Regulated Research Computational Environment

The Regulated Research Computational Environment (RRCE) is a collaborative effort between ODU and EVMS. It serves as a virtual laboratory environment for researchers to access computation and storage resources to analyze regulated data sets, such as Controlled Unclassified Information (CUI) and Health Insurance Portability and Accountability Act (HIPAA) data. RRCE offers various capabilities, including high-capacity storage and state-of-the-art Graphics Processing Units (GPUs), which accelerate Artifical Intelligence/Machine Learning research, data science, and High-Performance Computing (HPC).

  • High-speed connectivity between ODU, VMASC, and EVMS
  • Hyperconverged virtual environment in secure, segmented network
  • 240 computation cores
  • 12 Nvidia A100 GPUs
  • 17TiB of memory
  • 330TiB of usable storage (including 30TiB of SSD)
  • NIST 800-171and CMMC level 2 compliance

General sensitive data

(ex: business confidential)

Regulated sensitive data

  • FERPA (educational data, e.g. student records)
  • Controlled Unclassified Information (CUI, NIST-171)
  • ITAR data (export-controlled data)

HIPAA Virtual Lab

CUI Virtual Lab

  • High-speed connectivity between ODU, VMASC, and EVMS
  • Hyperconverged virtual environment in secure, segmented network
  • 240 computation cores
  • 12 Nvidia A100 GPUs
  • 17TiB of memory
  • 330TiB of usable storage (including 30TiB of SSD)
  • NIST 800-171and CMMC level 2 compliance

General sensitive data

(ex: business confidential)

Regulated sensitive data

  • FERPA (educational data, e.g. student records)
  • Controlled Unclassified Information (CUI, NIST-171)
  • ITAR data (export-controlled data)

HIPAA Virtual Lab

CUI Virtual Lab

240
Computation Cores
17
TiB of Memory
12
Nvidia A100 GPUs

tiCrypt

tiCrypt is a browser-based application that offers secure data sharing and storage capabilities, as well as the ability to deploy virtual machines (VMs) for secure computation and analysis. The application uses public-key cryptogra-phy to ensure that authentication and encryption of user data is secure and reliable. Unlike other data storage plat-forms, all resources in tiCrypt are end-to-end encrypted with independent keys that are under the user’s control. tiCrypt’s VM deployment feature allows for more robust and secure computation and analysis, making it an ideal tool for organizations that prioritize security and data privacy.

  • Linux and Windows virtual machines built on demand from golden images
  • Persistent, encrypted data storage and sharing via tiCrypt’s Vault and Drives
  • Audit logging and alerting
  • Data labeling for security classification
  • Secure data ingestion via forms and SFTP
  • Connections to the RRCE are secured via VPN
  • tiCrypt login requires a private key, pass-word, and multi-factor authentication
  • User keypairs are RSA-2048 and are encrypted using an AES-256 key derived from the user’s password
  • Files in a user’s vault and drives are en-crypted with symmetric keys, which are in turn encrypted with the user’s private key
  • VMs are not exposed to the internet. RDP and SFTP access are tunneled through tiCrypt

  • Linux and Windows virtual machines built on demand from golden images
  • Persistent, encrypted data storage and sharing via tiCrypt’s Vault and Drives
  • Audit logging and alerting
  • Data labeling for security classification
  • Secure data ingestion via forms and SFTP

  • Connections to the RRCE are secured via VPN
  • tiCrypt login requires a private key, pass-word, and multi-factor authentication
  • User keypairs are RSA-2048 and are encrypted using an AES-256 key derived from the user’s password
  • Files in a user’s vault and drives are en-crypted with symmetric keys, which are in turn encrypted with the user’s private key
  • VMs are not exposed to the internet. RDP and SFTP access are tunneled through tiCrypt