The Brillance of Ingenuity

CFDRC Receives Air Force Contract for Developing Cyber Protection for Cloud Data

HUNTSVILLE, AL. December 4, 2012 - CFD Research Corporation (CFDRC) has been awarded an Air Force contract to develop quality of information algorithms and computer software for protecting data in cloud environments. The project focuses on evaluating the quality of data as it is processed in the cloud, and ensuring the data hasn’t been altered by cyber attacks.

“As we move more processing capabilities to the cloud, we need to consider how our data is being protected,” said Michael Lee, the CFDRC principal investigator. “Applications that use data pulled from the cloud need to know where the data came from and have a guarantee that the data wasn’t changed as a result of a cyber attack. Our technology provides this protection, even for information that has been modified many times in the cloud.”

CFDRC has already demonstrated this technology and has successfully identified compromises to information caused by either untrusted/malicious sources or cyber attacks. Now, CFDRC will apply this approach to cloud environments to protect information transferred within the cloud as well as to end users and mobile devices. In addition to its military benefits, CFDRC’s technology has a wide range of consumer benefits. It provides a hierarchical reputation metric that can determine the trustworthiness of online product reviews or comments. It can also help identify phishing attacks and cyber thieves in emails. However, its greatest benefit is its ability to protect information that is transferred between cloud services, such as restaurant locations imported into Google Maps, from cyber attacks and misinformation.

CFDRC’s Cyber Security and Assurance group has been developing network security and data protection technologies for DoD and other customers since 2005. CFDRC has been awarded several highly competitive SBIR and other R&D projects for applications including data integrity, network/data trust, mobile encryption, anti-tamper, Distributed Denial-of-Service (DDoS) defense, and Intrusion Detection Systems (IDS). These technologies can be leveraged and integrated to reduce development time and cost of optimal system solutions, and provide significant competitive advantage to system solution developers.

Bookmark & Share

Popular tags on this blog

air force | alabama innovation awards | andrzej przekwas | army | armytar | biobattery | EDPA | HudsonAlpha | human performance | inflatable aerostructure | kapil pant | lisa | materials modeling | mda | nasa | NIH | phil whitley | ROM | sameer singhal | stem cells | sweat sensor | synvivo | techalabama | uah | vincent harrand |