Secure Computing Continuum (IoT, Edge, Cloud, Dataspaces)

Inicio / Programas UE / HORIZON / HORIZON-CL3-2023-CS-01-01
Logo

(HORIZON-CL3-2023-CS-01-01) - SECURE COMPUTING CONTINUUM (IOT, EDGE, CLOUD, DATASPACES)

Programme: Horizon Europe Framework Programme (HORIZON)
Call: Increased Cybersecurity 2023 EU

Topic description

ExpectedOutcome:

Projects’ results are expected to contribute to some or all of the following outcomes:

  • Tools to support cybersecurity resilience, preparedness, awareness, and detection within critical infrastructures and across supply chains;
  • Cloud infrastructures vulnerabilities mitigation;
  • Secure integration of untrusted IoT in trusted environments;
  • Use of Zero-Trust architectures;
  • Trust & Security for massive connected IoT ecosystems & lifecycle management;
  • Secure interoperability and integration of systems;
  • AI-based automation tools for cyber threat intelligence;
  • Secure infrastructure, secure Identities and usability for a security chain covering communication, data collection, data transport, and data processing.
Scope:

The evolution of our interconnected society brings multiple layers of cloud, edge computing, and IoT platforms that continuously interact with each other. Yet this always-connected ecosystem populated with potentially vulnerable entities requires advanced, smart and agile protection mechanisms to manage the security and privacy of individual components throughout their lifecycle and of overall systems. The complexity of such interconnected environments underlines the need for the proactive and automated detection, analysis, and mitigation of cybersecurity attacks in cloud, at the edge, for OT, IoT deployments, and in application domains such as, for example, smart cities. Integrating end-to-end security and user-centric privacy in complex distributed platforms requires work to address security threats and vulnerabilities over the entire platform ecosystem.

The identification and analysis of potential regulatory aspects and barriers for the developed technologies/solutions is encouraged, where relevant.

Keywords

Cybersecurity Computing Technologies Internet of Things Trusted computing Artificial Intelligence Security Digital Agenda Cloud, Edge and Virtualisation Cloud computing Cybersecurity Research Domains

Tags

Trust & Security Zero-Trust architectures communication, data collection, data transport, and data processing secure Identities and usability IoT in trusted environments security chain resilience, preparedness, awareness, and detection within critical infrastructures and across supply chains Cyber security AI-based automation tools Secure infrastructure Secure interoperability Cloud infrastructures vulnerabilities mitigation cyber threat intelligence

¿No encuentras la financiación que necesitas?

Contacta con nosotros y cuentanos cuál es tu proyecto.