Call: Scalable privacy-preserving technologies for cross-border federated computation in Europe involving personal data
|Type of Fund||Direct Management|
|Description of programme |
"Horizon Europe - Cluster 3 - Destination 4: Increased Cybersecurity"
Europe is in the midst of a digital transformation. Digital technologies are profoundly changing our daily life, our way of working and doing business, and the way people travel, communicate and relate with each other. Digital communication, social media interaction, artificial intelligence, e-government, e-commerce and digital enterprises are steadily transforming our world. They are generating an ever-increasing amount of data, which, if pooled and used, can lead to a completely new means and levels of value creation. The more interconnected we are, however, the more we are vulnerable to cyber threats.
Digital disruption, notably caused by malicious cyber activities, not only threaten our economies but also our way of life, our freedoms and values, and even try to undermine the cohesion and functioning of our democracy in Europe.
Regardless of the economic, political or personal motivations behind the cyber threats, securing our future wellbeing, freedoms, democratic governance, and prosperity depend on improving our capacity to shield the EU from malicious attacks and to address digital security weaknesses in general. The digital transformation requires improving cybersecurity substantially, so as to ensure the protection of the increasing number of connected devices and the safe operation of network and information systems, including the ones used in power grids, drinking water supply and distribution services, vehicles and transport systems, hospitals and the overall health system, finances, public institutions, factories, and homes. Europe must build resilience to cyber-attacks and create effective cyber deterrence, while making sure that data protection and freedom of citizens are strengthened. These efforts should include considerations for particularly vulnerable organisations and citizens.
The technological tools of cybersecurity are strategic assets, as well as being key growth technologies for the future. It is in the EU's strategic interest to ensure that the EU retains and develops the essential capacities to secure its digital economy, society and democracy, to protect critical hardware and software and to provide key cybersecurity services.
Research and innovation will build on the results of Horizon 2020 such as the pilot projects funded under SU-ICT-03-2018 [[Establishing and operating a pilot for a Cybersecurity Competence Network to develop and implement a common Cybersecurity Research & Innovation Roadmap.]].and other relevant H2020 topics and cybersecurity activities (e.g. carried out by ENISA [[https://www.enisa.europa.eu/]] or relevant parts of work of the EIT Digital[[https://www.eitdigital.eu/]]). The activities will be aligned as relevant with the future objectives of the Cybersecurity Competence Centre and Network of National Coordination Centres (Commission proposal COM(2018) 630). They will be complementary to actions under the Digital Europe Programme, Specific Objectives 3 and 4, which will strengthen EU cybersecurity capacity by support to deployment of cybersecurity infrastructures and tools across the EU, for public administrations, businesses, and individuals, and support digital skills including in cybersecurity. For example support is foreseen to specialised education programmes or modules in key capacity areas such as cybersecurity. Generally, cybersecurity is a horizontal challenge and is not be limited to Horizon Europe Cluster 3. In addition to the calls of the Horizon Europe of Cluster 3 - Civil Security for Society, other activities relevant for Cybersecurity will be supported in particular in the Work Programme part of Cluster 4 - Digital, Industry and Space.
Research and innovation results may feed into the operational work on preparedness and response in the Joint Cyber Unit [[see section 2.1 in The EU's Cybersecurity Strategy for the Digital Decade, JOIN(2020) 18 final. https://eur-lex.europa.eu/legal-content/GA/TXT/?uri=CELEX:52020JC0018]].
Proposals for topics under this Destination should set out a credible pathway contributing to the following impact of the Strategic Plan 2021-2024: "Increased cybersecurity and a more secure online environment by developing and using effectively EU and Member States’ capabilities in digital technologies supporting protection of data and networks aspiring to technological sovereignty in this field, while respecting privacy and other fundamental rights; this should contribute to secure services, processes and products, as well as to robust digital infrastructures capable to resist and counter cyber-attacks and hybrid threats".
More specifically, proposals should contribute to the achievement of one or more of the following impacts:
|Link||Link to Programme|
Scalable privacy-preserving technologies for cross-border federated computation in Europe involving personal data
"Scalable privacy-preserving technologies for cross-border federated computation in Europe involving personal data"
Projects are expected to contribute to some of the following expected outcomes:
The proposal should provide appropriate indicators to measure its progress and specific impact.
