What Does the US Military Want from Cloud Computing?

What Does the US Military Want from Cloud Computing?

Polytetraflouroethylene or PTFE was an exotic substance accidentally invented by DuPont chemist Dr. Roy Plunkett in 1938. In spite of its less-than-ordinary origins, PTFE was found to have some extraordinary properties – high heat resistance, high corrosion resistance and the lowest coefficient of friction of any substance yet manufactured. At the height of WWII, its composition was a closely guarded secret, but today we know it as Teflon.

The reason behind this anecdote is to demonstrate the close relation between science and the military. After all, many of the greatest advances in science, whether in the field of arms, locomotion, medicine or computing, have occurred under military supervision. The Internet, GPS, jet aircraft – all these were developed for military purposes before finding civilian applications. In this context, it is only expected that the military will play an active role in the next major development in computational science – cloud computing.

(Defense Advanced Research Projects Agency), the research arm of the Department of Defense (DoD) and the same people who developed the Internet, have decided to get their hands dirty and rectify some of the current security shortcomings of cloud computing. As it explained, their interest lies in protecting military systems from cyber attacks over the cloud.

While DARPA already has a program to ensure security of network hosts, imaginatively named Clean-slate design of Resilient, Adaptive, Secure Hosts or CRASH, DARPA wants to enhance network security with a project called Mission-oriented Resilient Clouds (MRC).

DARPA had issued the following statement in this regard:

Cloud computing infrastructures, in particular, tightly integrate large numbers of hosts using high speed interconnection fabrics that can serve to propagate attacks even more rapidly than conventional networked systems. Today’s hosts, of course, are highly vulnerable, but even if the hosts within a cloud are reasonably secure, any residual vulnerability in the hosts will be amplified dramatically. DARPA believes that we must not only address host vulnerabilities but must also pursue clean-slate approaches to the design of networked computations and cloud-computing infrastructures.”

This program will support federal CIO Vivek Kundra’s cloud-first policy, which is “accelerating DoD toward cloud computing and shared enterprise service,” said Dave Mihelcic, the Defense Information Systems Agency’s CTO. As per this policy, federal agencies are required to identify three existing systems that could move to the cloud and favorably consider the cloud computing option when developing new projects (See: The Architect of the Official Cloud Computing Revolution – CIO Vivek Kundra).

This is not the first time that the US military has dabbled in cloud computing. Late last year, NATO had tied up with IBM to improve information-sharing among member states using cloud-based solutions (See: NATO set to rule the cloud with IBM’s help). It is no secret that cloud computing does suffer from security issues, issues that the industry is actively trying to address (See: Can the RSA Conference Help Dispel Cloud Computing Security Fears?).

Considering that the DoD network is attacked 250,000 times every hour, as announced by Gen. Keith Alexander, NSA director and commander of the US Cyber Command, DARPA’s interest in a more secure cloud is understandable. And as with many other military innovations that have found civilian use, perhaps the general cloud computing industry will benefit from DARPA’s research.

Read More – Security Whitepaper Library

By Sourya Biswas

Sorry, comments are closed for this post.

Transforming Traditional DevOps To A Modern Cloud-Centric Operation

Transforming Traditional DevOps To A Modern Cloud-Centric Operation

Transforming Traditional DevOps Over the last year, I’ve been hearing about more and more instances of companies asking the question that the title suggests – how do you transform a DevOPs process into a more cloud-centric operation? To start, we must all assume that there is some notion of a traditional DevOPs process built into…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs And The Cloud: A Synergistic Coupling

Carve Outs and the Cloud The mergers and acquisitions market is a complex and challenging industry and the last two years has seen a rise in the number of transactions. Working with companies in this space over the last 10 years, we at RKON have seen and hopefully helped change the mindset of private equity…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs)  If you’ve been observant of the MSP industry over the last two years, you’ve no doubt noticed that it has had significant difficulty expanding its service capabilities and growing its revenue stream around cloud computing. At least that was the analysis of recent market research studies assessing the status of cloud…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising