Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 132))

Abstract

With the advent of Revolution in Military Affairs (RMA), new operational concepts and doctrines are evolving. Various modern technologies more specifically, technologies related to cyber and space domains are making a significant impact, and states are preparing themselves to fight in digitized battlefield environments. Various developments in the field of information and communication technologies (ICT) are found impacting the warfighting strategies of the nation states. As evident from few other chapters in this section as well that cyberspace is a complex, rapidly changing, increasingly interconnected real-time technological domain. Furthermore, progressions in ICT have a direct and indirect impact on various security architectures as well. Security agencies are embracing several new technological additions (both hardware and software). This chapter discusses one such addition to the field of computing—cloud computing—and its impact on the overall security architecture.

This chapter is the updated version of author’s earlier work please refer Lele and Sharma [1].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The Autonomous Real-Time Ground Ubiquitous Surveillance Imaging System (ARGUS-IS) has a video sensor which produces 1.8 billion pixels per frame at 12 frames per second, providing continuous coverage of an area up to 100 km2 area. A single ARGUS-IS class sensor can produce more than a petabyte of data per day. Processing video data from sensors such as ARGUS-IS requires stitching the images from the individual cameras, rectifying the data according to known geographic references, removing the effects of motion by the airborne platform, modelling the unchanging background, detecting and tracking vehicle motion, selectively compressing the raw data and archiving the results. This processing chain might require 100 operations per pixel.

  2. 2.

    Exploratory security analytics is a cloud-driven tool that enables defence agencies to track and model the activities, motivations and behaviours of their cyber adversaries, and to use this intelligence to anticipate emerging threats and take proactive actions to head them off. The scale and processing power needed to support these tools means that the cloud is the only viable and cost-effective environment in which to run them.

  3. 3.

    Crozier, ‘Defence Views Copyright as Barrier to Cloud’.

  4. 4.

    Available at http://www.nasscom.in/government-india%E2%80%99s-ve?fg=248518. Accessed 24 November 2013.

  5. 5.

    Meghdooth offers various features in cloud environment such as platform and infrastructure as a service (PaaS and IaaS), on-demand dynamic provisioning, metering and monitoring, graphical installation of middleware stack, Web-based management of cloud resources, provision for deployment of multi-instance user appliances, customized elasticity, Web service-based management of cloud, high availability and enhanced security across layers.

  6. 6.

    The PATRIOT Act in the US applies to all data held by all US companies, irrespective of the location of the data. Department of Innovation Industry, Science and Research—Australian Government, ‘Cloud Computing—Opportunities and Challenges’, October 2011, p. 17, available at http://www.innovation.gov.au/Industry/InformationandCommunicationsTechnologies/ITIIC/Documents/CloudComputingOpportunitiesandChallenges.pdf, accessed 22 October 2013.

References

  1. Lele, A., Sharma, M.: Relevance of cloud computing for defence. J. Def. Stud. 8(2), 63–84 (2014)

    Google Scholar 

  2. Kang, J.: Model of cloud computing platform as a service to VR/AR military cyber simulation operation problem. Available at http://www.iosrjournals.org/iosr-jce/papers/Vol19-issue4/Version-3/L1904037376.pdf. Accessed on 05 Nov 2017

  3. Mell, P., Grance, T.: The NIST definition of cloud computing. Special publication 800–145, National Institute of Standards and Technology, US Department of Commerce, Sept 2011, p. 2. See http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Accessed 1 Oct 2013

  4. Huth, A., Cebula, J.: The Basics of Cloud Computing, pp. 2–3. US-CERT. Available at http://www.us-cert.gov/sites/default/files/publications/CloudComputingHuthCebula.pdf. Accessed 1 Oct 2013. Also, refer to http://www.cloud-competence-center.com/understanding/cloud-computing-service-models/. Accessed 10 Nov 2013

  5. http://www.cloud-competence-center.com/understanding/cloud-computing-service-models/. Accessed on 21 March 2014

