Agency: Cordis | Branch: H2020 | Program: IA | Phase: DS-02-2014 | Award Amount: 5.21M | Year: 2015
Industry needs alternatives to textual passwords for access control. While tokens can still be stolen or transferred to other persons, biometrics technology can provide reliable, cost-effective and user-friendly solutions. The proliferation of smart services calls for unsupervised authentication at a distance. Being natural, non-intrusive and readily compatible with smart and mobile devices, automatic speaker verification (ASV) is an appealing solution. Even so, todays state-of-the-art ASV systems lack robustness to environmental variability and are vulnerable to spoofing. Concerns regarding interoperability, scalability and privacy also form barriers to exploitation. While embracing standards, in addition to a privacy and interoperability-by-design ethos, OCTAVE will integrate commercial-grade and new, hybrid ASV systems with the latest environmental robustness and anti-spoofing technologies to deliver a scalable, trusted biometric authentication service (TBAS). While simultaneously relieving end-users from the inconvenience of dealing with textual passwords, the OCTAVE platform will reduce the economic and practical burdens related to password loss and recovery. The TBAS will support single (text-dependent, text-prompted and text-independent) in addition to hybrid operating modes. The delegation of authentication to a single, yet distributed TBAS, will increase trust and privacy, avoid single points of failure and allow for rapid breach notification and remediation. Solutions will be installed in data-sensitive and mission-critical services and validated in two real commercial trials: banking services and physical access within a critical airport infrastructure. Flexibility will support wider exploitation in future applications in, for example, customer care, telephone banking, e-commerce, logical and physical access control. OCTAVE will thus fuel new opportunities for commercial services making use of electronic identification and authentication.
Wang L.,Eurecom |
Kuo G.-S.G.S.,National Chengchi University
IEEE Communications Surveys and Tutorials | Year: 2013
In heterogeneous wireless networks, an important task for mobile terminals is to select the best network for various communications at any time anywhere, usually called network selection. In recent years, this topic has been widely studied by using various mathematical theories. The employed theory decides the objective of optimization, complexity and performance, so it is a must to understand the potential mathematical theories and choose the appropriate one for obtaining the best result. Therefore, this paper systematically studies the most important mathematical theories used for modeling the network selection problem in the literature. With a carefully designed unified scenario, we compare the schemes of various mathematical theories and discuss the ways to benefit from combining multiple of them together. Furthermore, an integrated scheme using multiple attribute decision making as the core of the selection procedure is proposed. © 1998-2012 IEEE. Source
Agency: Cordis | Branch: H2020 | Program: RIA | Phase: ICT-07-2014 | Award Amount: 4.19M | Year: 2015
Although cloud computing offers many benefits, security issues such as confidentiality and privacy are still major concerns to those intending to migrate to the cloud. Traditional cloud security has been based on assurance to customers that cloud providers follow sound security practices. As a result, current security mechanisms are commonly located within the cloud platform, hence compelling customers to trust cloud providers. However, customers might be reluctant to outsource sensitive data due to lack of control over data storage and management. To reach its full potential, cloud computing needs solid security mechanisms that enhance trust in cloud computing by allowing cloud customers to have a greater control over the security and privacy of their data. Moreover, it is also necessary to consider countermeasures to ensure that vulnerabilities or attacks do not have a negative impact on cloud security and that applications continue to operate and provide a good level of service even during an attack. The main objective of CLARUS is to enhance trust in cloud computing services by developing a secure framework for the storage and processing of data outsourced to the cloud that allows end users to monitor, audit and retain control of the stored data without impairing the functionality and cost-saving benefits of cloud services. The CLARUS solution will provide the end user with a dedicated proxy located in a trusted domain implementing security and privacy features towards the cloud provider. The proxy is intended to be deployed within the client computer, in a server within the users domain, in an edge device (e.g. a router), or in any other location trusted by the user. CLARUS will also provide a set of security auditing services enabling the user to supervise the security operations performed by the CLARUS framework as well as other trust-enhancing features.
Agency: Cordis | Branch: H2020 | Program: ERC-ADG | Phase: ERC-ADG-2014 | Award Amount: 2.36M | Year: 2015
Advances in theory, integration techniques and standardization have led to huge progress in wireless technologies. Despite successes with past and current (5G) research, new paradigms leading to greater spectral efficiencies and intelligent network organizations will be in great demand to absorb the continuous growth in mobile data. Our ability to respond suitably to this challenge in the next decade will ensure sustained competitiveness in the digital economy. With few exceptions such as ad-hoc topologies, classical wireless design places the radio device under the tight control of the network. Promising technologies envisioned in 5G such as (i) Coordinated MultiPoint (CoMP) techniques, (ii) Massive MIMO, or (ii) Millimeter-wave (MMW) by-and-large abide by this model. Pure network-centric designs, such as optical cloud-supported ones raise cost and security concerns and do not fit all deployment scenarios. Also they make the network increasingly dependent on a large amount of signaling and device-created measurements. Our project envisions a radically new approach to designing the mobile internet, which taps into the devices new capabilities. Our approach recasts devices as distributed computational nodes solving together multi-agent problems, allowing to maximize the network performance by exploiting local measurement and information exchange capabilities. The success of the project relies on the understanding of new information theory limits for systems with decentralized information, the development of novel device communication methods, and advanced team-based statistical signal processing algorithms. The potential gains associated with exploiting the devices collective, network friendly, intelligence are huge. The project will demonstrate long-term impact of the new paradigm, in pushing the frontiers of mobile internet performance, as well as short- to mid-term impact through its adaptation to currently known communications scenarios and techniques.
Agency: Cordis | Branch: H2020 | Program: RIA | Phase: ICT-32-2014 | Award Amount: 6.47M | Year: 2015
The current trend for data placement shows a steady shift towards the cloud. The advent of cloud storage and computation services however comes at the expense of data security and user privacy. To remedy this, customers nowadays call for end-to-end security whereby only end-users and authorized parties have access to their data and no-one else. This is especially true after the outbreak of data breaches and global surveillance programs last year. In the TREDISEC project, we address this problem and we develop systems and techniques which make the cloud a secure and efficient heaven to store data. We plan to step away from a myriad of disconnected security protocols or cryptographic algorithms, and to converge on a single framework where all objectives are met. More specifically, TREDISEC addresses the confidentiality and integrity of outsourced data in the presence of a powerful attacker who controls the entire network. In addition, our proposed security primitives support data compression and data deduplication, while providing the necessary means for cloud providers to efficiently search and process encrypted data. By doing so, TREDISEC aims at creating technology that will impact existing businesses and will generate new profitable business opportunities long after the project is concluded.