{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T21:08:18Z","timestamp":1774991298736,"version":"3.50.1"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T00:00:00Z","timestamp":1575417600000},"content-version":"vor","delay-in-days":3,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Cloud computing considerably reduces the costs of deploying applications through on-demand, automated and fine-granular allocation of resources. Even in private settings, cloud computing platforms enable agile and self-service management, which means that physical resources are shared more efficiently. Nevertheless, using shared infrastructures also creates more opportunities for attacks and data breaches. In this paper, we describe the SecureCloud approach. The SecureCloud project aims to enable confidentiality and integrity of data and applications running in potentially untrusted cloud environments. The project leverages technologies such as Intel SGX, OpenStack and Kubernetes to provide a cloud platform that supports secure applications. In addition, the project provides tools that help generating cloud-native, secure applications and services that can be deployed on potentially untrusted clouds. The results have been validated in a real-world smart grid scenario to enable a data workflow that is protected end-to-end: from the collection of data to the generation of high-level information such as fraud alerts.<\/jats:p>","DOI":"10.1186\/s13677-019-0141-z","type":"journal-article","created":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T19:03:28Z","timestamp":1575486208000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Secure end-to-end processing of smart metering data"],"prefix":"10.1186","volume":"8","author":[{"given":"Andrey","family":"Brito","sequence":"first","affiliation":[]},{"given":"Christof","family":"Fetzer","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"K\u00f6psell","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Pietzuch","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Pasin","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[]},{"given":"Keiko","family":"Fonseca","sequence":"additional","affiliation":[]},{"given":"Marcelo","family":"Rosa","sequence":"additional","affiliation":[]},{"suffix":"Jr","given":"Luiz","family":"Gomes","sequence":"additional","affiliation":[]},{"given":"Rodrigo","family":"Riella","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Prado","sequence":"additional","affiliation":[]},{"given":"Luiz F.","family":"Rust","sequence":"additional","affiliation":[]},{"given":"Daniel E.","family":"Lucani","sequence":"additional","affiliation":[]},{"given":"M\u00e1rton","family":"Sipos","sequence":"additional","affiliation":[]},{"given":"L\u00e1szl\u00f3","family":"Nagy","sequence":"additional","affiliation":[]},{"given":"Marcell","family":"Feh\u00e9r","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,4]]},"reference":[{"key":"141_CR1","unstructured":"Intel (2015) Intel Software Guard Extensions. Cryptology ePrint Archive, Report 2016\/086. https:\/\/software.intel.com\/sites\/default\/."},{"key":"141_CR2","unstructured":"ZigBee Standards Organization (2012) ZigBee Specification 053474r20. Rev. 20."},{"key":"141_CR3","unstructured":"Associa\u00e7\u00e3o Brasileira de Normas T\u00e9cnicas (ABNT) (2008) Interc\u00e2mbio de informa\u00e7\u00f5es para sistemas de medi\u00e7\u00e3o de energia el\u00e9trica. Rev. 1."},{"key":"141_CR4","unstructured":"Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O\u2019Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, Fetzer C (2016) Scone: Secure linux containers with intel sgx In: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201916, 689\u2013703.. USENIX Association, Berkeley. http:\/\/dl.acm.org\/citation.cfm?id=3026877.3026930."},{"key":"141_CR5","doi-asserted-by":"publisher","unstructured":"Szefer J, Keller E, Lee RB, Rexford J (2011) Eliminating the hypervisor attack surface for a more secure cloud In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS \u201911, 401\u2013412. https:\/\/doi.org\/10.1145\/2046707.2046754.","DOI":"10.1145\/2046707.2046754"},{"issue":"1","key":"141_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini S, Kavitha V (2011) Review: A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1\u201311.","journal-title":"J Netw Comput Appl"},{"key":"141_CR7","unstructured":"Costan V, Devadas S (2016) Intel SGX Explained. Cryptology ePrint Archive, Report 2016\/086. http:\/\/eprint.iacr.org\/2016\/086."