  6. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur Gener Comput Syst 28, p. 1. Available at http://www.cse.msstate.edu/dampier/cse8993/zissis%20and%20lekkas.pdf. Accessed 2 Oct 2013

    Article  Google Scholar 

  7. Crozier, R.; Defence Views Copyright as Barrier to Cloud. itnews (Sydney), 19 Dec 2012. Available at http://www.itnews.com.au/News/326854,defence-views-copyright-as-barrier-to-cloud.aspx. Accessed 18 Oct 2013

  8. https://www.gartner.com/newsroom/id/3815165. Accessed 18 July 2018

  9. Gordon, J., Hayashi, C., Elron, D., Huang, L., Neill, R., Exploring the Future of Cloud Computing, p. 2. World Economic Forum, Switzerland (2010). Available at http://www3.weforum.org/docs/WEF_ITTC_FutureCloudComputing_Report_2010.pdf. Accessed 2 Oct 2013

  10. Fischer, E.A., Figliola, P.M.: Overview and Issues for Implementation of the Federal Cloud Computing Initiative. In: Congressional Research Service, p. 9. Note R42887 (2013). Available at http://www.fas.org/sgp/crs/misc/R42887.pdf. Accessed 4 Oct 2013

  11. Linthicum, D.: How and Why the Military should Adopt the Cloud, 14 May 2010. Available at http://www.infoworld.com/d/cloud-computing/how-and-why-the-military-should-adopt-the-cloud-484. Accessed 4 Oct 2013

  12. Spalding, R.S.: Cloud Computing and the New Age of War, p. 7. Air War College, United States Air Force. Available at http://www.au.af.mil/au/awc/awcgate/cst/bh2009_spalding.pdf. Accessed on 9 Mar 2014

  13. The US Department of Defense.: Cyber Security and Reliability in a Digital Cloud, p. 7, Jan 2013. Available at http://www.acq.osd.mil/dsb/reports/CyberCloud.pdf. Accessed 6 Oct 2013

  14. Accenture.: A New Era Cloud Ushers in Insight-driven Defense, pp. 9–10. Available at http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture-New-Era-Cloud-Ushers-in-Insight-Driven-Defense.pdf. Accessed 6 Oct 2013

  15. Lockheed Martin and Market Connections Inc.: Getting Secure in the Cloud, p. 5, July 2011. Available at http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/Getting-Secure-in-the-Cloud.pdf. Accessed 6 Oct 2013

  16. Defense Systems.: Army Awards IBM Private Cloud Computing deal. Available at https://defensesystems.com/articles/2017/01/19/armyibm.aspx,accessed. Accessed on 5 Nov 2017

  17. Takai, T.: DoD CIO’s 10-Point Plan for IT Modernization, pp. 4–6. US Department of Defense, Washington, DC (2012). Available at http://dodciodefense.gov/Portals/0/Documents/ITMod/CIO%2010%20Point%20Plan%20for%20IT%20Modernization.pdf. Accessed 1 Oct 2013

  18. Tanaka, E.: The NSA and Military Cloud Computing, 27 Jan 2012. See http://www.patexia.com/feed/thensa-and-military-cloudcomputing-just-painting-a-cyber-bullseye-for-attackers-2401. Accessed 8 Oct 2013

  19. The US Department of Defense.: Cloud Computing Strategy, p. 4, July 2012. Available at http://www.defense.gov/news/dodcloudcomputingstrategy.pdf. Accessed 8 Oct 2013

  20. Montalbano, E.: Army Awards $250 Million Cloud Contract. InformationWeek, New York, 9 Jan 2012. Available at http://www.informationweek.com/government/cloud-saas/army-awards-250-million-cloud-contract/232301444. Accessed 12 Oct 2013

  21. Kenyon, H.S.: Joint Information Environment is Under Way, 16 Sept 2013. Available at http://www.afcea.org/content/?q=node/11696. Accessed 25 Nov 2013

  22. Bur, J.: Multibillion-Dollar Contract Looks to Reshape DoD Cloud Capabilities, 7 March 2018. https://www.federaltimes.com/it-networks/2018/03/08/multibillion-dollar-contract-looks-to-reshape-dod-cloud-capabilities/. Accessed on 18 July 2018

