Challenges and security requirements of using big data technology in the development of new generation command and control networks

Document Type : Review Article

Authors

1 Ph.D. student of strategic cyberspace management (cyber defense orientation), National Defense University, Tehran, Iran.

2 Assistant Professor of Information Technology Engineering, Higher National Defense University, Tehran, Iran.

3 Assistant Professor of Khatam Al Anbia University of Air Defense, Tehran, Iran.

4 Assistant Professor, Sattari Aviation University, Tehran, Iran.

Abstract

Big data technology allows for real-time decision-making, low processing time and cost, high analysis speed, improving the effectiveness of command and decision-making, the possibility of simulating the battle scene, integrated management and intelligence of the new generation command and control system, and is necessary for gaining military superiority in future wars. This research is qualitative, which is practical in terms of purpose, and library method has been used to collect information, which by examining the role of the emerging big data technology in the development of new generation command and control networks, it has come to the conclusion that the development of big data, challenges and serious security requirements brings This technology collects data generated from the battlefield (data generation layer), analyzes and analyzes (data processing layer) and manages it (data exploitation layer). and performs the required security measures for each layer. In this research, first, to increase the general understanding of big data and the military environment, an overview of the new generation C2 system, the characteristics of big data model (6V) and the life cycle of big data, the five-phase model, and while presenting a framework that divides the C2 system into three layers, the roles And the components of each layer are described in detail by considering the life cycle of big data and the system framework, and finally a security architecture is proposed by specifying the security requirements for each layer.