},{"key":"141_CR8","doi-asserted-by":"publisher","unstructured":"McKeen F, Alexandrovich I, Berenzon A, Rozas CV, Shafi H, Shanbhogue V, Savagaonkar UR (2013) Innovative instructions and software model for isolated execution In: Proceedings of the 2Nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP \u201913, 10\u20131101.. ACM, New York. https:\/\/doi.org\/10.1145\/2487726.2488368, http:\/\/doi.acm.org\/10.1145\/2487726.2488368.","DOI":"10.1145\/2487726.2488368"},{"key":"141_CR9","unstructured":"OpenStack FoundationOpenStack User Survey November 2017. https:\/\/www.openstack.org\/assets\/survey\/OpenStack-User-Survey-Nov17.pdf. Access 1 Apr 2019."},{"key":"141_CR10","unstructured":"Cloud Native Computing Foundation (2017) Cloud Native Technologies Are Scaling Production Applications. https:\/\/www.cncf.io\/blog\/2017\/12\/06\/cloud-native-technologies-scaling-production-applications\/. Access 1 Apr 2019."},{"key":"141_CR11","doi-asserted-by":"publisher","unstructured":"Pires R, Pasin M, Felber P, Fetzer C (2016) Secure content-based routing using intel software guard extensions In: Proceedings of the 17th International Middleware Conference, Middleware \u201916, 10\u201311010.. ACM, New York. https:\/\/doi.org\/10.1145\/2988336.2988346. http:\/\/doi.acm.org\/10.1145\/2988336.2988346.","DOI":"10.1145\/2988336.2988346"},{"key":"141_CR12","doi-asserted-by":"publisher","unstructured":"Pires R, Gavril D, Felber P, Onica E, Pasin M (2017) A lightweight mapreduce framework for secure processing with sgx In: Proceedings of the 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid \u201917, 1100\u20131107.. IEEE Press, Piscataway. https:\/\/doi.org\/10.1109\/CCGRID.2017.129. https:\/\/doi.org\/10.1109\/CCGRID.2017.129.","DOI":"10.1109\/CCGRID.2017.129 10.1109\/CCGRID.2017.129"},{"key":"141_CR13","doi-asserted-by":"publisher","unstructured":"Lucani DE, Feher M, Fonseca K, Rosa M, Despotov B (2018) Secure and scalable key value storage for managing big data in smart cities using intel sgx In: 2018 IEEE International Conference on Smart Cloud (SmartCloud), 70\u201376. https:\/\/doi.org\/10.1109\/SmartCloud.2018.00020.","DOI":"10.1109\/SmartCloud.2018.00020"},{"key":"141_CR14","doi-asserted-by":"crossref","unstructured":"Aublin P-L, Kelbert F, O\u2019Keeffe D, Muthukumaran D, Priebe C, Lind J, Krahn R, Fetzer C, Eyers D, Pietzuch P (2018) LibSEAL: Revealing Service Integrity Violations Using Trusted Execution In: Proceedings of the Thirteenth EuroSys Conference, 24:1\u201324:15.. ACM, New York. http:\/\/doi.acm.org\/10.1145\/3190508.3190547. http:\/\/doi.org\/10.1145\/3190508.3190547.","DOI":"10.1145\/3190508.3190547"},{"key":"141_CR15","doi-asserted-by":"publisher","unstructured":"Ataide I, Vinha G, Souza C, Brito A (2018) Implementing quality of service and confidentiality for batch processing applications In: 2018 IEEE\/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), 258\u2013265. https:\/\/doi.org\/10.1109\/UCC-Companion.2018.00065.","DOI":"10.1109\/UCC-Companion.2018.00065"},{"key":"141_CR16","doi-asserted-by":"publisher","unstructured":"Vaucher S, Pires R, Felber P, Pasin M, Schiavoni V, Fetzer C (2018) Sgx-aware container orchestration for heterogeneous clusters In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 730\u2013741. https:\/\/doi.org\/10.1109\/ICDCS.2018.00076.","DOI":"10.1109\/ICDCS.2018.00076"},{"key":"141_CR17","doi-asserted-by":"publisher","unstructured":"Fetzer C, Mazzeo G, Oliver J, Romano L, Verburg M (2017) Integrating reactive cloud applications in sereca In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES \u201917, 39\u20131398.. ACM, New York. https:\/\/doi.org\/10.1145\/3098954.3105820. http:\/\/doi.acm.org\/10.1145\/3098954.3105820.","DOI":"10.1145\/3098954.3105820"},{"key":"141_CR18","doi-asserted-by":"publisher","unstructured":"Brasileiro F, Brito A, Blanquer I (2018) Atmosphere: Adaptive, trustworthy, manageable, orchestrated, secure, privacy-assuring, hybrid ecosystem for resilient cloud computing In: 2018 48th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 51\u201352. https:\/\/doi.org\/10.1109\/DSN-W.2018.00025.","DOI":"10.1109\/DSN-W.2018.00025"},{"key":"141_CR19","unstructured":"Oleksenko O, Trach B, Krahn R, Silberstein M, Fetzer C (2018) Varys: Protecting SGX enclaves from practical side-channel attacks In: 2018 USENIX Annual Technical Conference (USENIX ATC 18), 227\u2013240.. USENIX Association, Boston. https:\/\/www.usenix.org\/conference\/atc18\/presentation\/oleksenko."}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-019-0141-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13677-019-0141-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-019-0141-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T00:15:22Z","timestamp":1606954522000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-019-0141-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["141"],"URL":"https:\/\/doi.org\/10.1186\/s13677-019-0141-z","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"6 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"19"}}