Category: Research

Can Parquet file encryption make you a safer driver?

“The last ten years have seen a dramatic rise in the wireless transmission and use of automotive sensor data — commonly known as “telematics”. UPS, an early pioneer in telematics for delivery fleet management, collects over 1.25 billion telematics records per week, and through analysis of this data, is able to save nearly one million gallons of […]

Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach

paluno _ The Ruhr Institute for Software Technology of the University of Duisburg-Essen published the paper entitled “Context Analysis of Cloud Computing Systems Using a Pattern-Based Approach” in Future Internet. Future Internet is a scholarly peer-reviewed open access journal on Internet technologies and the information society for presenting science and research concerned with evolution of Internet technologies […]

Cloud Supply Chain Cyber Risk Assessment

This post describes the Cloud Supply Chain Cyber Risk Assessment (CSCCRA) research project from the Cyber Security CDT, Oxford University. Comparisons are also made with the risk assessment processes in RestAssured.    The researcher is Olusola Akinrolabu, a doctoral student of the Cyber Security CDT in the computer science Department of Oxford University, supervised by […]

RestAssured: Securing Cloud Analytics – SYSTOR 2018

The secure analytics platform used in RestAssured, and developed by partner organisation IBM Research, was presented at the ACM International Systems and Storage Conference (SYSTOR) in June 2018. The accepted poster, “RestAssured: Securing Cloud Analytics”, which details the approach and the associated technologies such as Intel SGX, Apache Spark SQL and Opaque, has been published and […]

Open Source – Trust Management in Intel SGX Enclaves

“Intel SGX (Software Guard Extension) technology, available in Skylake and later processors, allows to create secure memory regions (enclaves) protected with hardware encryption in the SoC (system on chip). The data is in cleartext only inside the processor. It is encrypted in the SoC before leaving to the main memory, and decrypted in SoC upon […]