10
IaaS Platform Amazon Web Services Stealth Trident Warrior Experiment Military Support for HADR Mission Using Secure Cloud DoD U.S. Navy U.S. Marine Corps U.S. Northern Command U.S. Army National Guard U.S. Air National Guard Communities of Interest Administration Tactical Operations Law Enforcement Coordination Etc. Cloud-Based Collaboration Environment Dept. of Homeland Security Field Office National Response Framework National Incident Management System Federal Federal Emergency Mgmt. Agency U.S. Forest Service National Interagency Fire Center State Calif. Emergency Mgmt. Agency Calif. Dept. of Forestry and Fire Protection (CAL FIRE) Calif. Division of Forestry Calif. Highway Patrol Local Police Fire Rescue NIPRNet Emergency Responders Secure Cloud

Trident Warrior '10: Dataline Secure Cloud Computing

Embed Size (px)

Citation preview

Page 1: Trident Warrior '10: Dataline Secure Cloud Computing

IaaS Platform

• Amazon Web Services

• Stealth

Trident Warrior ExperimentMilitary Support for HADR Mission Using Secure Cloud

DoD

•U.S. Navy

•U.S. Marine Corps

•U.S. Northern Command

•U.S. Army National Guard

•U.S. Air National Guard

Communities of Interest

• Administration

• Tactical Operations

• Law Enforcement Coordination

• Etc.

Cloud-Based Collaboration Environment

• Dept. of Homeland Security Field Office

• National Response Framework

• National Incident Management System

Federal

•Federal Emergency Mgmt. Agency

•U.S. Forest Service

•National Interagency Fire Center

State

•Calif. Emergency Mgmt. Agency

•Calif. Dept. of Forestry and Fire Protection (CAL FIRE)

•Calif. Division of Forestry

•Calif. Highway Patrol

Local

•Police

•Fire

•Rescue

NIPRNet

Emergency Responders Secure Cloud

Page 2: Trident Warrior '10: Dataline Secure Cloud Computing

Government Cloud Computing

United States Federal Chief Information Officers CouncilData.gov & IT Dashboard Defense Information Systems Agency (DISA)Rapid Access Computing Environment (RACE) US Department of Energy (DOE)Magellan General Services Administration (GSA)Apps.gov Department of the InteriorNational Business Center (NBC) Cloud Computing

NASA Nebula

National Institute of Standards and Technology (NIST)

United Kingdom

G-Cloud

European UnionResources and Services Virtualization without Barriers Project (RESERVOIR)

Canada

Canada Cloud Computing

Cloud Computing and the Canadian Environment

Japan

The Digital Japan Creation Project (ICT Hatoyama Plan)

The Kasumigaseki Cloud

Page 3: Trident Warrior '10: Dataline Secure Cloud Computing

Federal Cloud Computing Initiative (FCCI)

Page 4: Trident Warrior '10: Dataline Secure Cloud Computing
Page 5: Trident Warrior '10: Dataline Secure Cloud Computing

Dataline Cloud Computing

Page 6: Trident Warrior '10: Dataline Secure Cloud Computing

Cloud-based Cross Domain Collaborative Information Environment (CDCIE) Chat

Use any of the same-domain functions to communicate with local users.

Use the cross-domain functions (including Group Chat, Language Translation, Whiteboard*, Monitor for Text, and Keyword Highlighting) to communicate with remote users.

Use these same-domain and cross-domain functions within the same session of TransVerse.

Secured with cryptographic bit splitting technology

Secure Collaborationhttps://xmpp.je.jfcom.mil/

Developed by:

Page 7: Trident Warrior '10: Dataline Secure Cloud Computing

SecureParser®

Share Authentication

“M of N” Fault Tolerance

2

Random Bit Split

1 3 4

AES Encryption

Document E-mail Database

Video Map Imagery

CDIP & COI Framework

Share Authentication

“M of N” Fault Tolerance

2

Random Bit Split

1 3 4

AES Encryption

Document E-mail Database

Video Map Imagery

Document -Email Database

Video Map Imagery

CDIP & COI FrameworkHigh-efficiency cryptographic module:• Provably-secure Computational Secret Sharing

• Cryptographic Data Splitting

• Data Integrity Protection

• Modules can be change out, e.g. AES could be

changed with a TYPE I encryption as requirement

called for

User Definable• Number of Shares

• Fault Tolerance

• Key Management

Physically Separate Shares• Written to Storage – Data at Rest

• Written to Networks – Data in Motion

• Created at any IO Point in the system

Cryptographically splits data

Creates physically separate fault

tolerant Shares

Page 8: Trident Warrior '10: Dataline Secure Cloud Computing
Page 9: Trident Warrior '10: Dataline Secure Cloud Computing

Trident Warrior Lab 1

Page 10: Trident Warrior '10: Dataline Secure Cloud Computing

The use of cloud computing technology and techniques to support localized, short-lived information access and processing. Use cases could include:

• “Cloudbursting” to support cyclic data processing requirements

• Establishing a cloud-based collaboration environment in order to coordinate firefighting resources during a wildfire

• Virtually binding shipboard IT infrastructures in order to create a battlegroup infrastructure-as-a-service platform

• Virtually binding land vehicle based servers and storage resources into a battlefield data center

• Dynamic provisioning of virtual cloud-based servers in order to automate exploitation and dissemination of unmanned air vehicle (UAV) streaming video feeds

Tactical Cloud Computing

rev date 10/31/2009