Identifying Cross-sector Enablers for Privacy and Cybersecurity

RomyGeneral News

20 December 2019

Identifying Cross-sector Enablers for Privacy and Cybersecurity

This document, which is being submitted as a CyberSec4Europe deliverable (D3.1), aims to identify both the generic and cross-sectoral enablers for privacy and cybersecurity, as well as the research challenges for common technologies in these domains.

Europe’s Cybersecurity Strengths

The document focuses on a variety of building blocks and assets that already exist within the CyberSec4Europe consortium, explaining how they can be used in the demonstration use cases, and identifying the initial research challenges.

In order to address Europe’s next generation cybersecurity challenges, CyberSec4Europe is conducting research and innovation through technology advancements, supporting both the autonomy of the Digital Single Market as well as addressing the security of the European citizen, European industry, as well as Europe’s economy and society as a whole. Specifically, the project is developing and implementing security and privacy enablers with a special focus on the following eight domains:

  • Identity management and authentication solutions over multiple non-federated providers, with a special focus on user privacy while still giving high authenticity guarantees to the relying party;
  • Security and privacy services for edge computing platforms;
  • Technologies to reduce the system attack surface;
  • Security mechanisms based on trusted execution environments (TEE) and frameworks for TEE-based cloud data processing;
  • Privacy-preserving middleware for the Internet of Things (IOT);
  • Security and privacy by design approaches
  • Decentralized, evidence-based authorisation and distributed access control using blockchains;
  • Long-term privacy- and integrity-preserving storage and processing of critical data.

The document gives an overview of cybersecurity building blocks that have already been developed or are currently under development within the consortium. It catalogues a variety of cross-domains tools and technologies that solve specific cybersecurity challenges that occur in different application scenarios and that are flexible enough to be adapted for different needs.  By presenting technological building blocks, mapping them to a unified privacy architecture, and identifying open research challenges from the industrial demonstration use cases, the document is a connecting link between actual research, research roadmap design, and the demonstration use cases themselves.


Stephan Krenn