Secure, Autonomous and AI-Based Systems
Secure, Autonomous and AI-Based Systems
The digital transformation and expansion of cyber-physical systems increasingly require more collaborative solutions and human-machine interaction. Cognitive computing also increases the autonomy of systems (e.g. autonomous vehicles and flying objects). At the same time, it also poses challenges in communication and interface design between components and systems, data acquisition and analysis using artificial intelligence (e.g. Big Data, machine learning), and IT security.
Research in this area is conducted primarily at the Affective and Cognitive Institute (ACI), Institute for Machine Learning and Analytics (IMLA), Institute for Unmanned Aerial Systems (IUAS), and the Institute of Reliable Embedded Systems and Communication Electronics (ivESK).
Title | PAL SAaaS: Building Triangular Trust for Secure Cloud Auditing |
Short Name | PAL SAaaS |
Short Description | The most relevant security threats in cloud computing are data breaches and data loss. Thus, to bring cloud computing to the next level, customers need to be ensured that a cloud provider securely and transparently offers the promised functionality. The currently discussed and probably most promising concept is 'Security Adit as a Service' (SAaaS) where a third party, called the auditor, supervises the cloud provider on behalf of the user. Therefore, the overall project is to develop and integrate cryptographic building blocks for secure and liable cloud audits. Our focus will be on PAL as the acronym for: Privacy: The process of auditing requires the collection and analysis of digital evidence about the user and/or the service provider. It is necessary that by doing so, the privacy of these parties must not be violated. This also includes aspects like confidentiality of outsourced data. Availability: A main concern with respect to the usage of cloud services is the availability of the outsourced data. Consequently, this needs to be also addressed by a cloud service audit. In addition, availability is necessary for the collected meta data and the results of computations as well. Liability: This property has been mostly overlooked so far. Especially when cloud services are used by entreprises, the question of liability needs to be settled. This covers both the service provider and the auditor. In cryptographic terms: each party needs to be able to convincingly prove that it did its job. |
Year Of Acquisition | 2015 |
Start Date | 2015-11-01 |
End Date | 2019-03-31 |
Project Managers | Westhoff, Dirk, Prof. Dr. |
Faculties | M |
Institution | ivESK |