Keywords


 [1] مهدی نژاد نوری، محمد و علی جبار رشیدی، مجید فخری ومهدی علی نژاد، (زمستان1396)، " بررسی نقش فرماندهی وکنترل هوشمند در دفاع دانش بنیان فصلنامه مطالعات دفاعی استراتژیک، سال پانزدهم، شماره 70، صص 4 – 91.
[5] خداداد هلیلی، جلیل مظلوم، بهرنگ هادیان " بررسی کاربردهای نظامی فناوری کلان داده و نقش آن در مدیریت صحنه نبرد" فصل نامه علوم و فنون نظامی، سال یازدهم، شمارۀ 33، پاییز 1394، صص 47- 62.
[6] حافظ محمدی، محمد رضا موحدی صفت، " جایگاه فناوری کلان داده‌ها درارتقاء سامانه فرماندهی و کنترل سایبری در جمهوری اسلامی ایرا ن"، دوازدهمین کنفرانس ملی فرماندهی و کنترل ایران، بهمن ماه1399.
[2] Philippe Gros, Senior Research Fellow, Foundation for Strategic Research, October 2, (2019). “The “tactical cloud”, a key element of the future combat air system”, www. frstrategie. org/home /Notes de la FRS/ (Apr. 16, 2020(.
[3] DEREK GROSSMAN, CHRISTIAN CURRIDEN,” Chinese Views of Big Data Analytics” Published by the RAND Corporation, Santa Monica, Calif, www. rand. org/t/RRA176-1, Copyright 2020 RAND Corporation.
[4] Alena Epifanova"is program officer at the Robert Bosch Center forCentral and Eastern Europe, Russia, and Central Asia",”Deciphering Russia’s “Sovereign Internet Law”,2020, Auswärtige Politik e. V, ISSN 1611-7034.
[7] Fazal-e-Amin, Abdullah S. Alghamdi, Iftikhar Ahmad, Tazar Hussain"Big Data for C4I Systems: Goals, Applications,Challenges and Tools",”Deciphering Russia’s “, Fifth international conference on Innovative Computing Technology (INTECH 2015).
[8] Doug Laney. , (2001). "3D Data Management: Volume, Velocity and Variety", Application Delivery Strategies (Meta Group)p2.
[9] Jiarui Zhang,a, Gang Wang and Siyuan Wang"Command and Control System Construction in Big Data Era",”Journal of Physics: Conf. Series 1168 (2019) 032022-doi: 10. 1088/1742-6596/1168/3/032022.
[10] Seungjin Baek and Young-Gab Kim"C4I System Security Architecture: A Perspective on Big Data.
Lifecycle in a Military Environment", Sustainability2021, 13, 13827. http: //doi. org/10. 3390/su132413827.
[11] De Mauro, A. ; Greco, M. ; Grimaldi, M. A formal definition of Big Data based on its essential features. Libr. Rev. 2016, 65, 122–135.
[12] Chang, W. L.  Grady, N. NIST big data interoperability framework: Volume 2 Big Data Taxonomy. NIST Spec. Publ. 2017, 1500, 10.
[13] Patgiri, R. A Taxonomy on Big Data: Survey. ARXIV 2018, arXiv: 1808. 08474.
[14] Koo, J. ; Kang, G. ; Kim, Y. -G. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability 2020, 12,10571.
[15] Kune, R. ; Konugurthi, P. K. ; Agarwal, A. ; Chillarige, R. R. ; Buyya, R. The anatomy of big data computing. Softw. Pract. Exp. 2016,46, 79–105. [CrossRef]
[16] Shvachko, K. ; Kuang, H. ; Radia, S. ; Chansler, R. The Hadoop Distributed File System. In Proceedings of the IEEE 26th Symposium.
[17] Dean, J. ; Ghemawat, S. MapReduce: Simplified data processing on large cluster. Commun. ACM 2008, 51, 107–113. [CrossRef]
[18] Husamaldin, L. ; Saeed, N. Big Data Analytics Correlation Taxonomy. Information 2010, 11, 17. [CrossRef]
[19] Koo, J. ; Kang, G. ; Kim, Y. -G. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability 2020, 12,10571. [CrossRef]
[20] Damiani, E. ; Ardagna, C. A. ; Zavatarelli, F. ; Rekleitis, E. ; Marinos, L. Big Data Threat Landscape and Good Practice Guide; European Union Agency for Network and Information Security (ENISA): Athens, Greece, 2016.
[21] Big Data Working Group. Expanded Top Ten Big Data Security and Privacy Challenges. Cloud Security Alliance. 2013. Availableonline: https: //downloads. cloudsecurityalliance. org/ initiatives/bdwg/Expanded_Top_Ten_Big_Data_Security_and_Privacy_Challenges. PDF(accessed on 25 August 2021).
[22] Greene, T. ; Shmueli, G. ; Ray, S. ; Fell, J. Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers. BigData 2019, 7, 140–162. [CrossRef]
[23]Khan, R. A; Alka, K. An Improved Security Threat Model for Big Data Life Cycle. Asian J. Comput. Sci. Technol. 2018, 7, 33–39. [CrossRef]
