SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Cryptographic Data Splitting
   & Cloud Computing
                       By
      Kevin L. Jackson, Engineering Fellow
                   NJVC, LLC
                   Presented to:
         AFCEA Technology Over Bagels
              October 12, 2010
The New IT Era




 IDC September 2008

                      rev date 10/12/2010
What is Cloud Computing
    An Amalgamation of Technologies

                                  An Amalgamation of Technologies – Converging on a Revolutionary
                                           and Transformational Services Delivery Model




“A pay-per-use model for enabling available, convenient
     and on-demand network access to a shared pool of
              configurable computing resources
   (e.g., networks, servers, storage, applications, services)
     that can be rapidly provisioned and released with
      minimal management effort or service provider
                         interaction. ”


                                                                              Other terms frequently associated with “cloud computing”
                                                                              include:
                                            NIST Definition                   - “network-centric”
                                                                              - “application service provider (ASP)”
                                                                              - “external hosting” and “co-location”
                                                                              - “private cloud = Intranet-based”

                                      © 2008 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered
                                                      trademarks of Science Applications International Corporation in the U.S. and/or other countries.
Non-Scalable Applications Are Expensive and Risky
           Non-scalable applications suffer from diminishing returns on added resources
           As the business grows, per transaction costs INCREASE
           At some point the application will hit a wall, leading to:
                               Application crashes (and potential disaster for the business – at huge cost)
                               Expensive process of re-architecting the application every few months/years




                                                     Non-Linear Scalability (15% Contention)


                          $1,200,000

                          $1,000,000                                                                                            Server cost:
                                                                                                                                $20,000
    Total Solution Cost




                              $800,000

                              $600,000                                                                                          Single server throughput:
                                                                                                 The Scalability
                                                                                                                                1,000 tx/sec
                              $400,000                                                               Wall
                                                                                                                                Contention:
                              $200,000
                                                                                                                                15%
                                   $0
                                          1,000   2,000   3,000     4,000   5,000   6,000   7,000      8,000   9,000   10,000
                                                                  Required Throughput (e.g., Tx/Sec)
The Goal: Linear Scalability On Demand
    No diminishing returns on scale
    No code changes when scaling
    Drop in another box and increase capacity linearly


    $1,200,000


    $1,000,000


     $800,000


     $600,000


     $400,000


     $200,000


           $0
                 1,000   2,000    3,000   4,000   5,000    6,000   7,000    8,000   9,000      10,000
                     1,000 tx/sec tx/sec tx/sec tx/sec
                            2,000 3,000 4,000
                             Linear Scalability      Non-Linear Scalability (15% Contention)
Cloud Computing Value
        140

        120

        100
OPEX     80                                                        Cost

         60
                                                                   Capability
                                                                   Demand
                                                                                         Traditional
         40

CAPEX    20

          0
              1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20


        140

        120

        100

         80                                                        Cost (20% premium)

         60
                                                                   Capability
                                                                   Demand
                                                                                               Cloud
 OPEX    40

         20

          0
              1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20



                                                                                        Courtesy The Open Gro
Economic Benefit   (Booz Allen Hamilton, October 2009)
Speed of Cost Reduction, Cost of Change




                               Courtesy The Open Gro
Optimizing Ownership Use




                           Courtesy The Open Gro
Optimizing Time to Deliver Capability




                             Courtesy The Open Gro
Value and Capabilities
   Time
      Reduce time to deliver/execute mission
      Increased responsiveness/flexibility/availability
   Cost
      Optimizing cost to deliver/execute mission
      Optimizing cost of ownership (lifecycle cost)
      Increased efficiencies in capital/operational expenditures
   Quality
      Environmental improvements
      Experiential improvements
Government Cloud Computing
United States
        Federal Chief Information Officers Council
        Data.gov & IT Dashboard
        Defense Information Systems Agency (DISA)
        Rapid Access Computing Environment (RACE)
        US Department of Energy (DOE)
        Magellan
        General Services Administration (GSA)
        Apps.gov
        Department of the Interior
        National Business Center (NBC) Cloud Computing
        NASA Nebula
        National Institute of Standards and Technology (NIST)
United Kingdom
        G-Cloud
European Union
        Resources and Services Virtualization without Barriers Project
        (RESERVOIR)
Canada
        Canada Cloud Computing
        Cloud Computing and the Canadian Environment
Japan
        The Digital Japan Creation Project (ICT Hatoyama Plan)
        The Kasumigaseki Cloud
Communications Infrastructure
Continuum                                                                                Military
                                                                                       Tactical Edge

