Towards an End-to-End
Architecture for Run-time
Data Protection in the Cloud
Nazila Gol Mohammadi*, Zoltan Adam Mann*, Andreas Metzger*,
Maritta Heisel*, James Greig+
* paluno, +OCC
Motivational Example
2SEAA 2018, Prague
IaaS Cloud
Provider X
FR
Component
A
DB
PaaS Cloud
provider
US
Component B is deployed
in a non-EU geolocation.
Access violates GPDR
wrt. geo-location policies.
Data is transferred to SaaS
provided by untrusted entity,
thus threat to data protection
Component and thus its data is deployed on
non-secure infrastructure and thus data
may be compromised
Data is deployed in non-
secure DB and thus data
may be compromised
SaaS Cloud
Provider Z
Data Consumer
IaaS Cloud
Provider Y
DataData Subject
Legislative Organ Data Controller A
Com-
ponent
C
Component
B
Challenges for Data Protection
Uncertainty at design time of run-time changes
• Dynamic deployment, migration, change of privacy preferences, …
• Privacy- and Security-by-Design no longer sufficient
 Runtime data protection
Conflicting goals
• Security techniques can have considerable overhead
• May negatively impact costs, performance, etc.
 Trade-off between conflicting goals
Complex interactions among multiple entities
• Software, hardware, services, stakeholders, …
• “Isolated”, individual solutions not sufficient
 End-to-end architecture and integrated solutions
3SEAA 2018, Prague
Solution Idea
End-to-end architecture for integration and dynamic
adaptation of data protection techniques
4SEAA 2018, Prague
End-to-End Runtime
Data Protection
Exploiting
Secure
Hardware for
Secure Data
Storage and
Processing
Sticky
Policies
&
Secure Data
Life-cycle
Models@
Runtime
&
Self-
Adaptation
Automated
Risk Analysis
&
Management
Development and Validation Process
Overview of process phases
5
1. Requirements
Engineering
2. Design of E2E
Architecture
3. Validation
SEAA 2018, Prague
1. Requirements Engineering
6
1) Requirements Engineering
1a) Context Analysis
(Identifying Roles and
Entities)
1b) Requirements
Identification
(Goal and Scenario Modelling)
Privacy Framework from
ISO/IEC 29100
General Data Protection
Regulation (GDPR)
List of Actors
& Context
Entities
Goal
Model
SEAA 2018, Prague
2. Design of E2E Architecture
Considerations to manage complexity
• Define architecture on conceptual level
 no deployment concerns (e.g., distribution)
• Focus on run-time concerns
 design tools considered separately
• Identify key functions and concerns
 high-level components
• Define principal information flow
 conceptual interfaces (low coupling)
7SEAA 2018, Prague
2. Design of E2E Architecture
8SEAA 2018, Prague
Application
Data Controller
Cloud infrastructure
(public, private, …)
Sensitive data
store
Data
gatekeeper
Adaptation
Risk
assessment
monitor
adapt
register*
register
Data access
protection
data access
adapt
monitor
* Data Subject may register
directly with Data
Gatekeeper or via Application
Data Subject
request
System
modeling
2. Design of E2E Architecture
9SEAA 2018, Prague
Application
Data Controller
Cloud infrastructure
(public, private, …)
Sensitive data
store
Data
gatekeeper
Adaptation
Risk
assessment
Run-time
model
proposed adaptation
risk impact of proposed adaptation
policies, service contracts
current risk level too high
analyze
update
monitor
adapt
analyze
service contracts
register*
register
request
Data access
protection
data access
request
restrictions
monitor
adapt
adapt
monitor
Logging
log log
log
log
policy change
Data Subject
System
modeling
3. Validation
10
3) Validation
3a) Scenario-
based Validation
3b) Case
Study
Scenarios for
Goal
Satisfaction
Application
Example
SEAA 2018, Prague
3. Validation
Example scenario for scenario-based validation
11SEAA 2018, Prague
3. Validation
Commercial case study
• Data subjects
• Vulnerable adults living at home
• Data users
1) Volunteers
2) Social care providers
• Data access
1) Matchmaking between volunteers
and vulnerable adults
2) Anonymous access to geographical
data about people with unmet needs
• Deployment on public cloud
12SEAA 2018, Prague
Conclusion and Outlook
Initial design of
End-to-End architecture
for data protection
in the cloud
Future work
• From conceptual to technical architecture (decentralization of
components, programmatic APIs, …)
• Exploiting TOSCA for run-time model
SEAA 2018, Prague 13
Thank you!
https://restassuredh2020.eu
Research leading to these results
has received funding from …the
EU’s Horizon 2020 research and
innovation programme under grant
agreement 731678 (RestAssured)
SEAA 2018, Prague 14
Requirements for E2E architecture
• R1: Registration of data subjects to for specifying/updating their
privacy preferences
• R2: Access to sensitive data of data subjects regulated by data
protection policies
• R3: Registration of data controllers for specifying offered service
contracts
• R4: Applications requests access to sensitive data
• R5: Compliance of application’s accesses to data protection policies
• R6: Data controllers need monitoring capabilities
• R7: Identification of violations
• R8: Data controllers need adaptations capabilities (for data protection)
• R9: Data controllers should identify risks w.r.t. to data protection
15SEAA 2018, Prague
Design of E2E architecture
Data Gatekeeper (cont.)
• Manages the data protection policies and service
contracts
• Decides, based on the available policies and contracts,
which operations are allowed
16SEAA 2018, Prague
Design of E2E architecture
Data Access Protection (cont.)
• Ensuring conformance of data accesses to the policies
• Secure enclaves and cryptographic techniques for
ensuring data confidentiality and integrity
• Access control to enforce the compliance with the
data protection policies
•
17SEAA 2018, Prague
Design of E2E architecture
Adaptation (cont.)
• Responsible for the satisfaction of data protection
goals in the presence of run-time changes
• Continuously monitoring of the system and its
environment
• Analysing detected changes w.r.t. its impact on
data protection
• Devising a plan to adapt the system if a identified
change represents an actual or imminent problem
• Carrying out planned adaptations by reconfiguration
18SEAA 2018, Prague
Design of E2E architecture
Risk Assessment (cont.)
• Responsible for continuous run-time risks assessment
• Triggering Adaptation component if the risk level is too
high
• Assessing risk impact of planned adaptations to ensure
that proposed changes by adaptation:
• will be compliant with the data protection policies
• do not introduce unacceptable risks
19SEAA 2018, Prague
2. Design of E2E Architecture
Run-time Model
• Considers all relevant assets and their relationships within
system and its context
• Up-to-date by monitoring
• Model information is used by multiple components to
reason about
• current situation
• associated risks of data protection violation
• other requirement violations
20SEAA 2018, Prague

