Public DELIVERABLES

D5.1: Distributed attestation, identity and threat sharing enablers - Rel.A

Identity verification, authentication, and authorization are also essential for allowing only entities with the appropriate attributes to access a service or information related to the level of trustworthiness evidence. Self-Sovereign Identity (SSI) represents a progression from user-centric identity, allowing users to have complete control over their own identity without the need for a central authority. Towards this direction, blockchain technologies are leveraged in PRIVATEER both in regard to identity management as well as trustworthy data exchange as it pertains to trustworthiness evidence, leveraged for Trust Assessment. Blockchain by design offers a transparent and auditable means for information exchange, apart from confidentiality and integrity protection. one of Zero Trust. Furthermore, the EU’s 6G vision for the next generation of telecommunications places great importance on privacy, implementing the necessary measures to provide advanced security while upholding privacy. To adhere to the privacy requirements, PRIVATEER adopts Zero Knowledge Proofs-based schemes, which provide a verifiable means to assert the configuration integrity of a virtualised service without revealing any details regarding the exact evidence that was obtained. Additionally, a Trust Exposure Layer is proposed to harmonise the acquired information, giving access to external (to the infrastructure) parties strictly to information regarding the level of trust. Finally, Searchable Encryption mechanisms are further leveraged in Cyber Threat Intelligence search operations, for protecting critical infrastructures by conducting searches over encrypted data.

D4.1: Privacy-aware slicing and orchestration enablers - Rel.A

The PRIVATEER project proposes a privacy-first approach to address two of the main challenges of B5G and 6G networks, those of security and privacy. To achieve that, the orchestration layer needs to consider both, security and privacy in its operations. Indeed, our Privacy-aware Orchestrator (PaO) uses 2 metrics specifically collected by PRIVATEER’s enablers to achieve such a target, namely the Level of Trust (LoT) and Privacy Index (PI) metrics. The LoT estimates how trustable E2E services are and the underlying infrastructure in which they are deployed. The PI is used to estimate how privacy-sensitive information is managed during the lifecycle of a given service. Both metrics are periodically updated by two PRIVATEER’s components that feed the PaO. The Security Analytics component and the PaO’s Decision Engine consider both metrics in its orchestration decisions. Among others, decisions could include live migration of VNFs to enhance security, privacy, or both. Furthermore, Deep Reinforcement Learning (DRL) is used to reward decisions that achieve positive results in terms of enhanced security & privacy. Explainable AI (XAI) is used to provide visibility and traceability in this process.

D3.1: Decentralised Robust Security Analytics Enablers - Rel.A.

The present deliverable documents the first release of the PRIVATEER security analytics modules, which have been researched and developed within Work Package 3 (WP3) “Decentralised Robust Security Analytics”. The main objective of WP3 is to develop and integrate cutting-edge technologies to provide robust, privacy-preserving and trustworthy artificial intelligence (AI) security analytics algorithms, which can reliably detect potential cybersecurity threats in decentralised settings, such as Internet-of -Things (IoT) ecosystems. To safeguard the privacy and security of cloud-to-edge devices in a way applicable to the various PRIVATEER use cases, specific requirements and key performance indicators (KPIs) have been elicited. These are now being realised in the design and the architecture of the WP3 components. The use of artificial intelligence (AI) models for decentralised anomaly detectionis a particular focus. This report reflects the current work progress in implementing the requirements and the advances achieved during the first period of the project

D2.3: PRIVATEER Framework Demonstrator - Rel.A

This document describes the first integrated release of the PRIVATEER framework. The release is based on the work carried out by the consortium to implement the architecture for the PRIVATEER as defined D2.2 [1]. Furthermore, it outlines the functionalities already implemented to achieve the initial objectives of the project and the specific use case requirements. To that end, the project has designed three workflows that verify the integration between various components, ensuring that they interact efficiently and effectively to form a cohesive system. Each workflow highlights specific functionalities of the components deployed as part of this release and demonstrates the integration between these components

D2.2: Use cases, requirements and design report

Deliverable D2.2 is the second technical deliverable of Work Package 2 for the PRIVATEER project. It serves to define the use cases and requirements to be
implemented and demonstrated in the project while offering an introduction of the framework and the various enablers that will play a crucial role within the PRIVATEER architecture. In alignment with growing privacy and security concerns within the context of 6G networks, this document explores five use cases, that showcase how PRIVATEER can seamlessly integrate into future network generations of Smart Cities and Intelligent Transportation Systems (ITS), following the “privacy-first security” paradigm, which is dedicated to safeguarding user information while ensuring the privacy of transmitted data across diverse solutions.

D2.1: 6G threat landscape and gap analysis
This is the first deliverable of Work Package 2 (WP2), “PRIVATEER framework design, integration and evaluation”, denoted D2.1 “6G threat landscape and gap analysis”. The main objective of the WP2 includes all the system engineering activities for the PRIVATEER framework, namely requirements management, design and specification, integration and verification via use case scenarios. More specifically, the main objectives addressed in this document include a comprehensive identification of the threat landscape in 6G, with a specific focus on new/evolved threats through an extensive literature review with a drill down on the identifiable risk factors that contribute to privacy leakage of end users, service providers and infrastructure providers. Furthermore, identifying gaps related to 6G candidate technologies and also proposing specific security and privacy related 6G Key Performance Indicators (KPIs) and Key Value Indicators (KVIs).
Scroll to Top