 High Performance                            The Mainstream                        Mobile, Ad Hoc
      Networks                                     Internet                             Networks


    Some Common Characteristics           Some Common Characteristics          Some Common Characteristics

• Stable infrastructure                • Mixed range of assets              • Ad hoc assets
• Fiber optic/High-speed RF/wireless   • Mixed media                        • Generally wireless
optical
                                       • Tending to higher bandwidth        • Design for degraded operation
• Highest bandwidth
                                       • Overprovisioned                    • Large variability in latency and
• Low latency                                                               bandwidth
                                       • Low to high latency
•Connection-oriented links                                                  • Highly dynamic routing
                                       • Table-based routing
• Policy-based QoS                                                          • More distributed network service
                                       • Mixed policies in forwarding and
                                                                            models required
                                       QoS
                                                                            • Change is the norm
Humanitarian Assistance and Disaster Response (HADR)


                                                         Humanity &
                                                         Infrastructure




   Damaged local infrastructure
   Heterogeneous mobile support/response
    infrastructure
   Secure/Sensitive/Unsecure information requirements
   Network flexibility paramount
Cloud Computing
 Not a technology but a new way of provisioning and
  consuming information technology
 An automated SOA implemented with “brutal standardization”
  over a virtualized infrastructure (compute, storage, networks)
  enables cloud computing
              Key Benefits                  Key Concerns
       Significant cost reductions      Standards
       Reduced time to capability       Portability
       Increased flexibility            Control/Availability
       Elastic scalability              Security
       Increase service quality         IT Policy
       Increased security               Management / Monitoring
       Ease of technology refresh       Ecosystem
       Ease of collaboration
       Increased efficiency
Cloud Computing Security
   Increased virtualization (Compute, Storage, Network)
   Modification of infrastructure centric security policies
   Support of information risk management profiles
   “Brutal standardization” to increase automation and reduces
    opportunity for human error
   Increased infrastructure visibility to improve ability to
    deploy, monitor and enforce security policies
   Implementation of advanced data-centric security technologies
   Global File Systems / Content Addressable Storage
   Global, Shared Infrastructures
   Dynamic, Non-traditional Coalitions
Cryptographic Data Splitting (SecureParser® )


                                          Cryptographically splits data
       Document E-mail Database
                Email
                 -      Database
       Video    Map   Imagery
                        Imagery         Creates physically separate fault
                                                tolerant Shares

                                       High-efficiency cryptographic module:
     CDIP & COI Framework              • Provably-secure Computational Secret Sharing
                                       • Cryptographic Data Splitting
        AES Encryption                 • Data Integrity Protection
                                       • Modules can be change out, e.g. AES could be changed with a
        Random Bit Split               TYPE I encryption as requirement called for
    “M of N ” Fault Tolerance
      Share Authentication             Physically Separate Shares
                                       •Written to Storage – Data at Rest
                                       •Written to Networks – Data in Motion
                                       • Created at any IO Point in the system

1          2           3           4
                                       User Definable
                                       • Number of Shares
                                       • Fault Tolerance
                                       • Key Management
SecureParser Key Management
Independent Testing and Evaluation
2005 CWID: AFCA assessment & AF C2 Battle Lab demo
    “…as demonstrating the potential to be labeled as an MLS/PL-4 System…”

2005 DISA: Technical Information Panel (TIP)
    “…found to have merit for further evaluation and consideration for use as an information
    assurance technology…potential to fundamentally alter the way storing and securing of data is
    approached.”
2006 SOCOM: National Center for the Study of Counter-terrorism and Cybercrime
    IV&V completed successfully for SOCOM MLS Pilot Project
2006 EUCOM Combined Endeavor: Joint Interoperability Test Center (JITC)
    “…value of the SecureParser was obvious. This capability not only offers increased security of
    data, but reduces costs by eliminating the need for redundant resources.”
2008 Selected by DISA as a demonstration solution for CWID’08 - June 08
   Selected by NSA for HAP Trade Study as a Crypto Service and for DAR
ISR Data – Collection to War fighter IA
Collection        Communication Storage and Sharing. Hiding                                                 War Fighter
                                  Data in Plain Site on the                                                   Access
                                            GIG.
                                                                      Geographically distributed Data and
                                                                                    Servers

