WITDOM concept

width=

WITDOM will put particular focus in data-outsourcing scenarios, where new threats, vulnerabilities and risks due to new uses require end-to-end security solutions that will withstand progress for the lifetime of applications they support.
The prime example of the target environment would be a Cloud service.

Data is being processed by external third parties. The data must be protected not only from access by unauthorized agents, but also from the parties that perform processing and storage, which are not necessarily trusted.

WITDOM helps service providers to protect outsourced data with advanced privacy enhancing technologies and encryption techniques in compliance with the EU Data Protection Regulation. WITDOM allows performing verifiable operations over the encrypted or obfuscated data without the need of decryption.

The distinction between “trusted” and “untrusted” domains occurs according to the views, assumptions, and policies determined by a so-called end user of certain applications. The end user is the entity that is ultimately responsible for running applications and for consuming their outputs.
The “trusted” domain is represented by the infrastructure or also called “on-premise”.
The “untrusted” domain is represented by an external infrastructure provider that offers a platform or services that are used to outsource data and business-related processing.