Secure and trustworthy system architectures

The aim is to provide a trustworthy platform that enables the implementation of medical use cases involving medical end devices (consisting of sensors and actuators) and cloud-based data processing in a secure, data protection-compliant, effective and efficient, inexpensive and durable manner.

The aim is to develop a secure and trustworthy platform for medical use cases. The entire processing chain is to be mapped, starting with the collection of medical data by sensors, through its (cloud-based) processing and the resulting control of medical devices. One challenge that will be addressed as part of the project is the consideration of certification requirements in the field of medical devices. Accordingly, extensive protective measures are being developed that consider both end devices and cloud-based data processing.

The developed platform is to be modular in design so that it is also manageable and adaptable for small and medium-sized companies, thus significantly lowering the hurdle for the development of trustworthy, highly integrated and cloud-native medical devices compared to the current state of the art.

An additional challenge is the implementation of a flexible architecture that allows adaptation to the different requirements of markets in Europe, China or the USA, for example.

A data protection impact assessment is carried out during development in order to derive technical and organizational measures for secure and data protection-compliant data processing (in accordance with the “privacy by design/default” paradigm) and implement them for the entire life cycle of medical data processing.

The implementation of these objectives is carried out in cooperation between companies with many years of experience in the field of medical data processing and the development of secure, distributed data processing systems and research partners with expertise in the field of trustworthiness and formal methods.

  • Tim Hentschel | Barkhausen Institute
  • Stefan Köpsell | Barkhausen Institute, Research Group Leader „Trustworthy​ Data Processing“
  • Werner Haas | Cyberus Technologies GmbH
  • Dipl.-Ing. Detlef Houdeau, Dr. rer. nat. Regina Kluge, Tanja Seiderer | Infineon Technologies AG
  • Michael Hohmuth | Kernkonzept GmbH
  • Lia Mehr | secunet Security Networks AG
  • Markus Wolf | secunet Security Networks AG
  • Ivan Gudymenko, Kerstin Harzendorf | Telekom MMS
  • Dr. Christel Baier, Dr.-Ing. Sascha Klüppelholz | TUD Dresden University of Technology, Faculty of Computer Science
  • Winfried Scheibe, Dr. Andreas Bachmeier | Carl Zeiss Digital Innovation GmbH
Verified by MonsterInsights