              X                               X
                  Data transmitted through
                  multiple paths (Satellite
                      and Terrestrial)                                                                        WAN/DIB



                             X

                                                   Ground ISR Data
                                                  Processing center




 Secure ISR       Secure and Highly                 Secure ISR Data         Secure and Highly                Secure and Highly
    Data              Available                         Sharing           Available Storage and              Available COI ISR
                   Communications                                          Integrated Backup                   Data Sharing
Conclusion
 Cloud   Computing represents an important shift in
  the consumption and delivery of information
  technology
 Shift from infrastructure-centric to data-centric
  computing (and security)
 Cryptographic data splitting can support the
  security needs of this new era.
Thank You !
Kevin L. Jackson
Director Cloud Computing Services
NJVC, LLC
(703) 335-0830
Kevin.Jackson@NJVC.com
http://kevinljackson.blogspot.com
http://govcloud.ulitzer.com

Weitere ähnliche Inhalte

Was ist angesagt?

Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdfOracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
InSync2011
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier Cloud
NECIndia
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
ReadWrite
 

Was ist angesagt? (12)

Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdfOracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
 
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretasExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
ExpoCloud2013 - Cloud flexible: Un enfoque práctico con soluciones concretas
 
Introduction - The State of the Cloud
Introduction - The State of the CloudIntroduction - The State of the Cloud
Introduction - The State of the Cloud
 
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
PRIVATE, HYBRID AND PUBLIC CLOUDS (EMCWorld 2011)
 
Cloud - Two examples
Cloud - Two examplesCloud - Two examples
Cloud - Two examples
 
NEC Carrier Cloud
NEC Carrier CloudNEC Carrier Cloud
NEC Carrier Cloud
 
Ibm blade center
Ibm blade centerIbm blade center
Ibm blade center
 
Shalini xs10
Shalini xs10Shalini xs10
Shalini xs10
 
Big data, why now?
Big data, why now?Big data, why now?
Big data, why now?
 
Future of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of ComputingFuture of the Cloud: Cloud Platform APIs are the Business of Computing
Future of the Cloud: Cloud Platform APIs are the Business of Computing
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the Clouds
 
Data centers presentation
Data centers presentationData centers presentation
Data centers presentation
 

Andere mochten auch

Mapping with Android
Mapping with AndroidMapping with Android
Mapping with Android
vgrigoruk
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
Priyanka Gurnani
 
Android SDK and PhoneGap
Android SDK and PhoneGapAndroid SDK and PhoneGap
Android SDK and PhoneGap
Doncho Minkov
 

Andere mochten auch (20)

Secure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacySecure Multiparty Computation - a technology with promises for privacy
Secure Multiparty Computation - a technology with promises for privacy
 
Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...Secure Multiparty Computation or: How I learned to stop worrying and love the...
Secure Multiparty Computation or: How I learned to stop worrying and love the...
 
Mapping with Android
Mapping with AndroidMapping with Android
Mapping with Android
 
User mobility and location management
User mobility and location managementUser mobility and location management
User mobility and location management
 
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
Hierarchical and Hash-based Naming Scheme for Vehicular Information Centric N...
 
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
Ofdm Detection on Umts Utra-Fdd up-Link and Implementation of the Modulator/ ...
 
Zywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access ControlZywall Usg300 User Aware Access Control
Zywall Usg300 User Aware Access Control
 
Moto v551
Moto v551Moto v551
Moto v551
 
A review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networksA review of current routing protocols for ad hoc mobile wireless networks
A review of current routing protocols for ad hoc mobile wireless networks
 
Intro To Gsm Wh080917
Intro To Gsm Wh080917Intro To Gsm Wh080917
Intro To Gsm Wh080917
 
Bluetooth1
Bluetooth1Bluetooth1
Bluetooth1
 
Mobile Video Advertisement
Mobile Video AdvertisementMobile Video Advertisement
Mobile Video Advertisement
 
Gsm
GsmGsm
Gsm
 
Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...Will the shift from fleet to mobility management revolutionise the leasing in...
Will the shift from fleet to mobility management revolutionise the leasing in...
 
3 ip packet
3 ip packet3 ip packet
3 ip packet
 
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...Distinguish among  leo, meo, heo & gis systems . what type of satellites kenn...
Distinguish among leo, meo, heo & gis systems . what type of satellites kenn...
 
Android Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... OddAndroid Hardware That's A Little Bit... Odd
Android Hardware That's A Little Bit... Odd
 
Android SDK and PhoneGap
Android SDK and PhoneGapAndroid SDK and PhoneGap
Android SDK and PhoneGap
 
Lecture 10
Lecture 10Lecture 10
Lecture 10
 
GSM tutorial | GSM mobile network system basics | tutorialsGsm tutorial
GSM tutorial | GSM mobile network system basics | tutorialsGsm tutorialGSM tutorial | GSM mobile network system basics | tutorialsGsm tutorial
GSM tutorial | GSM mobile network system basics | tutorialsGsm tutorial
 

Ähnlich wie Cryptographic Data Splitting and Cloud Computing

Chan presentation final
Chan presentation finalChan presentation final
Chan presentation final
Daniel Chan
 
Sun sparc enterprise t5140 and t5240 servers customer presentation
Sun sparc enterprise t5140 and t5240 servers customer presentationSun sparc enterprise t5140 and t5240 servers customer presentation
Sun sparc enterprise t5140 and t5240 servers customer presentation
xKinAnx
 
Packet shaper datasheet 81
Packet shaper datasheet 81Packet shaper datasheet 81
Packet shaper datasheet 81
Zalli13
 
Packet shaper datasheet 81
Packet shaper datasheet 81Packet shaper datasheet 81
Packet shaper datasheet 81
Zalli13
 
Datacenter Revolution Dean Nelson, Sun
Datacenter  Revolution    Dean  Nelson,  SunDatacenter  Revolution    Dean  Nelson,  Sun
Datacenter Revolution Dean Nelson, Sun
Niklas Johnsson
 

Ähnlich wie Cryptographic Data Splitting and Cloud Computing (20)

Cloud Economics Microsoft NZ
Cloud Economics Microsoft NZCloud Economics Microsoft NZ
Cloud Economics Microsoft NZ
 
Randy Bias - Presentation at Emerging Communications Conference & Awards (eCo...
Randy Bias - Presentation at Emerging Communications Conference & Awards (eCo...Randy Bias - Presentation at Emerging Communications Conference & Awards (eCo...
Randy Bias - Presentation at Emerging Communications Conference & Awards (eCo...
 
Chan presentation final
Chan presentation finalChan presentation final
Chan presentation final
 
Lte asia 2011 s niri
Lte asia 2011 s niriLte asia 2011 s niri
Lte asia 2011 s niri
 
Carrier Cloud Opportunity - TM Forum Management World Dublin 2011
Carrier Cloud Opportunity - TM Forum Management World Dublin 2011Carrier Cloud Opportunity - TM Forum Management World Dublin 2011
Carrier Cloud Opportunity - TM Forum Management World Dublin 2011
 
Peter Clarke, CTO at Isle of Man Government - A dive into the clouds
Peter Clarke, CTO at Isle of Man Government - A dive into the cloudsPeter Clarke, CTO at Isle of Man Government - A dive into the clouds
Peter Clarke, CTO at Isle of Man Government - A dive into the clouds
 
Sun sparc enterprise t5140 and t5240 servers customer presentation
Sun sparc enterprise t5140 and t5240 servers customer presentationSun sparc enterprise t5140 and t5240 servers customer presentation
Sun sparc enterprise t5140 and t5240 servers customer presentation
 
Packet shaper datasheet 81
Packet shaper datasheet 81Packet shaper datasheet 81
Packet shaper datasheet 81
 
Packet shaper datasheet 81
Packet shaper datasheet 81Packet shaper datasheet 81
Packet shaper datasheet 81
 
Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)Next-Gen Security (using Cloud)
Next-Gen Security (using Cloud)
 
On app Ditlev Bredahl
On app Ditlev BredahlOn app Ditlev Bredahl
On app Ditlev Bredahl
 
