Proposing a Strategic Model for Transference of the Defensive Organizations in Cloud Computing Environment

Document Type : Research Paper

Authors

National Security - SNDU - Tehran - Iran

Abstract

Information technologies have a significant impact on all parts of an organization. Cloud computing is identified as a new technology which creates flexibility and robustness in an organization through sharing applied applications and resources among users in an organization. Moreover, most organizations throughout the world, especially defensive organizations are planning to migrate to cloud computing environment. Despite all the advantages of utilizing cloud computing environment in defensive organizations, security is taken as the most crucial challenges posed by cloud computing environment. As an applied and descriptive field study, this research aims at proposing a strategic model for transference of the defensive organizations in cloud computing environment. For this purpose, the study was also conducted through engaging the statistical population of commanders, managers and IT experts affiliated to the information technology organizations of the Iranian armed forces. Additionally, as research experts and elites, PhD candidates who pursued cyberspace strategic managements also participated in this study. The findings revealed that indentifying the infrastructure of defensive organizations in various sphere as well as proposing a strategic model for migrating in cloud computing environment are among the determining strategies investigated in this study. Finally, in terms of research findings, the measures associated with each strategy are also explicated in this study.

Keywords


فهرست منابع

رزمجو، محمدرضا (1386). مدیریت اطلاعات و تأثیر آن بر بنیۀ دفاعی. فصلنامه مدیریت نظامی، 8(25)، 27-48.
عبدی، فریدون (1390). سامانۀ فرماندهی و کنترل C5I2 و بررسی نقش رایانه‌ها در آن. فصلنامه مدیریت نظامی، 11(42)، 43-70.
مؤسسه آموزشی و تحقیقاتی صنایع دفاعی (1392). سند زیرساخت فاوای فرماندهی و کنترل.
نقیان فشارکی، مهدی (1393). ارائه معماری مرجع امنیتی محیط رایانش ابر خصوصی سازمان. فصلنامه امنیت‌پژوهی، 13(47)، 91-112.
ولوی، محمدرضا و موحدی‌صفت، محمدرضا (1395). ارائه الگوی امن استقرار زیرساخت‌های دفاعی کشور در محیط رایانش ابری. فصلنامه مطالعات بین‌رشته‌ای راهبردی، 7(22)، 29-44.
Cloud Security Alliance (2013). Cloud Security Alliance, Warns Providers of ‘The Notorious Nine’ Cloud Computing Top Threats in 2013, available at: https://cloudsecurityalliance.org/media/news/ca-warns-providers-of-the-notoriousnine-cloud-computing-top-threats-in-2013.
Gellman, R. (2009). Privacy in the clouds: Risks to privacyand confidentiality from cloud computing, The World Privacy Forum. http://www.worldprivacyforum.org/pdf/WPF_Cloud_P rivacy_Report.pdf.
Kumar, N. (2015). Cryptography during Data Sharing and Accessing Over Cloud. International Transaction of Electrical and Computer Engineers System, 3(1), 12-18.
Kuyoro, S. O., Ibikunle, F., & Awodele, O. (2011). Cloud computing security issues and challenges. International Journal of Computer Networks, 3, 247-255.
Luo, S., Lin, Z., Chen, X., Yang, Z., & Chen, J. (2011). Virtualization security for cloud computing services. In Cloud and Service Computing (CSC), 2011 International Conference on (pp. 174-179). IEEE.
Mather, T., Kumaraswamy, S., & Latif, S. (2009). Cloud Security and Privacy: An Enterprise Edition on Risks and Compliance (Theory in Practice), O’Reilly Media.
Mazhar, A., Samee, U., Athanasios, V., & Vasilakos, M. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357-383.
Mell, P., & Grance, T. (2011) The NIST Definition of Cloud Computing, Recommendation of NIST, Special Publication 800-145. http://csrc.nist.gov/publications/nistpubs/800-145/SP800- 145.pdf
National Institute of Standards and Technology (2013). NIST Cloud Computing Security Reference Architecture (draft), NIST Special Publication 500-299.
Odell, L. A., Wagner, R., & Weir, T. J. (2015). Department of Defense Use of Commercial Cloud Computing Capabilities and Services, Institute for Defense Analyses (IDA).
Paul, M. (2013). NASA’S Progress in Adopting Cloud Computing Technologies. Office of Inspector General.
Sosinsky, B. (2010). Cloud computing bible. John Wiley & Sons.
Takai, M. (2012). DoD Cloud Computing Strategy. Department of Defense Chief Information Officer.
Wilson, J. R. (2013). The challenge of a secure military cloud. military and aerospace. http://www.militaryaerospace.com/articles/print/volume-24/issue-11/technology-focus/the-challenge-of-a-secure-military-cloud.html
Youssef, A., & Alageel, M. (2012). A Framework for A Framework for Secure Cloud ure Cloud ure Cloud Computing Computing Computing, IJCSI International Journal of Computer Science Issues, 9(4), 487-500.