Group Picture of CDCC Professors, Staff and Students
CDCC Spelman 2023
CDCC Photo
IU cybersecurity researchers awarded multi-institutional NSF grants to protect data, user privacy
IU cybersecurity researchers awarded multi-institutional NSF grants to protect data, user privacy
Collaborative Proposal: SaTC: Frontiers: Center for Distributed Confidential Computing (CDCC)
Collaborative Proposal: SaTC: Frontiers: Center for Distributed Confidential Computing (CDCC)
Join us
Join us

IU has multiple PostDoc and Ph.D. RA positions open, in the areas of TEE-based confidential computing and trustworthy AI.  For those who are interested, please contact XiaoFeng Wang ([email protected]) and Haixu Tang ([email protected]). 

CDCC is Recruiting 2025 Undergraduate Summer Intern and REU Students
CDCC is Recruiting 2025 Undergraduate Summer Intern and REU Students
previous arrow
next arrow

Center for Distributed Confidential Computing (CDCC) is an academic project aiming to lay the technical foundations for scalable data-in-use protection on cloud and edge systems. It is a multi-institution project sponsored by the Secure and Trustworthy Cyberspace Frontiers Program of the National Science Foundation.

What We Do

Advances in AI and big data analytics rely on data sharing, which can be impeded by privacy concerns. Most challenging in privacy protection is protection of data-in-use, since even encrypted data needs to be decrypted before it can be utilized, thereby exposing data content to unauthorized parties. A practical and scalable solution to the challenge will transform computing, enabling unprecedented capabilities such as confidential outsourcing, trusted computing services, and confidential or privacy-preserving collaboration. In quest of such a holy grail of data protection, The Center for Distributed Confidential Computing (CDCC) is established by the National Science Foundation as multi-institution and multi-disciplinary center to create a research, education, knowledge transfer and workforce development environment that enables scalable, practical, verifiable and usable data-in-use protection based upon Trusted Execution Environments (TEE) on today and tomorrow’s cloud and edge systems.

Announcements