What user need or pain point is your project addressing?

SecureCloud will facilitate the usage applications with high or very high security requirements. The fundamental technical challenges of the SecureCloud project will be to integrate and extend the most popular technologies of last years to ensure the dependability of cloud applications.

Project's major results: 

The SecureCloud project aims to remove technical impediments to dependable cloud computing, i.e., it will ensure the confidentiality, integrity, availability and security of applications and their data. Thereby, SecureCloud will encourage and enable a greater uptake of cost-effective, environment-friendly, and innovative cloud solutions, in particular, for critical infrastructure applications throughout Europe and Brazil. SecureCloud focuses on a particularly important domain: applications that support critical infrastructures. If one can trust a cloud to run applications in the context of critical infrastructures, one can clearly trust this cloud to run applications in a large variety of application domains. In stark contrast to traditional throughput-oriented, batch-processing cloud applications, applications in the critical infrastructure domain do not only have strong requirements with respect to confidentiality, integrity, availability, but they typically are also latency sensitive.

Target stakeholders: 

Large companies

Project Start: 
Project End: 

Potential exploitation strategy: 
The SECURECLOUD project has taken a stepwise approach to exploitation:
• Step 1: Technology review update (not SOTA analysis) of all relevant background including cloud security as well as technologies and techniques for fault and intrusion detection, auditing facilities and secure communication channels taking into account international and national directives and European strategies in order to carry out complementary primary research where required.
• Step 2: Analysis of complementary and competitive services and relevant shortcomings that need urgently to be addressed at a global level in order to pave the way of cloud adoption by industry, as well as identification of emerging best practice across several domains that addressed by the project and involving huge data processing as well as the wider involved public and private domain internationally.
• Step 3: Setting up of deployment scenarios, market and business models for individual exploitation and joint exploitation, specifying collaboration roles, costs and revenue flows, specifying as well necessary guidelines that need to apply in order to make such scenarios feasible;
• Step 4: Validation of business models and deployment scenarios within the feasibility analysis with the help of the partners’ complementary expertise and assessment of the effectiveness of the SecureCloud approach to provide a leap forward in the area of cloud security in different domains.
• Step 5: Organization, planning and execution of wide impact dissemination activities to create full awareness of SecureCloud activities, its approach and results in the academic community, among public authorities, service and solution providers as well as contributing to the EU strategic roadmap for the fast adoption and usage of cloud security modules; establishing contact with key third parties for exploitation.
• Step 6: Regular review, revision and refinement of partner-specific exploitation plans and joint and collaborative business plans in the light of interim project results; formalization of service level and other appropriate agreements for joint exploitation among partners and third parties.

Vertical Market: