Data Encryption
DATAPRIV |
|
This tool provides the means for processing data in different ways, supporting different purposes with different privacy requirements. It includes several components providing the capabilities to encrypt data while preserving the format or ordering of the data. This tool enables users of legacy applications to move their databases to a public cloud, while preserving data privacy and confidentiality. Moreover, the tool provides components for data generalization as means for anonymizing bulk data using k-anonymity techniques. |
Contact: admin[at]prismacloud.eu More information: |
WITDOM E2EE | |
The WITDOM End-2-End Encryption (E2EE) component provides protection functionalities in terms of locally encrypting data in the trusted domain before storing them in the untrusted domain for the secure backup purposes. |
Contact: miha.stopar[at]xlab.si More information: Client https://bitbucket.org/xlab-witdom/e2ee-client |
WITDOM Data Masking |
|
WITDOM’s data masking component is responsible for masking sensitive data classified as direct identifiers. The masking process creates service-and-user-specific tokens that can be updated over time, satisfying two main security requirements: irreversibility and unlinkability. |
Contact: bur[at]zurich.ibm.com More information: |
WITDOM Secure Computation |
|
The Secure Computation component offers data protection functionalities by means of homomorphic encryption (HE) and secure multiparty computation (MPC), thus enabling privacy preserving computation in the untrusted domain. |
Contact: svetla.nikova[at]esat.kuleuven.be More information: |
WITDOM Secure Signal Processing |
|
WITDOM’s Secure Signal Processing (SSP) component performs secure signal processing operations on protected data and signals (encrypted, obfuscated, split or a combination thereof) in an untrusted environment, by preventing the disclosure of the sensitive information while it is being processed in the untrusted domain. |
Contact: ladkinson[at]gradiant.org More information: |
WITDOM Anonymization |
|
Protection component that allows to anonymize data stored in a relational database. It selects automatically the anonymization algorithm that is more suitable for the data and the users' privacy requirements, and applies it seamlessly to the data, in order to protect privacy. |
More information: |
WITDOM Key Manager |
|
The WITDOM Key Management component provides management of secrets (for example, private and public encryption keys or credentials to access the storage) that are required for operations run by protection components. Since secrets are required in trusted and untrusted domains, there are two instances of the KM component in the WITDOM architecture with similar functionalities. |
Contact: alberto.crespo[at]atos.net More information: KM Java client repository https://gitlab.atosresearch.eu/ari/witdom-core-km-client-pub |