  23. Miller, J.: Pressure on DoD to Change JEDI Cloud Approach Increases, 4 June 2018. https://federalnewsradio.com/reporters-notebook-jason-miller/2018/06/pressure-on-dod-to-change-jedi-cloud-approach-increases/. Accessed on 18 July 2018

  24. China’s Cloud Computing Strategy. Hong Kong Trader, 5 June 2013. Available at http://www.China-S-Cloud-Computing-Strategy.htm. Accessed 24 Oct 2013

  25. Kania, E.: China’s quest for informatization drives PLA reforms, March 2017. The Diplomat. Available at https://thediplomat.com/2017/03/chinas-quest-for-informatization-drives-pla-reforms/. Accessed on 6 Nov 2017

  26. Ragland, L.A., McReynolds, J., Southerland, M., Mulvenon, J.: Red cloud rising: cloud computing in China, p. 38. Research Report prepared on behalf of the US–China Economic and Security Review Commission, Centre for Intelligence Research and Analysis, 5 Sept 2013. Available at http://china.usc.edu/App_Images//uscc-2013-china-cloud-computing.pdf. Accessed 18 Oct 2013

  27. http://www.xinhuanet.com/english/2017-11/08/c_136736736.htm. Accessed on 18 July 2018

  28. The UK MoD.: Defence ICT Strategy, No. 1.00, p. 26, 29 Oct 2010. Available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/27373/modict_strategyv1.pdf. Accessed 18 Oct 2013

  29. https://www.bbc.co.uk/news/technology-37285667. Accessed 18 July 2018

  30. Department of Finance and Deregulation of the Australian Government, Australian Government Cloud Computing Policy, Version 2.0, May 2013, p. 4. Available at http://agimo.gov.au/files/2012/04/Australian-Government-Cloud-Computing-Policy-Version-2.0.pdf. Accessed 18 Oct 2013

  31. Connolly, B.: Interview: Dr Peter Lawrence, CIO, Department of Defence. CIO (Sydney), 4 Feb 2013. Available at http://www.cio.com.au/article/452683/interview_dr_peter_lawrence_cio_department_defence/. Accessed 18 Oct 2013

  32. https://www.dta.gov.au/news/new-strategy-for-cloud/. Accessed on 12 Jun 2018

  33. http://meity.gov.in/writereaddata/files/GI_Cloud_Website_Note%20%281%29.pdf. Accessed on 22 Jun 2018

  34. http://pib.nic.in/newsite/PrintRelease.aspx?relid=102979. Acessed on 12 Jun 2018

  35. CDAC.: Cloud Computing at CDAC. Available at http://cdac.in/index.aspx?id=cloud_ci_cloud_computing. Accessed 12 Oct 2013

  36. Deloitte.: Cloud Computing: Forecasting Change, p. 22. Available at https://www.deloitte.com/assets/Dcom-Global/Local%20Assets/Documents/TMT/cloud_-_market_overview_and_perspective.pdf. Accessed 22 Oct 2013. Samson, T.: Top 9 threats to cloud computing security. Infoworld, 25 Feb 2013. Available at http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428?page=0,1. Accessed 9 Mar 2014

  37. Samson, T.: Top 9 Threats to Cloud Computing Security. Infoworld, 25 Feb 2013. Available at http://www.infoworld.com/t/cloud-security/9-top-threats-cloud-computing-security-213428?page=0,1. Accessed 9 Mar 2014

  38. Announcing the IBM Watson Ecosystem Program. Available at http://www-03.ibm.com/innovation/us/watson/index.shtml. Accessed 27 Nov 2013

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ajey Lele .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lele, A. (2019). Cloud Computing. In: Disruptive Technologies for the Militaries and Security. Smart Innovation, Systems and Technologies, vol 132. Springer, Singapore. https://doi.org/10.1007/978-981-13-3384-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3384-2_10

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3383-5

  • Online ISBN: 978-981-13-3384-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics