{"id":6100,"date":"2013-08-19T13:27:22","date_gmt":"2013-08-19T18:27:22","guid":{"rendered":"http:\/\/college.unc.edu\/?p=6100"},"modified":"2024-07-02T14:24:34","modified_gmt":"2024-07-02T14:24:34","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/collegearchive.unc.edu\/?p=6100","title":{"rendered":"$5.8 million NSF cyber security grant awarded to UNC, partners"},"content":{"rendered":"<figure id=\"attachment_6101\" aria-describedby=\"caption-attachment-6101\" style=\"width: 209px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6101\" alt=\"Michael Reiter (photo by Kelli Gaskill)\" src=\"https:\/\/collegearchive.unc.edu\/wp-content\/uploads\/sites\/21\/2024\/07\/reiter_mike.jpg\" width=\"209\" height=\"300\" \/><figcaption id=\"caption-attachment-6101\" class=\"wp-caption-text\">Michael Reiter (photo by Kelli Gaskill)<\/figcaption><\/figure>\n<p>A $5.8 million award from the National Science Foundation (NSF) will be used by the University of North Carolina at Chapel Hill and five partners for a large research project that will explore challenges in cyber security in the era of cloud computing.<\/p>\n<p>The NSF awarded nearly $20 million to three research projects. The <a href=\"http:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=128679\">Frontier Awards<\/a> support collaborative, multi-university research and education activities that will help protect the nation\u2019s vast information infrastructure.<\/p>\n<p>\u201cCyber security is one of the most significant economic and national security challenges facing our nation today,\u201d said Farnam Jahanian, NSF\u2019s assistant director for computer and information science and engineering.<\/p>\n<p>Michael Reiter, the Lawrence M. Slifkin Distinguished Professor of Computer Science in UNC\u2019s College of Arts and Sciences, is the principal investigator on the project, \u201cRethinking security in the era of cloud computing.\u201d Jay Aikat, a research assistant professor in computer science, is the UNC co-principal investigator. Outside partners include Stony Brook, Duke and North Carolina State universities, the University of Wisconsin at Madison, and RSA Labs, the research arm of American IT security firm RSA.<\/p>\n<p>Reiter said the vast majority of cloud computing research is driven by the perception that it decreases security for its customers, in comparison to those customers using their own infrastructures.<\/p>\n<p>\u201cInstead we see new opportunities for improving the security of data and services by moving them to the cloud, and we plan on pursuing an aggressive research agenda to realize these opportunities,\u201d he said.<\/p>\n<p>The five-year UNC project, dubbed Project Silver, will address challenges that include secure transport, authorization, user and software authentication and security monitoring, among other areas.<\/p>\n<p>The research team will convene \u201cCloud Security Horizons\u201d summits with industry stakeholders to contribute to the flow of knowledge between the research team and commercial vendors and cloud operators.<\/p>\n<p>\u201cThrough these summits, we hope to not only contribute to industry directions in cloud computing, but also to be informed of real-world problems and challenges,\u201d Reiter said.<\/p>\n<p>Project Silver will also develop teacher workshops which will enable faculty from different institutions to create curricular materials in cloud security and to integrate them into their current course offerings.<\/p>\n<p>For information, visit the project Web site, <a href=\"http:\/\/silver.cs.unc.edu\">http:\/\/silver.cs.unc.edu<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A $5.8 million award from the National Science Foundation will be used by UNC and five partners for a large research project that will explore challenges in cyber security in the era of cloud computing.<\/p>\n","protected":false},"author":4,"featured_media":6102,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[17],"tags":[2733,24,2878,74,2879,2880,2881,36,38,39,40],"class_list":["post-6100","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-natural-sciences-mathematics","tag-advocates-for-carolina","tag-carolina","tag-cloud-computing","tag-computer-science","tag-cyber-security","tag-frontier-awards","tag-michael-reiter","tag-unc","tag-unc-college-of-arts-and-sciences","tag-unc-chapel-hill","tag-university-of-north-carolina-at-chapel-hill"],"_links":{"self":[{"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/posts\/6100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6100"}],"version-history":[{"count":2,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/posts\/6100\/revisions"}],"predecessor-version":[{"id":46118,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/posts\/6100\/revisions\/46118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=\/wp\/v2\/media\/6102"}],"wp:attachment":[{"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/collegearchive.unc.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}