Data-driven research faces a fundamental challenge: How can we effectively share sensitive data so that it remains accessible, reproducible, and fully protected at the same time? The SIESTA project brings together technological innovation, EOSC standards, FAIR principles, and GDPR and NIS2 requirements into a trusted cloud environment.
How secure are the sensitive data used by researchers?
SIESTA enables the secure processing of sensitive data in line with open science principles through trusted computing environments and advanced anonymization techniques. Researchers can analyze data without compromising participant privacy while still publishing verifiable results.
It is crucial to separate two layers – the protection of sensitive information and the preservation of research value in the data. SIESTA ensures this balance by implementing pseudonymization, k-anonymity, and differential privacy. This empowers researchers to practice Open Science even with data that were previously considered unpublishable.
Which technologies protect sensitive research data?
SIESTA leverages Trusted Execution Environments (TEEs) combined with advanced anonymization and pseudonymization techniques. These technologies make it possible to process sensitive data without compromising confidentiality – even when data is shared across countries and research institutions.
Is it possible to effectively combine security, interoperability, and usability?
Yes—data security does not have to conflict with user comfort or interoperability between systems. The infrastructure is designed modularly and uses EOSC standards, which guarantee portability, reusability, and easy integration with other research services.
From an implementation perspective, the key is that solutions are built on open standards (e.g., OIDC/OAuth2, Open Table Format) and support federated access. Moreover, the user interfaces are tailored to researchers without requiring advanced IT skills, significantly lowering the entry barrier.
What is SIESTA’s key innovation for science and research?
The key innovation lies in the synergy of FAIR principles (Findable, Accessible, Interoperable, Reusable) and Open Science with strong security mechanisms. SIESTA enables researchers to share and reuse data in compliance with standards, without compromising the integrity of the data or the privacy of the individuals involved.
SIESTA reduces administrative, technical, and legal barriers to working with sensitive data. Researchers can safely use datasets that previously required complex ethical and legal approval processes, accelerating the development and validation of scientific hypotheses.
The platform offers centralized tools for access management, activity logging, and data flow control. This results in greater trust in the data and promotes inter-institutional collaboration, driving the advancement of interdisciplinary research.
What is a Trusted Execution Environment (TEE)?
A Trusted Execution Environment (TEE) is a hardware-isolated computing environment that guarantees data is processed only within an approved and secure context. Access to the TEE is controlled, audited, and protected against any external interference—including from the host system administrator.
SIESTA leverages TEE as a critical component to ensure that sensitive data is processed without being decrypted outside the secure environment. This technology is ideal in scenarios where both high computational performance and strict confidentiality are required.
User access is based on verified identity, role, and permissions within the system. At the same time, simplicity is a priority—the platform reduces technical barriers, enabling researchers to seamlessly enter the EOSC ecosystem without losing control over their data.
How does SIESTA integrate with the European Open Science Cloud (EOSC)?
What do we do for researchers themselves? Researchers gain transparent and secure access to sensitive data, the ability to collaborate across countries, and improved reproducibility of their research. We remove technical obstacles and support interdisciplinary research.
The project is directly connected to the EOSC infrastructure. This means that services developed within SIESTA are published, documented, and made available through EOSC portals. Compliance with FAIR principles and standardized APIs enables rapid integration with other services or repositories.
This interoperability is crucial to allow researchers from different countries and institutions to collaboratively work with data that remains protected yet accessible within a trusted framework.
How is Data Anonymization Practically Applied in Research?
SIESTA serves as a key component of the European Open Science Cloud (EOSC), providing both technical and security layers for working with data that requires special handling—thereby extending the practical usability of EOSC to sensitive cases.
Anonymization is not a one-time process, but a continuous balance between maintaining data value and protecting identities. SIESTA integrates tools to assess re-identification risks and allows researchers to customize anonymization parameters based on the needs of each specific study.
For example, sociological research may require preserving spatial granularity, whereas medical research demands thorough removal of biometric data. SIESTA offers a selection of methods with pre-configured scenarios tailored to different research contexts.
What Role Does InterWay Play in the SIESTA Project?
InterWay focuses on implementing state-of-the-art security hardening practices for the computational environment and DevOps-driven development processes. We specialize in integrating Trusted Execution Environments, developing comprehensive security documentation, and establishing procedures aligned with NIS2 and cybersecurity standards—significantly enhancing the resilience and trustworthiness of the solution.
The NIS2 directive emphasizes resilience and risk management in cybersecurity. Within SIESTA, we integrate these requirements from the architectural design phase—covering security policies, authentication, and extending to auditing and incident monitoring.
As a technology partner, we ensure that all components are designed according to recognized cybersecurity best practices, based on Cloud Native architectural principles, and applying a Zero Trust approach to protect both infrastructure and data. This includes continuous resilience testing, updating security measures, and conducting user training.
Why SIESTA Matters for the Future of Research
The SIESTA project represents a major step forward in the digitalization of research. It introduces technologies that enable the processing of sensitive data without risking misuse, while simultaneously supporting open access to scientific outputs.
Thanks to collaboration between experts in cybersecurity, cloud computing, and research, an infrastructure is being built that is ready to meet future challenges—from NIS2 compliance to AI-based data sharing.
Researchers, IT managers, and leaders of scientific institutions now have at their disposal a tool that combines compliance, efficiency, and openness. And that is exactly what research will need by 2030.
Key Information about the SIESTA Project:
- Duration: 36 months – the SIESTA project officially started on January 1, 2024, and will run until December 31, 2026.
- Funding: €5 million (European Union)
- Coordinator: Agencia Estatal Consejo Superior de Investigaciones Científicas (CSIC, Spain)
- Consortium: 12 partners from multiple countries, including the Slovak Academy of Sciences (IISAS) and InterWay, a. s.
Certificate of InterWay, a. s. on the Capability to Conduct Research and Development, confirming the company’s expertise, innovative approach, and competencies in fields requiring professional research and development experience.