More Related Content

PPTX
Overview of GovCloud Today
PDF
Python ieee list 2018
PPTX
Conduit - A Lightweight Data Virtualization Tool
PPTX
Centralize Security and Governance with Data Virtualization
PDF
Denodo DataFest 2017: Company Leadership from Data Leadership
PPTX
A Little Security For Big Data
PDF
Logical Data Fabric: An Introduction
PDF
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
Overview of GovCloud Today
Python ieee list 2018
Conduit - A Lightweight Data Virtualization Tool
Centralize Security and Governance with Data Virtualization
Denodo DataFest 2017: Company Leadership from Data Leadership
A Little Security For Big Data
Logical Data Fabric: An Introduction
Denodo DataFest 2017: Conquering the Edge with Data Virtualization

What's hot (20)

PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
PDF
Secure Your Data with Virtual Data Fabric (ASEAN)
PDF
Graphs in Telecommunications - Jesus Barrasa, Neo4j
PDF
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
DOCX
Cloud computing projects
PDF
The Linked Data Advantage
PDF
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
PPTX
Web Analytics In 5 Minutes Or Less
PDF
Operationalize with alerting, custom dashboards, and timelines
PDF
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
PDF
Accelerate Self-service Analytics with Universal Semantic Model
PDF
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PDF
Fluency® - www.fluencysecurity.com
PPTX
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
PDF
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
PDF
Cloud gateways for regulatory compliance
PDF
Big Data Security and Governance
DOC
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
PPTX
Building a future-proof cyber security platform with Apache Metron
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
How to Swiftly Operationalize the Data Lake for Advanced Analytics Using a Lo...
Secure Your Data with Virtual Data Fabric (ASEAN)
Graphs in Telecommunications - Jesus Barrasa, Neo4j
Product Keynote: Advancing Denodo’s Logical Data Fabric with AI and Advanced ...
Cloud computing projects
The Linked Data Advantage
Gianluigi Vigano, Senior Architect and Fouad Teban, Regional Presales Manager...
Web Analytics In 5 Minutes Or Less
Operationalize with alerting, custom dashboards, and timelines
Data Virtualization enabled Data Fabric: Operationalize the Data Lake (APAC)
Accelerate Self-service Analytics with Universal Semantic Model
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Fluency® - www.fluencysecurity.com
YugaByte DB - "Designing a Distributed Database Architecture for GDPR Complia...
GraphTour 2020 - Allianz: Empower your business with Graph Analytics
Cloud gateways for regulatory compliance
Big Data Security and Governance
A secure and dynamic multi keyword ranked search scheme over encrypted cloud ...
Building a future-proof cyber security platform with Apache Metron
Ad