MBL303 Scalable Mobile and Web Apps - AWS re: Invent 2012
MBL303 Scalable Mobile and Web Apps - AWS re: Invent 2012MBL303 Scalable Mobile and Web Apps - AWS re: Invent 2012
MBL303 Scalable Mobile and Web Apps - AWS re: Invent 2012
 
Data Center Transformation Summit
Data Center Transformation SummitData Center Transformation Summit
Data Center Transformation Summit
 
The Future of Service Mesh
The Future of Service MeshThe Future of Service Mesh
The Future of Service Mesh
 
Modernización del manejo de datos con v fabric
Modernización del manejo de datos con v fabricModernización del manejo de datos con v fabric
Modernización del manejo de datos con v fabric
 
Datacenter Revolution Dean Nelson, Sun
Datacenter  Revolution    Dean  Nelson,  SunDatacenter  Revolution    Dean  Nelson,  Sun
Datacenter Revolution Dean Nelson, Sun
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 
OSS Presentation Arista
OSS Presentation AristaOSS Presentation Arista
OSS Presentation Arista
 
Cloud Computing - Facts and Myths
Cloud Computing - Facts and MythsCloud Computing - Facts and Myths
Cloud Computing - Facts and Myths
 
Amazon web services : "How Does Cloud Computing Change the Business Model for...
Amazon web services : "How Does Cloud Computing Change the Business Model for...Amazon web services : "How Does Cloud Computing Change the Business Model for...
Amazon web services : "How Does Cloud Computing Change the Business Model for...
 

Mehr von GovCloud Network

Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
GovCloud Network
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
GovCloud Network
 

Mehr von GovCloud Network (20)

IaaS Price performance-benchmark
IaaS Price performance-benchmarkIaaS Price performance-benchmark
IaaS Price performance-benchmark
 
Cloud computing training what's right for me
Cloud computing training what's right for meCloud computing training what's right for me
Cloud computing training what's right for me
 
ViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT ChangeViON Corporation: Surviving IT Change
ViON Corporation: Surviving IT Change
 
Staying Safe in Cyberspace
Staying Safe in CyberspaceStaying Safe in Cyberspace
Staying Safe in Cyberspace
 
Vets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate SuccessVets 360 Services - Military Dedication - Corporate Success
Vets 360 Services - Military Dedication - Corporate Success
 
GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014GovCloud Network LLC Overview - June 25, 2014
GovCloud Network LLC Overview - June 25, 2014
 
Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture   Army PEO EIS Cloud Architecture
Army PEO EIS Cloud Architecture
 
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin JacksonICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings   Kevin Jackson
ICH Agile Cloud Session 1-Highlights /Prospective Svc Offerings Kevin Jackson
 
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
 
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
@AgileCLoud_ICH Presentation - 20140521 US Navy OPNAV - Capt Christopher Page
 
Agile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John BrennanAgile Cloud Conference 2 Introduction - John Brennan
Agile Cloud Conference 2 Introduction - John Brennan
 
DoD Business Capability Lifecycle (BCL) Guide (Draft)
DoD Business Capability Lifecycle  (BCL)  Guide (Draft)DoD Business Capability Lifecycle  (BCL)  Guide (Draft)
DoD Business Capability Lifecycle (BCL) Guide (Draft)
 
GovCloud Network Overview Presentation
GovCloud Network Overview PresentationGovCloud Network Overview Presentation
GovCloud Network Overview Presentation
 
PM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing briefPM ISE Information Interoperability Presentation -agile sourcing brief
PM ISE Information Interoperability Presentation -agile sourcing brief
 
Intrusion Detection on Public IaaS - Kevin L. Jackson
Intrusion Detection on Public IaaS  - Kevin L. JacksonIntrusion Detection on Public IaaS  - Kevin L. Jackson
Intrusion Detection on Public IaaS - Kevin L. Jackson
 
A Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African GovernmentA Framework for Cloud Computing Adoption in South African Government
A Framework for Cloud Computing Adoption in South African Government
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Tech gate kevin l jackson - 09-21-2013
Tech gate   kevin l jackson - 09-21-2013Tech gate   kevin l jackson - 09-21-2013
Tech gate kevin l jackson - 09-21-2013
 
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...Paving the Way to the Cloud:  Cloud Services Brokerage for Highly Secure, Dem...
Paving the Way to the Cloud: Cloud Services Brokerage for Highly Secure, Dem...
 
Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)Government cloud deployment lessons learned final (4 4 2013)
Government cloud deployment lessons learned final (4 4 2013)
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Cryptographic Data Splitting and Cloud Computing

  • 1. Cryptographic Data Splitting & Cloud Computing By Kevin L. Jackson, Engineering Fellow NJVC, LLC Presented to: AFCEA Technology Over Bagels October 12, 2010
  • 2. The New IT Era IDC September 2008 rev date 10/12/2010
  • 3. What is Cloud Computing An Amalgamation of Technologies An Amalgamation of Technologies – Converging on a Revolutionary and Transformational Services Delivery Model “A pay-per-use model for enabling available, convenient and on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. ” Other terms frequently associated with “cloud computing” include: NIST Definition - “network-centric” - “application service provider (ASP)” - “external hosting” and “co-location” - “private cloud = Intranet-based” © 2008 Science Applications International Corporation. All rights reserved. SAIC and the SAIC logo are registered trademarks of Science Applications International Corporation in the U.S. and/or other countries.
  • 4. Non-Scalable Applications Are Expensive and Risky  Non-scalable applications suffer from diminishing returns on added resources  As the business grows, per transaction costs INCREASE  At some point the application will hit a wall, leading to:  Application crashes (and potential disaster for the business – at huge cost)  Expensive process of re-architecting the application every few months/years Non-Linear Scalability (15% Contention) $1,200,000 $1,000,000 Server cost: $20,000 Total Solution Cost $800,000 $600,000 Single server throughput: The Scalability 1,000 tx/sec $400,000 Wall Contention: $200,000 15% $0 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 9,000 10,000 Required Throughput (e.g., Tx/Sec)
  • 5. The Goal: Linear Scalability On Demand  No diminishing returns on scale  No code changes when scaling  Drop in another box and increase capacity linearly $1,200,000 $1,000,000 $800,000 $600,000 $400,000 $200,000 $0 1,000 2,000 3,000 4,000 5,000 6,000 7,000 8,000 9,000 10,000 1,000 tx/sec tx/sec tx/sec tx/sec 2,000 3,000 4,000 Linear Scalability Non-Linear Scalability (15% Contention)
  • 6. Cloud Computing Value 140 120 100 OPEX 80 Cost 60 Capability Demand Traditional 40 CAPEX 20 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 140 120 100 80 Cost (20% premium) 60 Capability Demand Cloud OPEX 40 20 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Courtesy The Open Gro
  • 7. Economic Benefit (Booz Allen Hamilton, October 2009)
  • 8. Speed of Cost Reduction, Cost of Change Courtesy The Open Gro
  • 9. Optimizing Ownership Use Courtesy The Open Gro
  • 10. Optimizing Time to Deliver Capability Courtesy The Open Gro
  • 11. Value and Capabilities  Time  Reduce time to deliver/execute mission  Increased responsiveness/flexibility/availability  Cost  Optimizing cost to deliver/execute mission  Optimizing cost of ownership (lifecycle cost)  Increased efficiencies in capital/operational expenditures  Quality  Environmental improvements  Experiential improvements
  • 12. Government Cloud Computing United States Federal Chief Information Officers Council Data.gov & IT Dashboard Defense Information Systems Agency (DISA) Rapid Access Computing Environment (RACE) US Department of Energy (DOE) Magellan General Services Administration (GSA) Apps.gov Department of the Interior National Business Center (NBC) Cloud Computing NASA Nebula National Institute of Standards and Technology (NIST) United Kingdom G-Cloud European Union Resources and Services Virtualization without Barriers Project (RESERVOIR) Canada Canada Cloud Computing Cloud Computing and the Canadian Environment Japan The Digital Japan Creation Project (ICT Hatoyama Plan) The Kasumigaseki Cloud
  • 13. Communications Infrastructure Continuum Military Tactical Edge High Performance The Mainstream Mobile, Ad Hoc Networks Internet Networks Some Common Characteristics Some Common Characteristics Some Common Characteristics • Stable infrastructure • Mixed range of assets • Ad hoc assets • Fiber optic/High-speed RF/wireless • Mixed media • Generally wireless optical • Tending to higher bandwidth • Design for degraded operation • Highest bandwidth • Overprovisioned • Large variability in latency and • Low latency bandwidth • Low to high latency •Connection-oriented links • Highly dynamic routing • Table-based routing • Policy-based QoS • More distributed network service • Mixed policies in forwarding and models required QoS • Change is the norm
