D3.7 Pilot III Integration: Air Quality Monitoring System use case.

This document continues the work reflected in D3.3 describing the efforts carried out to deploy the CIPSEC platform in the environmental pilot. The Environmental pilot architecture is modified and updated to guarantee easy accommodation of the pilot requirements. Then, the subsequent steps are: deployment, integration, evaluation and validation. The deployment of the CIPSEC platform seeks for a comprehensive evaluation and subsequent validation of the whole platform.

In WP3 CSI integrated the CIPSEC solution on the environment monitoring system, jointly with other partners listed below:

  • ATOS VM Image (NIDS + CyberAgent)
  • AEGIS Forensics Visualization tool (FVT)
  • FORTH Honeypot
  • BITDEFENDER GravityZone

In this document the steps necessary to install and configure the Air Quality Regional Network environment with the expected applications of the framework are described. Project partners have offered their top solutions that, conceived for specific security issues, play their role in contexts and scenarios that are very different from each other and are not specifically designed for our Pilot.

The detected environmental data reach central systems on which are analyzed, validated and finally published on the portal of the public administration. It is reasonable to deduce that the test bed described in this document, based on the replication of an air quality data collection infrastructure, can provide useful indications to similar critical infrastructures when one has to worry about securing calculation architectures.

The Air Quality Analysis and Monitoring is becoming ever more important as pollution-related phenomena are closely linked to public health. Data collections of air quality are acquired to manage public transport policies and periodically, once validated, they are sent to the European Commission. Precisely because of the importance that these data assume, as a test bed, a replica of the completely virtualized air quality network infrastructure was chosen, leveraging the benefits of cloud computing.

In addition, the model of using virtualized machines, with an infrastructure identified as Virtual Data Centre comparable as a Virtual Private Cloud, allows to validate the infrastructure as an innovative delivery model such as security as a service. Some security-related applications adapt natively to this model and it is possible to operate with real-time analysis and control tools of IT security by remotely operating and allowing to act also in external domains such as those of local customer networks or on computing units at the cloud provider offer by third parties.