Similar to Towards an End-to-End Architecture for Run-time Data Protection in the Cloud (20)

PDF
Cognizant Cloud for Utilities
PDF
Effective Information Flow Control as a Service: EIFCaaS
PDF
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
PDF
IRJET- Deduplication of Encrypted Bigdata on Cloud
PDF
IRJET- Two ways Verification for Securing Cloud Data
PPTX
cloudComputingSec_p3.pptx
PDF
A Systematic Review Paper On Cloud Security
PPTX
Novel cloud computingsecurity issues
PDF
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
PDF
Analysis of Cloud Computing Security Concerns and Methodologies
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
PDF
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
PPTX
Apply big data and data lake for processing security data collections
PDF
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
PDF
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
PDF
TechWiseTV Workshop: Cisco DNA Center Assurance
PDF
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
PDF
A proposed Solution: Data Availability and Error Correction in Cloud Computing
PDF
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
Cognizant Cloud for Utilities
Effective Information Flow Control as a Service: EIFCaaS
IRJET- Efficient Geometric Range Search on RTREE Occupying Encrypted Spatial ...
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Two ways Verification for Securing Cloud Data
cloudComputingSec_p3.pptx
A Systematic Review Paper On Cloud Security
Novel cloud computingsecurity issues
IRJET- A Survey on Remote Data Possession Verification Protocol in Cloud Storage
Analysis of Cloud Computing Security Concerns and Methodologies
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Apply big data and data lake for processing security data collections
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
TechWiseTV Workshop: Cisco DNA Center Assurance
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
A proposed Solution: Data Availability and Error Correction in Cloud Computing
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
Ad

More from Andreas Metzger (16)

PPTX
Explainable Online Reinforcement Learning for Adaptive Systems
PPTX
Data Quality Issues in Online Reinforcement Learning for Self-Adaptive System...
PPTX
Explaining Online Reinforcement Learning Decisions of Self-Adaptive Systems
PPTX
Antrittsvorlesung - APL.pptx
PPTX
Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
PPTX
Triggering Proactive Business Process Adaptations via Online Reinforcement Le...
PPTX
Data-driven AI for Self-Adaptive Software Systems
PPTX
Data-driven Deep Learning for Proactive Terminal Process Management
PPTX
Big Data Technology Insights
PPTX
Proactive Process Adaptation using Deep Learning Ensembles
PPTX
Data-driven AI for Self-adaptive Information Systems
PPTX
Considering Non-sequential Control Flows for Process Prediction with Recurren...
PPTX
Big Data Value in Mobility and Logistics
PPTX
Predictive Business Process Monitoring considering Reliability and Risk
PDF
Risk-based Proactive Process Adaptation
PDF
Predictive Process Monitoring Considering Reliability Estimates
Explainable Online Reinforcement Learning for Adaptive Systems
Data Quality Issues in Online Reinforcement Learning for Self-Adaptive System...
Explaining Online Reinforcement Learning Decisions of Self-Adaptive Systems
Antrittsvorlesung - APL.pptx
Feature Model-Guided Online Reinforcement Learning for Self-Adaptive Services
Triggering Proactive Business Process Adaptations via Online Reinforcement Le...
Data-driven AI for Self-Adaptive Software Systems
Data-driven Deep Learning for Proactive Terminal Process Management
Big Data Technology Insights
Proactive Process Adaptation using Deep Learning Ensembles
Data-driven AI for Self-adaptive Information Systems
Considering Non-sequential Control Flows for Process Prediction with Recurren...
Big Data Value in Mobility and Logistics
Predictive Business Process Monitoring considering Reliability and Risk
Risk-based Proactive Process Adaptation
Predictive Process Monitoring Considering Reliability Estimates

Recently uploaded (20)

PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Build automations faster and more reliably with UiPath ScreenPlay
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Ensemble model-based arrhythmia classification with local interpretable model...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
The AI Revolution in Customer Service - 2025
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Human Computer Interaction Miterm Lesson
PDF
SaaS reusability assessment using machine learning techniques
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Connector Corner: Transform Unstructured Documents with Agentic Automation
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Module 1 Introduction to Web Programming .pptx
A symptom-driven medical diagnosis support model based on machine learning te...
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Build automations faster and more reliably with UiPath ScreenPlay
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Ensemble model-based arrhythmia classification with local interpretable model...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
The AI Revolution in Customer Service - 2025
Auditboard EB SOX Playbook 2023 edition.
Human Computer Interaction Miterm Lesson
SaaS reusability assessment using machine learning techniques
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV

Towards an End-to-End Architecture for Run-time Data Protection in the Cloud

  • 1. Towards an End-to-End Architecture for Run-time Data Protection in the Cloud Nazila Gol Mohammadi*, Zoltan Adam Mann*, Andreas Metzger*, Maritta Heisel*, James Greig+ * paluno, +OCC
  • 2. Motivational Example 2SEAA 2018, Prague IaaS Cloud Provider X FR Component A DB PaaS Cloud provider US Component B is deployed in a non-EU geolocation. Access violates GPDR wrt. geo-location policies. Data is transferred to SaaS provided by untrusted entity, thus threat to data protection Component and thus its data is deployed on non-secure infrastructure and thus data may be compromised Data is deployed in non- secure DB and thus data may be compromised SaaS Cloud Provider Z Data Consumer IaaS Cloud Provider Y DataData Subject Legislative Organ Data Controller A Com- ponent C Component B
  • 3. Challenges for Data Protection Uncertainty at design time of run-time changes • Dynamic deployment, migration, change of privacy preferences, … • Privacy- and Security-by-Design no longer sufficient  Runtime data protection Conflicting goals • Security techniques can have considerable overhead • May negatively impact costs, performance, etc.  Trade-off between conflicting goals Complex interactions among multiple entities • Software, hardware, services, stakeholders, … • “Isolated”, individual solutions not sufficient  End-to-end architecture and integrated solutions 3SEAA 2018, Prague
  • 4. Solution Idea End-to-end architecture for integration and dynamic adaptation of data protection techniques 4SEAA 2018, Prague End-to-End Runtime Data Protection Exploiting Secure Hardware for Secure Data Storage and Processing Sticky Policies & Secure Data Life-cycle Models@ Runtime & Self- Adaptation Automated Risk Analysis & Management
  • 5. Development and Validation Process Overview of process phases 5 1. Requirements Engineering 2. Design of E2E Architecture 3. Validation SEAA 2018, Prague
  • 6. 1. Requirements Engineering 6 1) Requirements Engineering 1a) Context Analysis (Identifying Roles and Entities) 1b) Requirements Identification (Goal and Scenario Modelling) Privacy Framework from ISO/IEC 29100 General Data Protection Regulation (GDPR) List of Actors & Context Entities Goal Model SEAA 2018, Prague
  • 7. 2. Design of E2E Architecture Considerations to manage complexity • Define architecture on conceptual level  no deployment concerns (e.g., distribution) • Focus on run-time concerns  design tools considered separately • Identify key functions and concerns  high-level components • Define principal information flow  conceptual interfaces (low coupling) 7SEAA 2018, Prague
  • 8. 2. Design of E2E Architecture 8SEAA 2018, Prague Application Data Controller Cloud infrastructure (public, private, …) Sensitive data store Data gatekeeper Adaptation Risk assessment monitor adapt register* register Data access protection data access adapt monitor * Data Subject may register directly with Data Gatekeeper or via Application Data Subject request System modeling
  • 9. 2. Design of E2E Architecture 9SEAA 2018, Prague Application Data Controller Cloud infrastructure (public, private, …) Sensitive data store Data gatekeeper Adaptation Risk assessment Run-time model proposed adaptation risk impact of proposed adaptation policies, service contracts current risk level too high analyze update monitor adapt analyze service contracts register* register request Data access protection data access request restrictions monitor adapt adapt monitor Logging log log log log policy change Data Subject System modeling
  • 10. 3. Validation 10 3) Validation 3a) Scenario- based Validation 3b) Case Study Scenarios for Goal Satisfaction Application Example SEAA 2018, Prague
  • 11. 3. Validation Example scenario for scenario-based validation 11SEAA 2018, Prague
  • 12. 3. Validation Commercial case study • Data subjects • Vulnerable adults living at home • Data users 1) Volunteers 2) Social care providers • Data access 1) Matchmaking between volunteers and vulnerable adults 2) Anonymous access to geographical data about people with unmet needs • Deployment on public cloud 12SEAA 2018, Prague
  • 13. Conclusion and Outlook Initial design of End-to-End architecture for data protection in the cloud Future work • From conceptual to technical architecture (decentralization of components, programmatic APIs, …) • Exploiting TOSCA for run-time model SEAA 2018, Prague 13
  • 14. Thank you! https://restassuredh2020.eu Research leading to these results has received funding from …the EU’s Horizon 2020 research and innovation programme under grant agreement 731678 (RestAssured) SEAA 2018, Prague 14
  • 15. Requirements for E2E architecture • R1: Registration of data subjects to for specifying/updating their privacy preferences • R2: Access to sensitive data of data subjects regulated by data protection policies • R3: Registration of data controllers for specifying offered service contracts • R4: Applications requests access to sensitive data • R5: Compliance of application’s accesses to data protection policies • R6: Data controllers need monitoring capabilities • R7: Identification of violations • R8: Data controllers need adaptations capabilities (for data protection) • R9: Data controllers should identify risks w.r.t. to data protection 15SEAA 2018, Prague
  • 16. Design of E2E architecture Data Gatekeeper (cont.) • Manages the data protection policies and service contracts • Decides, based on the available policies and contracts, which operations are allowed 16SEAA 2018, Prague
  • 17. Design of E2E architecture Data Access Protection (cont.) • Ensuring conformance of data accesses to the policies • Secure enclaves and cryptographic techniques for ensuring data confidentiality and integrity • Access control to enforce the compliance with the data protection policies • 17SEAA 2018, Prague
  • 18. Design of E2E architecture Adaptation (cont.) • Responsible for the satisfaction of data protection goals in the presence of run-time changes • Continuously monitoring of the system and its environment • Analysing detected changes w.r.t. its impact on data protection • Devising a plan to adapt the system if a identified change represents an actual or imminent problem • Carrying out planned adaptations by reconfiguration 18SEAA 2018, Prague
  • 19. Design of E2E architecture Risk Assessment (cont.) • Responsible for continuous run-time risks assessment • Triggering Adaptation component if the risk level is too high • Assessing risk impact of planned adaptations to ensure that proposed changes by adaptation: • will be compliant with the data protection policies • do not introduce unacceptable risks 19SEAA 2018, Prague
  • 20. 2. Design of E2E Architecture Run-time Model • Considers all relevant assets and their relationships within system and its context • Up-to-date by monitoring • Model information is used by multiple components to reason about • current situation • associated risks of data protection violation • other requirement violations 20SEAA 2018, Prague