Using big data for digital services and scientific research brings about new opportunities and challenges. For example, machine learning methods process medical and behavioural data for finding causes and explanations for diseases or health risks. However, a large amount of this data is personal data. Leakage or abuse of this kind of data and potential privacy infringement (e.g. attribute disclosure or membership inference) risks are a cybersecurity threat to individuals, society and economy and an impediment for further developing data spaces involving personal data. Vice versa, adequate protection of this data according to the GDPR can also prevent its full utilization for society. Advanced privacy-preserving computation techniques such as homomorphic encryption, secure multiparty computation, and differential privacy are being researched and have proven promising to address these challenges. However, further research is required to ensure their applicability in real-world use case scenarios. For example, fully homomorphic encryption is not practically applicable in many cases and secure multi-party computation often imposes special infrastructural requirements.
Building on research and innovation in the area of privacy-preserving computation, proposals should address scalability and reliability of privacy-preserving technologies in realistic problem areas and take integration with existing infrastructures and traditional security measures (e.g. access control) into account. They should respond to users’ needs, e.g. for research and digital services in access and data management for citizens geared towards their own profiles (incl. dynamic personalised recommendations for improved cybersecurity) or in personalised medicine, taking into account the gender dimension where relevant. They should further address the legacy variation in personal data types and data models across different organisations in the same business sector and/or across different potential application sectors. A proposed solution should include validation or piloting of privacy-preserving computation in realistic federated data infrastructures and more specifically European data spaces involving personal data (e.g. the EU heath data space). It should be guided by the EU’s high standards concerning the right to privacy, protection of personal data, and the protection of fundamental rights in the digital age. It should ensure, by-design, compliance with data regulations and specifically the GDPR. Wherever possible, solutions should be developed as open source software.
Consortia should bring together interdisciplinary expertise and capacity covering the supply and the demand side, i.e. industry, service providers and end-users. Participation of SMEs is strongly encouraged. Legal expertise should also be incorporated to assess and ensure compliance of the technical project results with data regulations and the GDPR.
|Link||Link to Call|
|Thematic Focus||Research & Innovation, Technology Transfer & Exchange, Capacity Building, Cooperation Networks, Institutional Cooperation, Clustering, Development Cooperation, Economic Cooperation, Digitisation, ICT, Telecommunication, Justice, Safety & Security, Disaster Prevention, Resiliance, Risk Management, Competitiveness, SME, Consumer Protection, Equal Rights, Human Rights, People with Disabilities, Social Inclusion|
|Funding area|| EU Member States |
Overseas Countries and Territories (OCTs)
|Origin of Applicant|| EU Member States |
Overseas Countries and Territories (OCTs)
|Eligible applicants||Research Institution, International Organization, Public Services, University, Federal State / Region / City / Municipality / Local Authority, National Government, Small and Medium Sized Enterprises, SMEs (between 10 and 249 employees), NGO / NPO, Enterprise (more than 250 employees or not defined), Lobby Group / Professional Association / Trade Union, Education and Training Centres|
|Applicant details|| |
eligible non-EU countries:
At the date of the publication of the work programme, there are no countries associated to Horizon Europe. Considering the Union’s interest to retain, in principle, relations with the countries associated to Horizon 2020, most third countries associated to Horizon 2020 are expected to be associated to Horizon Europe with an intention to secure uninterrupted continuity between Horizon 2020 and Horizon Europe. In addition, other third countries can also become associated to Horizon Europe during the programme. For the purposes of the eligibility conditions, applicants established in Horizon 2020 Associated Countries or in other third countries negotiating association to Horizon Europe will be treated as entities established in an Associated Country, if the Horizon Europe association agreement with the third country concerned applies at the time of signature of the grant agreement.
Legal entities which are established in countries not listed above will be eligible for funding if provided for in the specific call conditions, or if their participation is considered essential for implementing the action by the granting authority.
|Project Partner Details|| |
Unless otherwise provided for in the specific call conditions , legal entities forming a consortium are eligible to participate in actions provided that the consortium includes:
|Further info|| |
Proposal page limits and layout:
The application form will have two parts:
Page limit - Part B: 45 pages
|Type of Funding||Grants|
|Financial details|| |
Activities are expected to achieve TRL 4 by the end of the project.
|Submission||Proposals must be submitted electronically via the Funding & Tenders Portal Electronic Submission System. Paper submissions are NOTpossible.|