What Does the US Military Want from Cloud Computing?

What Does the US Military Want from Cloud Computing?

Polytetraflouroethylene or PTFE was an exotic substance accidentally invented by DuPont chemist Dr. Roy Plunkett in 1938. In spite of its less-than-ordinary origins, PTFE was found to have some extraordinary properties – high heat resistance, high corrosion resistance and the lowest coefficient of friction of any substance yet manufactured. At the height of WWII, its composition was a closely guarded secret, but today we know it as Teflon.

The reason behind this anecdote is to demonstrate the close relation between science and the military. After all, many of the greatest advances in science, whether in the field of arms, locomotion, medicine or computing, have occurred under military supervision. The Internet, GPS, jet aircraft – all these were developed for military purposes before finding civilian applications. In this context, it is only expected that the military will play an active role in the next major development in computational science – cloud computing.

(Defense Advanced Research Projects Agency), the research arm of the Department of Defense (DoD) and the same people who developed the Internet, have decided to get their hands dirty and rectify some of the current security shortcomings of cloud computing. As it explained, their interest lies in protecting military systems from cyber attacks over the cloud.

While DARPA already has a program to ensure security of network hosts, imaginatively named Clean-slate design of Resilient, Adaptive, Secure Hosts or CRASH, DARPA wants to enhance network security with a project called Mission-oriented Resilient Clouds (MRC).

DARPA had issued the following statement in this regard:

Cloud computing infrastructures, in particular, tightly integrate large numbers of hosts using high speed interconnection fabrics that can serve to propagate attacks even more rapidly than conventional networked systems. Today’s hosts, of course, are highly vulnerable, but even if the hosts within a cloud are reasonably secure, any residual vulnerability in the hosts will be amplified dramatically. DARPA believes that we must not only address host vulnerabilities but must also pursue clean-slate approaches to the design of networked computations and cloud-computing infrastructures.”

This program will support federal CIO Vivek Kundra’s cloud-first policy, which is “accelerating DoD toward cloud computing and shared enterprise service,” said Dave Mihelcic, the Defense Information Systems Agency’s CTO. As per this policy, federal agencies are required to identify three existing systems that could move to the cloud and favorably consider the cloud computing option when developing new projects (See: The Architect of the Official Cloud Computing Revolution – CIO Vivek Kundra).

This is not the first time that the US military has dabbled in cloud computing. Late last year, NATO had tied up with IBM to improve information-sharing among member states using cloud-based solutions (See: NATO set to rule the cloud with IBM’s help). It is no secret that cloud computing does suffer from security issues, issues that the industry is actively trying to address (See: Can the RSA Conference Help Dispel Cloud Computing Security Fears?).

Considering that the DoD network is attacked 250,000 times every hour, as announced by Gen. Keith Alexander, NSA director and commander of the US Cyber Command, DARPA’s interest in a more secure cloud is understandable. And as with many other military innovations that have found civilian use, perhaps the general cloud computing industry will benefit from DARPA’s research.

Read More – Security Whitepaper Library

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

2 Responses to What Does the US Military Want from Cloud Computing?

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups Wednesday, October 29, 2014 @ 9:00 am/12:00pm ET. Backup and Restore of a SharePoint environment can be a complex endeavor as the product consists of multiple components running at various tiers, each with their own backup and restore requirements. In addition, SharePoint documents are stored as Binary Large Objects (BLOBs) in

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts souryaSourya Biswas is a former risk analyst who has worked with

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts souryaSourya Biswas is a former risk analyst