Skip to main content

Cloud Computing Solutions

Cloud computing for research. Secure, scalable and customizable environments with a range of quantitative and qualitative software. 

  • Compute infrastructure

CCSS provides computing resources in a cloud environment with a wide range of available software directly to each account holder. Cloud server configurations include shared and dedicated computing options. Request Access Online

Based on member college approval, these resources are available to current Cornell faculty researchers, students, staff, and collaborators for research use only.

  • Software & Hardware

    • A variety of software applications are pre-installed for access to support both quantitative and qualitative research. Assistance is available via the CCSS HelpDesk and software FAQs, while hands-on training is available at our free workshops.

    • CCSS offers many options of server configurations for use in a shared or dedicated cloud-based environment. Software requisites and your research needs, will determine the amount of memory (RAM) and whether the system will have CPU or GPU processors available. CCSS provides each account holder with private data storage, shared storage for team collaboration, and daily backups for all research data.

      CCSS also provides customized secure computing environments for working with restricted research data. See CCSS policies for further information.

  • Requesting an Account

    A researcher can request access to our cloud or secure computing environments depending on whether they will be working with restricted data or not. The researcher is responsible for determining the appropriate computing environment based on the type of data they are working with. A researcher may schedule a consultation with us if they are unsure. 

    Request Access Online to the CCSS Cloud computing environment or Secure computing environment



  • Secure Data Environments

    • The majority of restricted data can be remotely accessed using the CRADC computing environment, which securely houses a vast range of restricted and confidential data. CCSS Secure Data Services team will guide you through the process of establishing your project on CRADC.

    • The Secure Standalone Enclave is used for restricted data that must be contained within a non-networked environment with no printing or data transfer abilities in a locked room. CCSS Secure Data Services team will help implement your research project on the Secure Standalone data Enclave to meet the most restrictive data provider requirements.

    • The FSRDC, located at 391 Pine Tree Rd. (CCSS), is a secure facility managed by the U.S. Census Bureau that provides secure access to confidential internal use files from various federal statistical agencies for statistical purposes only. To inquire about the proposal process and use of the Cornell FSRDC, please send an email to

    • Institute for Employment Research (IAB) of the German Federal Employment Agency

      Access to restricted German Federal Employment Agency data is available in person at the IAB Research Data Center (IAB-RDC) located in the CCSS building at 391 Pine Tree Road. Access to confidential administrative microdata is provided through a thin client connection directly to the IAB servers in Germany. Use requires the development and approval of a proposal. Please contact Secure Data Services to coordinate your access to the IAB-RDC.

  • User and Security Guides

    • Below is a classification table to assist you with identifying the type of data that is appropriate for the different CCSS computing environments. Data that are confidential, restricted, sensitive or proprietary CANNOT be used on the general cloud computing environment, and must be used on the Secure Data Computing Environments.


      General Cloud Computing Environments Secure Data Computing Environments
      No individual identity can be deduced directly or indirectly Detailed characteristics are present and identifiable
      Public use data Data is not publicly available
      De-identified variables Individual identifiers such as name, address, specific location are present
      Data provider agreement not required Data provider requires a use agreement
      No restrictions or terms and conditions controlling use by members of the Cornell community Terms and conditions controlling use of the data

      When your research data do not have specific security requirements (Public Use Data):

      • The hardware is comprised of a group of high-performance multi-processor virtual servers running Windows 2016.
      • The servers are remotely available to users with CCSS computing accounts, which are available to Cornell faculty, students, and staff.
      • Once connected, a variety of quantitative and qualitative data analysis software is available.
      • Private data storage and shared storage for team collaboration is made available to all computing accounts, along with daily backups for all of your research data.

      When your research data have specific security obligations (Secure Data):

      • Most of the above, based on your Data Provider Agreement, and
        • Two-factor authentication,
        • Controlled file transfer and data disclosure proofing,
        • No connection to the outside world via FTP, e-mail, Web, print, or disk mapping facility,
        • Strictly enforced protocols for selecting and changing user passwords.

      A researcher may schedule a consultation with us if they need additional support

  • Cornell Computational Services

Did your research benefit from Cornell Center for Social Sciences Cloud Computing Solutions?

Please acknowledge CCSS with the following language when publicizing or presenting your research results: “This research was supported by Cornell Center for Social Sciences Cloud Computing Solutions.”


  • We'd love to hear your ideas, suggestions, or questions!

    Are you
    CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.