Posted on

UBITECH demonstrates the security-by-design PaaSword framework at the H2020 Project Clustering Pilot Demonstrators Workshop organized by ReCRED project

On April 20, 2018, UBITECH was invited by ReCRED H2020 project to present, at the H2020 Project Clustering Pilot Demonstrators Workshop organized in Athens, Greece, how data privacy and security by design can constitute the cornerstone of the Cloud applications developed using the PaaSword framework. During PaaSword H2020 project, UBITECH has led the development of an innovative framework that enhances advanced security in the next generation Cloud applications by revolutionizing the Cloud developers’ toolkit in order to protect them against internal and external adversaries. The PaaSword framework enables security annotations, that can be used transparently in the application code, transformed into context-aware security policies that enable Attribute-Based Access Control (ABAC) in the application and enforce cryptographic protection and physical distribution for securing sensitive data.

During the workshop, UBITECH showed an interactive walkthrough on how to use PaaSword to make Cloud applications secure by design; exemplified by a PaaSword-enabled xERP application. UBITECH demonstrated how to create and update context models and access control policies and rules, and how PaaSword annotations are appended to the Cloud Application code within your IDE at pre-bootstrapping time. At bootstrapping time, access policies are translated into inference engine’s rules based on policy sets and combining algorithms; knowledge is extracted from the context model; and the distributed key management mechanism is bootstrapped as well as all relevant data artefacts (distributed and encrypted). During run-time, any access request is intercepted and analysed; relevant context information is extracted and relevant access control policies are evaluated to decide if the request is granted or not. If the request is granted the process of serving the specific request continues while the application and user key shares are propagated to the trusted DB-proxy. A video highlighting the main aspects of PaaSword is available here, while photos from the presentation can be found here.

Source: https://twitter.com/ReCRED_H2020/status/974569368762937344