Advertisement

Cloud Computing

  • Ajey LeleEmail author
Chapter
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 132)

Abstract

With the advent of Revolution in Military Affairs (RMA), new operational concepts and doctrines are evolving. Various modern technologies more specifically, technologies related to cyber and space domains are making a significant impact, and states are preparing themselves to fight in digitized battlefield environments. Various developments in the field of information and communication technologies (ICT) are found impacting the warfighting strategies of the nation states. As evident from few other chapters in this section as well that cyberspace is a complex, rapidly changing, increasingly interconnected real-time technological domain. Furthermore, progressions in ICT have a direct and indirect impact on various security architectures as well. Security agencies are embracing several new technological additions (both hardware and software). This chapter discusses one such addition to the field of computing—cloud computing—and its impact on the overall security architecture.

References

  1. 1.
    Lele, A., Sharma, M.: Relevance of cloud computing for defence. J. Def. Stud. 8(2), 63–84 (2014)Google Scholar
  2. 2.
    Kang, J.: Model of cloud computing platform as a service to VR/AR military cyber simulation operation problem. Available at http://www.iosrjournals.org/iosr-jce/papers/Vol19-issue4/Version-3/L1904037376.pdf. Accessed on 05 Nov 2017
  3. 3.
    Mell, P., Grance, T.: The NIST definition of cloud computing. Special publication 800–145, National Institute of Standards and Technology, US Department of Commerce, Sept 2011, p. 2. See http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Accessed 1 Oct 2013
  4. 4.
    Huth, A., Cebula, J.: The Basics of Cloud Computing, pp. 2–3. US-CERT. Available at http://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf. Accessed 1 Oct 2013. Also, refer to http://www.cloud-competence-center.com/understanding/cloud-computing-service-models/. Accessed 10 Nov 2013
  5. 5.
  6. 6.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur Gener Comput Syst 28, p. 1. Available at http://www.cse.msstate.edu/dampier/cse8993/zissis%20and%20lekkas.pdf. Accessed 2 Oct 2013CrossRefGoogle Scholar
  7. 7.
    Crozier, R.; Defence Views Copyright as Barrier to Cloud. itnews (Sydney), 19 Dec 2012. Available at http://www.itnews.com.au/News/326854,defence-views-copyright-as-barrier-to-cloud.aspx. Accessed 18 Oct 2013
  8. 8.
  9. 9.
    Gordon, J., Hayashi, C., Elron, D., Huang, L., Neill, R., Exploring the Future of Cloud Computing, p. 2. World Economic Forum, Switzerland (2010). Available at http://www3.weforum.org/docs/WEF_ITTC_FutureCloudComputing_Report_2010.pdf. Accessed 2 Oct 2013
  10. 10.
    Fischer, E.A., Figliola, P.M.: Overview and Issues for Implementation of the Federal Cloud Computing Initiative. In: Congressional Research Service, p. 9. Note R42887 (2013). Available at http://www.fas.org/sgp/crs/misc/R42887.pdf. Accessed 4 Oct 2013
  11. 11.
    Linthicum, D.: How and Why the Military should Adopt the Cloud, 14 May 2010. Available at http://www.infoworld.com/d/cloud-computing/how-and-why-the-military-should-adopt-the-cloud-484. Accessed 4 Oct 2013
  12. 12.
    Spalding, R.S.: Cloud Computing and the New Age of War, p. 7. Air War College, United States Air Force. Available at http://www.au.af.mil/au/awc/awcgate/cst/bh2009_spalding.pdf. Accessed on 9 Mar 2014
  13. 13.
    The US Department of Defense.: Cyber Security and Reliability in a Digital Cloud, p. 7, Jan 2013. Available at http://www.acq.osd.mil/dsb/reports/CyberCloud.pdf. Accessed 6 Oct 2013
  14. 14.
    Accenture.: A New Era Cloud Ushers in Insight-driven Defense, pp. 9–10. Available at http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-New-Era-Cloud-Ushers-in-Insight-Driven-Defense.pdf. Accessed 6 Oct 2013
  15. 15.
    Lockheed Martin and Market Connections Inc.: Getting Secure in the Cloud, p. 5, July 2011. Available at http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/Getting-Secure-in-the-Cloud.pdf. Accessed 6 Oct 2013
  16. 16.
