Overview

Project Description

In CONFIDENTIAL6G, our goal is to ensure secure and private computation in the cloud-edge continuum of 6G by developing modern cryptographic techniques, tools, and libraries. We recognize the importance of implementing privacy preservation and security of data in heterogeneous environments and contexts, and thus, we prioritize researching security enablers. We aim to tackle the potential danger posed by near-future quantum computers, which can break contemporary encryptions, by exploring novel cryptographic operations.

Project Summary

Key Objectives

Quantum-resistant security
Develop security tools and cryptographic libraries for 6G confidential computing and networking.
Privacy-preserving AI/ML
Create secure, GDPR-compliant methods in multi-stakeholder environments.
Edge-cloud networking
Build secure networking for confidential computing and federated machine learning.
Modular framework
Integrate all tools and test with real 6G use cases.
Standardization support
Support 6G security standards and promote EU capabilities in future cloud technologies.

Expected Outcomes

Cryptographic libraries
Post-quantum libraries and SDKs for 6G
Computing framework
Confidential computing framework for cloud-edge environments
Privacy protocols
Privacy-preserving protocols for heterogeneous 6G networks
Security tools
Quantum-resistant security tools and artifacts
Security standards
Enhanced security standards for future 6G deployments
Our Role

Our Involvement

Abstract Machines serves as the technical manager of the Confidential6G project, leading the coordination of technical activities and ensuring successful delivery of project objectives. Our expertise in IoT infrastructure and security makes us uniquely positioned to address the privacy challenges in 6G networks.

Our Responsibilities

Technical Management
Coordinating technical activities and ensuring project milestone delivery.
Secure IoT Integration
Developing privacy-preserving IoT protocols for 6G networks.
Edge Security
Implementing confidential computing at the network edge.
Platform Development
Creating secure platforms for privacy-preserving applications.
Cryptographic Implementation
Integrating advanced cryptographic protocols into IoT systems.