of cloud computing technologies
Accelerate a paradigm shift in European industry towards security and privacy
PaaSword10/11/2016 2
Cloud Paradigm Shift
Cloud paradigm has definitely prevailed in mass market
However, many companies are still cautious using Cloud
services due to security concerns
Applications and storage volumes often reside next to potentially
hostile virtual environments
Significant legal and financial consequences if data confidentiality
is breached
310/11/2016 PaaSword
Cloud Adoption Chasm Curve
Crossing the chasm for
Cloud adoption is still
relevant for
enterprises despite its
compelling benefits
<20% enterprise
applications run on the
Cloud [1]
41% report security
concerns as significant
challenge [1]
PaaSword10/11/2016 4
Mass
market
Cloud
Services
[1] RightScale, “State of the cloud report,” RightScale, 2015.
Security Challenges in the Cloud
Top threats identified (CSA, 2016) are:
Data Breaches
Weak Access Management
Insecure APIs
Account Hijacking
‘Raw data’ are the modern hacker’s holy grail
 The responsibility for the protection of data has shifted to
the developer
510/11/2016 PaaSword
How shall we lower the barriers?
Security concerns
Protect confidential information
Control access
Trust cloud provider
Secure Cloud Applications
Data privacy
Secure storage
Encryption
Trustable Key Management
Control Access to data
PaaSword
10/11/2016
6
PaaSword
PaaSword Features
Create a security-by-design framework
which will allow developers to engineer
secure applications
Leverage the security and trust of data
that reside on outsourced infrastructure
Facilitate context-aware access to
encrypted and (even) physically
distributed datasets stored in the cloud
Prove applicability, usability,
effectiveness and value of our framework
in real-life Cloud infrastructures, services
and applications
10/11/2016 8
PaaS Provider
PaaSword API
DB with
Indexers on encrypted data
Queries using Searchable
Trusted IaaS Provider
Adversary
User
Developer
Publishes Application
Encryption Scheme
using PaaSword API
encrypted data
PaaSword
A Holistic Data Privacy and
Security-by-Design Framework
Higher privacy with distributed searchable encryption at DB
layer
Increased user control and less dependency on cloud
provider with tenant-controlled Key Management
Appropriate access control with context-awareness and
flexible Policy Management
Easier development of secure cloud applications for non-
security experts with comprehensive Annotation Framework
 Making cloud solutions more attractive and ready for the EU
General Data Protection Regulation
10/11/2016 9
Consortium
• Industrial Partner
• Scientific Partner
10/11/2016 10PaaSword
10/11/2016 11
Questions?
Visit us:
www.paasword.euAcknowledgements:
This project has received funding from the
European Union’s Horizon 2020 research and
innovation programme under grant
agreement No 644814.
PaaSword

More Related Content

What's hot

Cloud Ocular_Cloud Migration
Cloud Ocular_Cloud MigrationCloud Ocular_Cloud Migration
Cloud Ocular_Cloud Migration
Rono Mukherjee
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
Poornaprajna Udupi
 
Adsg presentation en
Adsg presentation enAdsg presentation en
Adsg presentation en
Cui Jin
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
Cisco
 

What's hot (20)

Cloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the HypeCloud Access Security Brokers - What's all the Hype
Cloud Access Security Brokers - What's all the Hype
 
C-Level tools for Cloud security
C-Level tools for Cloud securityC-Level tools for Cloud security
C-Level tools for Cloud security
 
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
Turning off the lights - Going all in with the Public Cloud (Lumagate Nordic ...
 
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
Bloombase StoreSafe Intelligent Storage Firewall secures sensitive informatio...
 
Cloud Ocular_Cloud Migration
Cloud Ocular_Cloud MigrationCloud Ocular_Cloud Migration
Cloud Ocular_Cloud Migration
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Launching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public CloudLaunching a Highly-regulated Startup in the Public Cloud
Launching a Highly-regulated Startup in the Public Cloud
 
How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?How to streamline data governance and security across on-prem and cloud?
How to streamline data governance and security across on-prem and cloud?
 
Adsg presentation en
Adsg presentation enAdsg presentation en
Adsg presentation en
 
Tenzin thiley bhutia
Tenzin thiley bhutiaTenzin thiley bhutia
Tenzin thiley bhutia
 
Data Breaches: The Untold Story
Data Breaches: The Untold Story  Data Breaches: The Untold Story
Data Breaches: The Untold Story
 
Itmgen 4317 security
Itmgen 4317 securityItmgen 4317 security
Itmgen 4317 security
 
Data Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data PlatformData Masking With The Delphix Dynamic Data Platform
Data Masking With The Delphix Dynamic Data Platform
 
Cryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions GuideCryptzone SharePoint and Office 365 Security Solutions Guide
Cryptzone SharePoint and Office 365 Security Solutions Guide
 
How to Choose a Cloud Service Provider?
How to Choose a Cloud Service Provider?How to Choose a Cloud Service Provider?
How to Choose a Cloud Service Provider?
 
