SAFEcrypto Deliverable D9.1 Case Study Specifications and Requirements has been added to the Outcomes section and is available to download now.
The purpose of this document is to specify the case studies to be demonstrated in SAFEcrypto, and provide requirements that must be met by the technologies to be developed in Work Packages (WPs) 5-8. This specification of the case studies will also feed into WP3, in order to provide a basis for the vulnerability and risk analysis performed there.
This document specifies the three case studies used within SAFEcrypto:
- Satellite Key Management – In this case study, satellites are considered as entities in a wider ‘network of space-based entities’, potentially involving other spacecraft, as well as on the ground multiple ground stations, Operational Control Centres (OCC) and end users. In terms of key management, each of these may need to establish keys with each other.
- Commercial Off-The-Shelf (COTS) in Public Safety Communication – This case study aims towards the growing secure COTS communication marketplace. There is an increasing need for ‘critical communication’ markets (public safety, etc.) to require more secure communication but no longer have the economy of scale, nor budgets to build bespoke secure communication systems. Similarly, there are critical but insecure communication systems in operation (critical national infrastructure, power generation/grids, etc.) which will not encounter a technology refresh within a generation. In this case study we consider the possibility to ‘bolt on’ a security enabling component which can achieve this.
- Privacy-Preserving Municipal Data Analytics – There are many areas in which analysis of large data sets owned by a governmental agency could provide significant opportunities for improvements in efficiency of operation, identification of fraud, government-citizen relationships, reduction of risk and other areas. The opportunity to derive insights from the large data sets owned by a government organization is greatly improved if the organization can invite academic and industry researchers to participate in collaborative analytics across the data set, both in shared projects and in sub-contracted projects. In this case study, we propose to use the SAFEcrypto cryptographic mechanisms, both to segment the data that it provides to the research participants and to protect information that may be subject to privacy concerns.
For each case study we provide a high level description, and assumptions about the scope and operating environment of the systems, or sub-systems, that we propose to consider in detail. A system architecture and corresponding security architecture are then provided. It is important to note that these architectures are not intended as detailed specifications of the systems, from which real development could take place. They are merely provided at the fairly low level of detail required to highlight the functionality used in each case study, and to generate the requirements for cryptographic algorithms and associated key management needed by WPs 3-8.
Based on the case study descriptions and architectures, requirements are then provided for the security solutions. These requirements cover functional requirements on the security solutions, non-functional requirements on the solutions (e.g. performance), and security assurance and certification requirements that may need to be kept in mind for the security solutions in the use-case context.