Security Requirements for Cloud-based C4I Security Architecture

被引:5
|
作者
Koo, Jahoon [1 ]
Kim, Young-Gab [1 ]
Lee, Sang-Hoon [2 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Agcy Def Dev, Seoul, South Korea
关键词
Cloud-based C4I Security Requirements; Cloud-based C4I Security Architecture;
D O I
10.1109/platcon.2019.8668963
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the development of cloud computing technology, developed countries including the U.S. are performing the efficiency of national defense and public sector, national innovation, and construction of the infrastructure for cloud computing environment through the policies that apply cloud computing. Korea Military is also considering that apply the cloud computing technology into its national defense command control system. However, only existing security requirements for national defense information system cannot solve the problem related security vulnerabilities of cloud computing. In order to solve this problem, it is necessary to design the secure security architecture of national defense command control system considering security requirements related to cloud computing. This study analyze the security requirements needed when the U.S. military apply the cloud computing system. It also analyze existing security requirements for Korea national defense information system and security requirements for cloud computing system and draw the security requirements needed to Korea national defense information system based on cloud computing.
引用
收藏
页码:131 / 134
页数:4
相关论文
共 50 条
  • [1] Cloud Based C4I Systems: Security Requirements and Concerns
    Fazal-e-Amin
    Alghamdi, Abdullah S.
    Ahmad, Iftikhar
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), VOL 2, 2014, : 75 - 80
  • [2] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [3] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064
  • [4] Improving Security of Cloud Based C4I Systems: A Data Confidentiality Approach for C4I Test-Bed
    Fazal-e-Amin
    Ahmad, Iftikhar
    Alghamdi, Abdullah S.
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2017, 7 (03) : 720 - 728
  • [5] Modeling security requirements for cloud-based system development
    Ficco, Massimo
    Palmieri, Francesco
    Castiglione, Aniello
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2107 - 2124
  • [6] Toward the SIEM Architecture for Cloud-based Security Services
    Lee, Jong-Hoon
    Kim, Young Soo
    Kim, Jong Hyun
    Kim, Ik Kyun
    [J]. 2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 398 - 399
  • [7] C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment
    Baek, Seungjin
    Kim, Young-Gab
    [J]. SUSTAINABILITY, 2021, 13 (24)
  • [8] Enhancing C4I Security using Threat Modeling
    Alghamdi, Abdullah Sharaf
    Hussain, Tazar
    Khan, Gul Faraz
    [J]. 2010 12TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2010, : 131 - 136
  • [9] Security Requirements in a Federated Cloud Networking Architecture
    Massonet, Philippe
    Levin, Anna
    Celesti, Antonio
    Villari, Massimo
    [J]. ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2015), 2016, 567 : 79 - 88
  • [10] Providing Secret Authentication in Clustered Security Architecture for Cloud-Based WBAN
    Karthiga, I.
    Sankar, Sharmila
    [J]. COMPUTER JOURNAL, 2018, 61 (02): : 223 - +