Visible to the public Security Requirements for Cloud-based C4I Security Architecture

TitleSecurity Requirements for Cloud-based C4I Security Architecture
Publication TypeConference Paper
Year of Publication2019
AuthorsKoo, J., Kim, Y., Lee, S.
Conference Name2019 International Conference on Platform Technology and Service (PlatCon)
Keywordscloud computing, cloud computing system, cloud computing technology, cloud-based C4I security architecture, Cloud-based C4I Security Requirements, command and control systems, computer security, Information systems, Korea Military, Korea national defense information system, military computing, national defense command control system, national innovation, policy-based governance, pubcrawl, public sector, secure security architecture, security of data, Security Policies Analysis, security requirements, security vulnerabilities, Servers, Task Analysis, US military
AbstractWith the development of cloud computing technology, developed countries including the U.S. are performing the efficiency of national defense and public sector, national innovation, and construction of the infrastructure for cloud computing environment through the policies that apply cloud computing. Korea Military is also considering that apply the cloud computing technology into its national defense command control system. However, only existing security requirements for national defense information system cannot solve the problem related security vulnerabilities of cloud computing. In order to solve this problem, it is necessary to design the secure security architecture of national defense command control system considering security requirements related to cloud computing. This study analyze the security requirements needed when the U.S. military apply the cloud computing system. It also analyze existing security requirements for Korea national defense information system and security requirements for cloud computing system and draw the security requirements needed to Korea national defense information system based on cloud computing.
DOI10.1109/PlatCon.2019.8668963
Citation Keykoo_security_2019