8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb8 major facts you must know before you buying a casb
8 major facts you must know before you buying a casb
 
Is Pharma Ready for the Cloud?
Is Pharma Ready for the Cloud?Is Pharma Ready for the Cloud?
Is Pharma Ready for the Cloud?
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
ATA meetup - Feb 2020 - DevSecOps
ATA meetup - Feb 2020 - DevSecOpsATA meetup - Feb 2020 - DevSecOps
ATA meetup - Feb 2020 - DevSecOps
 
Cloud computing projects
Cloud computing projects Cloud computing projects
Cloud computing projects
 

Viewers also liked

Interview powerpoint
Interview powerpointInterview powerpoint
Interview powerpoint
danny19982
 
Literature class schedule
Literature class scheduleLiterature class schedule
Literature class schedule
fsulitmajor
 
LauraBeeth2015MNHealthCareWorkforceChampionAward
LauraBeeth2015MNHealthCareWorkforceChampionAwardLauraBeeth2015MNHealthCareWorkforceChampionAward
LauraBeeth2015MNHealthCareWorkforceChampionAward
Laura Beeth
 
PURE Executive Brochure
PURE Executive BrochurePURE Executive Brochure
PURE Executive Brochure
David Culley
 
Peer Acceptance and the Emotional Well-Being of Disabled
Peer Acceptance and the Emotional Well-Being of DisabledPeer Acceptance and the Emotional Well-Being of Disabled
Peer Acceptance and the Emotional Well-Being of Disabled
Abigail Burmeister
 
Dhanyaj Auto_Corporate Presentation
Dhanyaj Auto_Corporate PresentationDhanyaj Auto_Corporate Presentation
Dhanyaj Auto_Corporate Presentation
Dhanyaj Auto P Ltd
 
Analysis of a professional front cover
Analysis of a professional front coverAnalysis of a professional front cover
Analysis of a professional front cover
danny19982
 

Viewers also liked (17)

Interview powerpoint
Interview powerpointInterview powerpoint
Interview powerpoint
 
Blogger libros (1)
Blogger libros (1)Blogger libros (1)
Blogger libros (1)
 
Literature class schedule
Literature class scheduleLiterature class schedule
Literature class schedule
 
Global tree overseas education consultancy
Global tree overseas education consultancyGlobal tree overseas education consultancy
Global tree overseas education consultancy
 
Mohamed Ali CV
Mohamed Ali CVMohamed Ali CV
Mohamed Ali CV
 
Williams stephanie finalppp
Williams stephanie finalpppWilliams stephanie finalppp
Williams stephanie finalppp
 
LauraBeeth2015MNHealthCareWorkforceChampionAward
LauraBeeth2015MNHealthCareWorkforceChampionAwardLauraBeeth2015MNHealthCareWorkforceChampionAward
LauraBeeth2015MNHealthCareWorkforceChampionAward
 
Enviroment Project
Enviroment ProjectEnviroment Project
Enviroment Project
 
MEOS Q315
MEOS Q315MEOS Q315
MEOS Q315
 
PURE Executive Brochure
PURE Executive BrochurePURE Executive Brochure
PURE Executive Brochure
 
Inten sari
Inten sariInten sari
Inten sari
 
Peer Acceptance and the Emotional Well-Being of Disabled
Peer Acceptance and the Emotional Well-Being of DisabledPeer Acceptance and the Emotional Well-Being of Disabled
Peer Acceptance and the Emotional Well-Being of Disabled
 
Angela Seaton Mills - Pilgrimage to holiness
Angela Seaton Mills -  Pilgrimage to holinessAngela Seaton Mills -  Pilgrimage to holiness
Angela Seaton Mills - Pilgrimage to holiness
 
Accu reference-medical-lab
Accu reference-medical-labAccu reference-medical-lab
Accu reference-medical-lab
 
Kirtesh master
Kirtesh masterKirtesh master
Kirtesh master
 
Dhanyaj Auto_Corporate Presentation
Dhanyaj Auto_Corporate PresentationDhanyaj Auto_Corporate Presentation
Dhanyaj Auto_Corporate Presentation
 
Analysis of a professional front cover
Analysis of a professional front coverAnalysis of a professional front cover
Analysis of a professional front cover
 

Similar to PaaSword - No More Dark Clouds with PaaSword

Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Private Cloud
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa
 

Similar to PaaSword - No More Dark Clouds with PaaSword (20)

PaaSword-Business Cases
PaaSword-Business CasesPaaSword-Business Cases
PaaSword-Business Cases
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Predicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud AgePredicting The Future: Security and Compliance in the Cloud Age
Predicting The Future: Security and Compliance in the Cloud Age
 
