Scalable privacy-preserving technologies for cross-border federated computation in Europe involving personal data
HORIZON Research and Innovation Actions
Basic Information
- Identifier
- HORIZON-CL3-2021-CS-01-04
- Programme
- Increased cybersecurity 2021
- Programme Period
- 2021 - 2027
- Status
- Closed (31094503)
- Opening Date
- June 30, 2021
- Deadline
- October 21, 2021
- Deadline Model
- single-stage
- Budget
- €21,500,000
- Keywords
- Privacy policiesPrivacy by designTrust and privacyDigital AgendaPrivacy Enhancing Technologies (PET)Big dataAuthentication protocols/frameworks, authorizationHomomorphic encryption(user-centric) privacy preservationEOSC and FAIR dataPrivacy concerns, behaviours, and practicesHealth dataArtificial IntelligenceGDPRfederated data infrastructurespersonalised recommendationsEU heath data spaceprivacy infringementprivacy-preserving computationsecure multiparty computationOpen Sciencepersonal data
Description
Projects are expected to contribute to some of the following expected outcomes:
- Improved scalable and reliable privacy-preserving technologies for federated processing of personal data and their integration in real-world systems
- More user-friendly solutions for privacy-preserving processing of federated personal data registries by researchers
- Improving privacy-preserving technologies for cyber threat intelligence and data sharing solution
- Contribution to promotion of GDPR compliant European data spaces for digital services and research (in synergy with topic DATA-01-2021 of Horizon Europe Cluster 4)
- Strengthened European ecosystem of open source developers and researchers of privacy-preserving solutions
The proposal should provide appropriate indicators to measure its progress and specific impact.
Scope:Using big data for digital services and scientific research brings about new opportunities and challenges. For example, machine learning methods process medical and behavioural data for finding causes and explanations for diseases or health risks. However, a large amount of this data is personal data. Leakage or abuse of this kind of data and potential privacy infringement (e.g. attribute disclosure or membership inference) risks are a cybersecurity threat to individuals, society and economy and an impediment for further developing data spaces involving personal data. Vice versa, adequate protection of this data according to the GDPR can also prevent its full utilization for society. Advanced privacy-preserving computation techniques such as homomorphic encryption, secure multiparty computation, and differential privacy are being researched and have proven promising to address these challenges. However, further research is required to ensure their applicability in real-world use case scenarios. For example, fully homomorphic encryption is not practically applicable in many cases and secure multi-party computation often imposes special infrastructural requirements.
Building on research and innovation in the area of privacy-preserving computation, proposals should address scalability and reliability of privacy-preserving technologies in realistic problem areas and take integration with existing infrastructures and traditional security measures (e.g. access control) into account. They should respond to users’ needs, e.g. for research and digital services in access and data management for citizens geared towards their own profiles (incl. dynamic personalised recommendations for improved cybersecurity) or in personalised medicine, taking into account the gender dimension where relevant. They should further address the legacy variation in personal data types and data models across different organisations in the same business sector and/or across different potential application sectors. A proposed solution should include validation or piloting of privacy-preserving computation in realistic federated data infrastructures and more specifically European data spaces involving personal data (e.g. the EU heath data space). It should be guided by the EU’s high standards concerning the right to privacy, protection of personal data, and the protection of fundamental rights in the digital age. It should ensure, by-design, compliance with data regulations and specifically the GDPR. Wherever possible, solutions should be developed as open source software.
Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side, i.e. industry, service providers and end-users. Participation of SMEs is strongly encouraged. Legal expertise should also be incorporated to assess and ensure compliance of the technical project results with data regulations and the GDPR.
Cross-cutting Priorities:Destination & Scope
Europe is in the midst of a digital transformation. Digital technologies are profoundly changing our daily life, our way of working and doing business, and the way people travel, communicate and relate with each other. Digital communication, social media interaction, artificial intelligence, e-government, e-commerce and digital enterprises are steadily transforming our world. They are generating an ever-increasing amount of data, which, if pooled and used, can lead to a completely new means and levels of value creation. The more interconnected we are, however, the more we are vulnerable to cyber threats.
Digital disruption, notably caused by malicious cyber activities, not only threaten our economies but also our way of life, our freedoms and values, and even try to undermine the cohesion and functioning of our democracy in Europe.
Regardless of the economic, political or personal motivations behind the cyber threats, securing our future wellbeing, freedoms, democratic governance, and prosperity depend on improving our capacity to shield the EU from malicious attacks and to address digital security weaknesses in general. The digital transformation requires improving cybersecurity substantially, so as to ensure the protection of the increasing number of connected devices and the safe operation of network and information systems, including the ones used in power grids, drinking water supply and distribution services, vehicles and transport systems, hospitals and the overall health system, finances, public institutions, factories, and homes. Europe must build resilience to cyber-attacks and create effective cyber deterrence, while making sure that data protection and freedom of citizens are strengthened. These efforts should include considerations for particularly vulnerable organisations and citizens.
The technological tools of cybersecurity are strategic assets, as well as being key growth technologies for the future. It is in the EU's strategic interest to ensure that the EU retains and develops the essential capacities to secure its digital economy, society and democracy, to protect critical hardware and software and to provide key cybersecurity services.
Cybersecurity research and innovation activities will support a Europe fit for the digital age, enabling and supporting digital innovation while highly preserving privacy, security, safety and ethical standards. They will contribute to the implementation of the digital and privacy policy of the Union, in particular the NIS Directive[[Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (NIS Directive).]], the EU Cybersecurity Act[[Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act).]], the EU Cybersecurity Strategy[[Joint Communication to the European Parliament and the Council The EU's Cybersecurity Strategy for the Digital Decade JOIN/2020/18 final.]], the GDPR[[Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation).]], and the future e-Privacy Regulation.
Research and innovation will build on the results of Horizon 2020 such as the pilot projects funded under SU-ICT-03-2018[[Establishing and operating a pilot for a Cybersecurity Competence Network to develop and implement a common Cybersecurity Research & Innovation Roadmap.]].and other relevant H2020 topics and cybersecurity activities (e.g. carried out by ENISA[[https://www.enisa.europa.eu/]] or relevant parts of work of the EIT Digital[[https://www.eitdigital.eu/]]). The activities will be aligned as relevant with the future objectives of the Cybersecurity Competence Centre and Network of National Coordination Centres (Commission proposal COM(2018) 630). They will be complementary to actions under the Digital Europe Programme, Specific Objectives 3 and 4, which will strengthen EU cybersecurity capacity by support to deployment of cybersecurity infrastructures and tools across the EU, for public administrations, businesses, and individuals, and support digital skills including in cybersecurity. For example support is foreseen to specialised education programmes or modules in key capacity areas such as cybersecurity. Generally, cybersecurity is a horizontal challenge and is not be limited to Horizon Europe Cluster 3. In addition to the calls of the Horizon Europe of Cluster 3 - Civil Security for Society, other activities relevant for Cybersecurity will be supported in particular in the Work Programme part of Cluster 4 - Digital, Industry and Space.
Research and innovation results may feed into the operational work on preparedness and response in the Joint Cyber Unit[[see section 2.1 in The EU's Cybersecurity Strategy for the Digital Decade, JOIN(2020) 18 final. https://eur-lex.europa.eu/legal-content/GA/TXT/?uri=CELEX:52020JC0018]].
Expected impact:
Proposals for topics under this Destination should set out a credible pathway contributing to the following impact of the Strategic Plan 2021-2024: "Increased cybersecurity and a more secure online environment by developing and using effectively EU and Member States’ capabilities in digital technologies supporting protection of data and networks aspiring to technological sovereignty in this field, while respecting privacy and other fundamental rights; this should contribute to secure services, processes and products, as well as to robust digital infrastructures capable to resist and counter cyber-attacks and hybrid threats".
More specifically, proposals should contribute to the achievement of one or more of the following impacts:
- Strengthened EU cybersecurity capacities and European Union sovereignty in digital technologies
- More resilient digital infrastructures, systems and processes
- Increased software, hardware and supply chain security
- Secured disruptive technologies
- Smart and quantifiable security assurance and certification shared across the EU
- Reinforced awareness and a common cyber security management and culture
Eligibility & Conditions
General conditions
1. Admissibility conditions: described in Annex A and Annex E of the Horizon Europe Work Programme General Annexes
Proposal page limits and layout: described in Part B of the Application Form available in the Submission System
2. Eligible countries: described in Annex B of the Work Programme General Annexes
A number of non-EU/non-Associated Countries that are not automatically eligible for funding have made specific provisions for making funding available for their participants in Horizon Europe projects. See the information in the Horizon Europe Programme Guide.
3. Other eligibility conditions: described in Annex B of the Work Programme General Annexes
4. Financial and operational capacity and exclusion: described in Annex C of the Work Programme General Annexes
5. Evaluation and award:
- Award criteria, scoring and thresholds are described in Annex D of the Work Programme General Annexes
- Submission and evaluation processes are described in Annex F of the Work Programme General Annexes and the Online Manual
- Indicative timeline for evaluation and grant agreement: described in Annex F of the Work Programme General Annexes
6. Legal and financial set-up of the grants: described in Annex G of the Work Programme General Annexes
Specific conditions
7. Specific conditions: described in the [specific topic of the Work Programme]
Documents
Call documents:
Standard application form (HE RIA, IA)
Standard evaluation form (HE RIA, IA)
HE General MGA v1.0 -
Additional documents:
HE Main Work Programme 2021–2022 – 1. General Introduction
HE Main Work Programme 2021–2022 – 6. Civil Security for Society
HE Main Work Programme 2021–2022 – 13. General Annexes
HE Programme and Rules for Participation Regulation 2021/695
HE Specific Programme Decision 2021/764
Rules for Legal Entity Validation, LEAR Appointment and Financial Capacity Assessment
EU Grants AGA — Annotated Model Grant Agreement
Funding & Tenders Portal Online Manual
Support & Resources
Online Manual is your guide on the procedures from proposal submission to managing your grant.
Horizon Europe Programme Guide contains the detailed guidance to the structure, budget and political priorities of Horizon Europe.
Funding & Tenders Portal FAQ – find the answers to most frequently asked questions on submission of proposals, evaluation and grant management.
Research Enquiry Service – ask questions about any aspect of European research in general and the EU Research Framework Programmes in particular.
Enterprise Europe Network – contact your EEN national contact for advice to businesses with special focus on SMEs. The support includes guidance on the EU research funding.
IT Helpdesk – contact the Funding & Tenders Portal IT helpdesk for questions such as forgotten passwords, access rights and roles, technical aspects of submission of proposals, etc.
European IPR Helpdesk assists you on intellectual property issues.
CEN-CENELEC Research Helpdesk and ETSI Research Helpdesk – the European Standards Organisations advise you how to tackle standardisation in your project proposal.
The European Charter for Researchers and the Code of Conduct for their recruitment – consult the general principles and requirements specifying the roles, responsibilities and entitlements of researchers, employers and funders of researchers.
Partner Search Services help you find a partner organisation for your proposal.
Latest Updates
No updates available.