Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Trident Warrior '10: Dataline Secure Cloud Computing


Published on

High level overview of Trident Warrior '10 Secure Cloud Computing Lab Experiment 1 by Dataline, LLC

Published in: Technology
  • Be the first to comment

Trident Warrior '10: Dataline Secure Cloud Computing

  1. 1. Trident Warrior Experiment Military Support for HADR Mission Using Secure Cloud Emergency Responders Secure Cloud IaaS Platform Federal • Amazon Web Services •Federal Emergency Mgmt. Agency •U.S. Forest Service • Stealth •National Interagency Fire Center Cloud-Based Collaboration Environment State • Dept. of Homeland Security Field Office •Calif. Emergency Mgmt. Agency • National Response Framework •Calif. Dept. of Forestry and Fire • National Incident Management System Protection (CAL FIRE) •Calif. Division of Forestry Communities of Interest •Calif. Highway Patrol • Administration • Tactical Operations Local • Law Enforcement Coordination •Police •Fire • Etc. •Rescue DoD •U.S. Navy •U.S. Marine Corps •U.S. Northern Command NIPRNet •U.S. Army National Guard •U.S. Air National Guard
  2. 2. Government Cloud Computing United States Federal Chief Information Officers Council & IT Dashboard Defense Information Systems Agency (DISA) Rapid Access Computing Environment (RACE) US Department of Energy (DOE) Magellan General Services Administration (GSA) Department of the Interior National Business Center (NBC) Cloud Computing NASA Nebula National Institute of Standards and Technology (NIST) United Kingdom G-Cloud European Union Resources and Services Virtualization without Barriers Project (RESERVOIR) Canada Canada Cloud Computing Cloud Computing and the Canadian Environment Japan The Digital Japan Creation Project (ICT Hatoyama Plan) The Kasumigaseki Cloud
  3. 3. Federal Cloud Computing Initiative (FCCI)
  4. 4. Dataline Cloud Computing
  5. 5. Secure Collaboration  Cloud-based Cross Domain Collaborative Information Environment (CDCIE) Chat  Use any of the same-domain functions to communicate with local users.  Use the cross-domain functions (including Group Chat, Language Translation, Whiteboard*, Monitor for Text, and Keyword Highlighting) to communicate with remote users.  Use these same-domain and cross-domain functions within the same session of TransVerse.  Secured with cryptographic bit splitting technology Developed by:
  6. 6. SecureParser® Cryptographically splits data Document Email -E -mail Database Database Video Map Imagery Imagery Creates physically separate fault tolerant Shares High-efficiency cryptographic module: CDIP & COI Framework • Provably-secure Computational Secret Sharing • Cryptographic Data Splitting AES Encryption • Data Integrity Protection • Modules can be change out, e.g. AES could be Random Bit Split changed with a TYPE I encryption as requirement “M of N Fault Tolerance ” called for Share Authentication Physically Separate Shares • Written to Storage – Data at Rest • Written to Networks – Data in Motion • Created at any IO Point in the system 1 2 3 4 User Definable • Number of Shares • Fault Tolerance • Key Management
  7. 7. Trident Warrior Lab 1
  8. 8. Tactical Cloud Computing The use of cloud computing technology and techniques to support localized, short-lived information access and processing. Use cases could include: • “Cloudbursting” to support cyclic data processing requirements • Establishing a cloud-based collaboration environment in order to coordinate firefighting resources during a wildfire • Virtually binding shipboard IT infrastructures in order to create a battlegroup infrastructure-as-a-service platform • Virtually binding land vehicle based servers and storage resources into a battlefield data center • Dynamic provisioning of virtual cloud-based servers in order to automate exploitation and dissemination of unmanned air vehicle (UAV) streaming video feeds rev date 10/31/2009