  • 14. Humanitarian Assistance and Disaster Response (HADR) Humanity & Infrastructure  Damaged local infrastructure  Heterogeneous mobile support/response infrastructure  Secure/Sensitive/Unsecure information requirements  Network flexibility paramount
  • 15. Cloud Computing  Not a technology but a new way of provisioning and consuming information technology  An automated SOA implemented with “brutal standardization” over a virtualized infrastructure (compute, storage, networks) enables cloud computing Key Benefits Key Concerns  Significant cost reductions  Standards  Reduced time to capability  Portability  Increased flexibility  Control/Availability  Elastic scalability  Security  Increase service quality  IT Policy  Increased security  Management / Monitoring  Ease of technology refresh  Ecosystem  Ease of collaboration  Increased efficiency
  • 16. Cloud Computing Security  Increased virtualization (Compute, Storage, Network)  Modification of infrastructure centric security policies  Support of information risk management profiles  “Brutal standardization” to increase automation and reduces opportunity for human error  Increased infrastructure visibility to improve ability to deploy, monitor and enforce security policies  Implementation of advanced data-centric security technologies  Global File Systems / Content Addressable Storage  Global, Shared Infrastructures  Dynamic, Non-traditional Coalitions
  • 17. Cryptographic Data Splitting (SecureParser® ) Cryptographically splits data Document E-mail Database Email - Database Video Map Imagery Imagery Creates physically separate fault tolerant Shares High-efficiency cryptographic module: CDIP & COI Framework • Provably-secure Computational Secret Sharing • Cryptographic Data Splitting AES Encryption • Data Integrity Protection • Modules can be change out, e.g. AES could be changed with a Random Bit Split TYPE I encryption as requirement called for “M of N ” Fault Tolerance Share Authentication Physically Separate Shares •Written to Storage – Data at Rest •Written to Networks – Data in Motion • Created at any IO Point in the system 1 2 3 4 User Definable • Number of Shares • Fault Tolerance • Key Management
  • 19. Independent Testing and Evaluation 2005 CWID: AFCA assessment & AF C2 Battle Lab demo “…as demonstrating the potential to be labeled as an MLS/PL-4 System…” 2005 DISA: Technical Information Panel (TIP) “…found to have merit for further evaluation and consideration for use as an information assurance technology…potential to fundamentally alter the way storing and securing of data is approached.” 2006 SOCOM: National Center for the Study of Counter-terrorism and Cybercrime IV&V completed successfully for SOCOM MLS Pilot Project 2006 EUCOM Combined Endeavor: Joint Interoperability Test Center (JITC) “…value of the SecureParser was obvious. This capability not only offers increased security of data, but reduces costs by eliminating the need for redundant resources.” 2008 Selected by DISA as a demonstration solution for CWID’08 - June 08 Selected by NSA for HAP Trade Study as a Crypto Service and for DAR
  • 20. ISR Data – Collection to War fighter IA Collection Communication Storage and Sharing. Hiding War Fighter Data in Plain Site on the Access GIG. Geographically distributed Data and Servers X X Data transmitted through multiple paths (Satellite and Terrestrial) WAN/DIB X Ground ISR Data Processing center Secure ISR Secure and Highly Secure ISR Data Secure and Highly Secure and Highly Data Available Sharing Available Storage and Available COI ISR Communications Integrated Backup Data Sharing
  • 21. Conclusion  Cloud Computing represents an important shift in the consumption and delivery of information technology  Shift from infrastructure-centric to data-centric computing (and security)  Cryptographic data splitting can support the security needs of this new era.
  • 22. Thank You ! Kevin L. Jackson Director Cloud Computing Services NJVC, LLC (703) 335-0830 Kevin.Jackson@NJVC.com http://kevinljackson.blogspot.com http://govcloud.ulitzer.com