Editor's Notes

  • #16: R1: Registration of data subjects to the E2E run-time data protection system for specifying / updating their privacy preferences. R2: Access to sensitive data of data subjects is regulated by data protection policies. R3: Registration of data controllers to the E2E run-time data protection system for specifying contracts of offered services. R4: Requests for access to sensitive data by applications. R5: Compliance of application’s accesses to sensitive data with the data protection policies. R6: Data controllers monitor applications, the infrastructure and changes in data protection policies. R7: Identification of violations regarding data protection. R8: Support for data controllers in performing adaptations on applications and the cloud infrastructure. R9: Support for data controllers in identifying risks with respect to data protection, thus facilitating proactive adaptations.
  • #17: Manages the data protection policies and service contracts governing the data life-cycle. Decides, based on the available policies and contracts, which operations are allowed for a certain data. Addresses requirements: R1, R2, and R3.
  • #18: Ensuring that data accesses are secure and conform to the relevant policies. Applying secure enclaves and cryptographic techniques for ensuring data confidentiality and integrity. Involvement in access control to enforce the compliance with the specified data protection policies. Addresses requirements R2, R4, and R5
  • #19: Responsible for the satisfaction of requirements in the presence of run-time changes. Continuously monitoring of the system and its environment. Analysing detected changes with respect to its impact on data protection and other quality attributes. Devising a plan to adapt the system if a identified change represents an actual or imminent problem. Carrying out planned adaptations by reconfiguring the appropriate component or context entity. Addresses requirements: R6, R7, and R8.
  • #20: Responsibility for continuous run-time assessment of risks for data protection. Assessing of risks associated with the current system setup  triggering Adaptation component if the risk level is too high. Assessing of risk impact of planned adaptations for ensuring that changes, proposed by adaptation will be compliant with the available policies do not introduce unacceptable risks of data protection violation. Addresses requirements: R7 and R9.