    Defense Systems.: Army Awards IBM Private Cloud Computing deal. Available at https://defensesystems.com/articles/2017/01/19/armyibm.aspx,accessed. Accessed on 5 Nov 2017
  17. 17.
    Takai, T.: DoD CIO’s 10-Point Plan for IT Modernization, pp. 4–6. US Department of Defense, Washington, DC (2012). Available at http://dodciodefense.gov/Portals/0/Documents/ITMod/CIO%2010%20Point%20Plan%20for%20IT%20Modernization.pdf. Accessed 1 Oct 2013
  18. 18.
    Tanaka, E.: The NSA and Military Cloud Computing, 27 Jan 2012. See http://www.patexia.com/feed/thensa-and-military-cloudcomputing-just-painting-a-cyber-bullseye-for-attackers-2401. Accessed 8 Oct 2013
  19. 19.
    The US Department of Defense.: Cloud Computing Strategy, p. 4, July 2012. Available at http://www.defense.gov/news/dodcloudcomputingstrategy.pdf. Accessed 8 Oct 2013
  20. 20.
    Montalbano, E.: Army Awards $250 Million Cloud Contract. InformationWeek, New York, 9 Jan 2012. Available at http://www.informationweek.com/government/cloud-saas/army-awards-250-million-cloud-contract/232301444. Accessed 12 Oct 2013
  21. 21.
    Kenyon, H.S.: Joint Information Environment is Under Way, 16 Sept 2013. Available at http://www.afcea.org/content/?q=node/11696. Accessed 25 Nov 2013
  22. 22.
    Bur, J.: Multibillion-Dollar Contract Looks to Reshape DoD Cloud Capabilities, 7 March 2018. https://www.federaltimes.com/it-networks/2018/03/08/multibillion-dollar-contract-looks-to-reshape-dod-cloud-capabilities/. Accessed on 18 July 2018
  23. 23.
    Miller, J.: Pressure on DoD to Change JEDI Cloud Approach Increases, 4 June 2018. https://federalnewsradio.com/reporters-notebook-jason-miller/2018/06/pressure-on-dod-to-change-jedi-cloud-approach-increases/. Accessed on 18 July 2018
  24. 24.
    China’s Cloud Computing Strategy. Hong Kong Trader, 5 June 2013. Available at http://www.China-S-Cloud-Computing-Strategy.htm. Accessed 24 Oct 2013
  25. 25.
    Kania, E.: China’s quest for informatization drives PLA reforms, March 2017. The Diplomat. Available at https://thediplomat.com/2017/03/chinas-quest-for-informatization-drives-pla-reforms/. Accessed on 6 Nov 2017
  26. 26.
    Ragland, L.A., McReynolds, J., Southerland, M., Mulvenon, J.: Red cloud rising: cloud computing in China, p. 38. Research Report prepared on behalf of the US–China Economic and Security Review Commission, Centre for Intelligence Research and Analysis, 5 Sept 2013. Available at http://china.usc.edu/App_Images//uscc-2013-china-cloud-computing.pdf. Accessed 18 Oct 2013
  27. 27.
  28. 28.
    The UK MoD.: Defence ICT Strategy, No. 1.00, p. 26, 29 Oct 2010. Available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/27373/modict_strategyv1.pdf. Accessed 18 Oct 2013
  29. 29.
  30. 30.
    Department of Finance and Deregulation of the Australian Government, Australian Government Cloud Computing Policy, Version 2.0, May 2013, p. 4. Available at http://agimo.gov.au/files/2012/04/Australian-Government-Cloud-Computing-Policy-Version-2.0.pdf. Accessed 18 Oct 2013
  31. 31.
    Connolly, B.: Interview: Dr Peter Lawrence, CIO, Department of Defence. CIO (Sydney), 4 Feb 2013. Available at http://www.cio.com.au/article/452683/interview_dr_peter_lawrence_cio_department_defence/. Accessed 18 Oct 2013
  32. 32.
  33. 33.
  34. 34.
  35. 35.
    CDAC.: Cloud Computing at CDAC. Available at http://cdac.in/index.aspx?id=cloud_ci_cloud_computing. Accessed 12 Oct 2013
  36. 36.
    Deloitte.: Cloud Computing: Forecasting Change, p. 22. Available at https://www.deloitte.com/assets/Dcom-Global/Local%20Assets/Documents/TMT/cloud_-_market_overview_and_perspective.pdf. Accessed 22 Oct 2013. Samson, T.: Top 9 threats to cloud computing security. Infoworld, 25 Feb 2013. Available at http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428?page=0,1. Accessed 9 Mar 2014
  37. 37.
    Samson, T.: Top 9 Threats to Cloud Computing Security. Infoworld, 25 Feb 2013. Available at http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428?page=0,1. Accessed 9 Mar 2014
  38. 38.
    Announcing the IBM Watson Ecosystem Program. Available at http://www-03.ibm.com/innovation/us/watson/index.shtml. Accessed 27 Nov 2013

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Institute for Defence Studies and AnalysesNew DelhiIndia

Personalised recommendations