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
Microsoft Windows Azure - Platfrom Appfabric Service Bus And Access Control P...
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Oracle Cloud Computing Strategy
Oracle Cloud Computing StrategyOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy
 
PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges PaaSword's main idea, technical architecture and scientific challenges
PaaSword's main idea, technical architecture and scientific challenges
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service FrameworkA Data Privacy and Security by Design Platform‐as‐a‐Service Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Oracle's Cloud Strategy
Oracle's Cloud StrategyOracle's Cloud Strategy
Oracle's Cloud Strategy
 
Seamless Migration of Public Sector Data and Workloads to the AWS Cloud - AWS...
Seamless Migration of Public Sector Data and Workloads to the AWS Cloud - AWS...Seamless Migration of Public Sector Data and Workloads to the AWS Cloud - AWS...
Seamless Migration of Public Sector Data and Workloads to the AWS Cloud - AWS...
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
Cloud Encryption Gateways (how enterprises can leverage cloud SaaS without co...
 
Zarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter GantenZarafa SummerCamp 2012 - Keynote Peter Ganten
Zarafa SummerCamp 2012 - Keynote Peter Ganten
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
 Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
Hybrid Cloud Storage: Why HUSCO International Left Traditional Storage Behind
 

More from PaaSword EU Project

More from PaaSword EU Project (8)

PaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption EnginePaaSword - Distributed Searchable Encryption Engine
PaaSword - Distributed Searchable Encryption Engine
 
PaaSword - Technology Baseline
PaaSword - Technology BaselinePaaSword - Technology Baseline
PaaSword - Technology Baseline
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access Control
 
Daten unter Kontrolle
Daten unter KontrolleDaten unter Kontrolle
Daten unter Kontrolle
 
Towards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the CloudTowards Trusted eHealth Services in the Cloud
Towards Trusted eHealth Services in the Cloud
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 

PaaSword - No More Dark Clouds with PaaSword

  • 1. www.paasword.eu No More Dark Clouds with PaaSword Dr. Simone Braun CAS Software AG PaaSword CS-IFG Workshop Nov 10, 2016, Athens, Greece
  • 2. PaaSword: An Innovative Cloud Security-by-Design Framework Address security and data privacy concerns in a holistic way: Safeguard personal & business data in the cloud Protect the data persistency layer and the database itself Support cloud application developers Thus, Bolster trust of individuals & corporate customers Accelerate adoption of cloud computing technologies Accelerate a paradigm shift in European industry towards security and privacy PaaSword10/11/2016 2
  • 3. Cloud Paradigm Shift Cloud paradigm has definitely prevailed in mass market However, many companies are still cautious using Cloud services due to security concerns Applications and storage volumes often reside next to potentially hostile virtual environments Significant legal and financial consequences if data confidentiality is breached 310/11/2016 PaaSword
  • 4. Cloud Adoption Chasm Curve Crossing the chasm for Cloud adoption is still relevant for enterprises despite its compelling benefits <20% enterprise applications run on the Cloud [1] 41% report security concerns as significant challenge [1] PaaSword10/11/2016 4 Mass market Cloud Services [1] RightScale, “State of the cloud report,” RightScale, 2015.
  • 5. Security Challenges in the Cloud Top threats identified (CSA, 2016) are: Data Breaches Weak Access Management Insecure APIs Account Hijacking ‘Raw data’ are the modern hacker’s holy grail  The responsibility for the protection of data has shifted to the developer 510/11/2016 PaaSword
  • 6. How shall we lower the barriers? Security concerns Protect confidential information Control access Trust cloud provider Secure Cloud Applications Data privacy Secure storage Encryption Trustable Key Management Control Access to data PaaSword 10/11/2016 6 PaaSword
  • 7. PaaSword Features Create a security-by-design framework which will allow developers to engineer secure applications Leverage the security and trust of data that reside on outsourced infrastructure Facilitate context-aware access to encrypted and (even) physically distributed datasets stored in the cloud Prove applicability, usability, effectiveness and value of our framework in real-life Cloud infrastructures, services and applications 10/11/2016 8 PaaS Provider PaaSword API DB with Indexers on encrypted data Queries using Searchable Trusted IaaS Provider Adversary User Developer Publishes Application Encryption Scheme using PaaSword API encrypted data PaaSword
  • 8. A Holistic Data Privacy and Security-by-Design Framework Higher privacy with distributed searchable encryption at DB layer Increased user control and less dependency on cloud provider with tenant-controlled Key Management Appropriate access control with context-awareness and flexible Policy Management Easier development of secure cloud applications for non- security experts with comprehensive Annotation Framework  Making cloud solutions more attractive and ready for the EU General Data Protection Regulation 10/11/2016 9
  • 9. Consortium • Industrial Partner • Scientific Partner 10/11/2016 10PaaSword
  • 10. 10/11/2016 11 Questions? Visit us: www.paasword.euAcknowledgements: This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644814. PaaSword