[24] Rajan, S. (Ed.) Top 10 Big Data Security and Privacy Challenges; Cloud Security Alliance: Seattle, WA, USA, 2012;
[25] Yang, K; Lee, D; Kim, K; Yoon, H. Analysis of Security Threat and Security Requirements of the Bigdata System. J. Secur. Eng. 2016, 13, 501–514. [CrossRef]
[26] Abouelmehdi, K; Beni-Hssane, A; Khaloufi, H; Saadi, M. Big data security and privacy in healthcare: A Review. Procedia Comput. Sci. 2017, 113, 73–80. [CrossRef]
[27] Hossain, E. ; Khan, I. ; Un-Noor, F. ; Sikander, S. S. ; Sunny, S. H. Application of Big Data and Machine in Smart Grid, and Associated Security Concerns: A Review. IEEE Access 2019, 7, 13960–13988. [CrossRef]
[28]Mavroeidakos, T; Chaldeakis, V. Threat landscape of next generation IoT-enabled smart grids. In IFIP International Conference onArtificial Intelligence Applications and Innovations; Springer: Cham, Switzerland, 2020.
[29] Puthal, D; Ranjan, R; Chen, J. Big Data Stream Security Classification for IoT Applications. In Encyclopedia of Big Data Technologies; Springer: Cham, Switzerland, 2018. [CrossRef]
[30] Koo, J; Kim, Y. –G: Lee, S. H. Design of Security Architecture for the Cloud-Based Korea Military Command and Control System. J. Korean Inst. Commun. Inf. Sci. 2020, 45, 400–408. [CrossRef]
[31]Koo, J. ; Oh, S. -R. ; Lee, S. H. ; Kim, Y. -G. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Appl. Sci. 2020, 10, 1035. [CrossRef]
[31] FedRAMP Security Controls Baseline. Available online: https: //www. fedramp. gov/documents/ (accessed on 11August 2021).
[32] FedRAMP Security Controls Baseline. Available online: https: //www. fedramp. gov/documents/ (accessed on 11August 2021).
[33] Cloud Computing Security Requirements Guide. Available online: https: //public. cyber. mil/dccs/dccsdocuments/ (accessed on11 August 2021).
[34]SecurityCertificationGuideforCloudService. Availableonline: https: //www. kisa. or. kr/public/laws/laws3_View. jsp?cPage=1&mode=view&p_No=259&b_No=259&d_No=91&ST=&SV= (accessed on 11 August 2021).
[35]SecurityRequirementsforServerVirtualizationSystem. Availableonline: http: //www. tta. or. kr/data/ttas_view. jsp?rn=1&pk_num=TTAK. KO-10. 0708 (accessed on 11 August 2021).
[36] Security Guidelines of National and Public Institution for Cloud Computing; National Intelligence Service: Seoul, Korea, 2016; pp. 101–103.
[37] Cloudera Inc. Cloudera Security Overview. August 2020. Available online: https: //docs. cloudera. com/cdp private-cloud-base/7. 1. 3/security-overview/cm-security-overview. pdf (accessed on 15 August 2021).
[38] Perwej, Y. The Hadoop Security in Big Data A Technological Viewpoint and Analysis. Int. J. Sci. Res. Comput. Sci. Eng. IJSRCSE2019, 7, 1–14.
[39] Shrihari, M. R. ; Manjunath, T. N. ; Archana, R. A. ; Hegadi, R. S. Research Challenges in Big Data Security with Hadoop Platform. In International Conference on Recent Trends in Image Processing and Pattern Recognition;Springer: Singapore, 2019; Volume 1037. [CrossRef]
[40] Martis, M. ; Pai, N. V. ; Pragathi, R. S. ; Rakshatha, S. ; Dixit, S. Comprehensive Survey on Hadoop Security. Emerg. Res. Comput. Inf. Commun. Appl. 2019, 227–236. [CrossRef].
[41] Peterson, G. Security Architecture Blueprint; Arctec Group, LLC.: Graz, Austria, 2007.
[42] Koo, J. ; Kim, Y. -G. ; Lee, S. H. Design of Security Architecture for the Cloud-Based Korea Military Command and Control System. J. Korean Inst. Commun. Inf. Sci. 2020, 45, 400–408. [CrossRef]
[43]. Koo, J. ; Oh, S. -R. ; Lee, S. H. ; Kim, Y. -G. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Appl. Sci. 2020, 10, 1035. [CrossRef]
 [44]. Shrihari, M. R. ; Manjunath, T. N. ; Archana, R. A. ; Hegadi, R. S. Research Challenges in Big Data Security with Hadoop Platform.
[45].  Perwej, Y. The Hadoop Security in Big Data A Technological Viewpoint and Analysis. Int. J. Sci. Res. Comput. Sci. Eng. IJSRCSE2019, 7, 1–14.
[46]. In International Conference on Recent Trends in Image Processing and Pattern Recognition; Springer: Singapore, 2019; Volume 1037. [CrossRef]
[47]. Martis, M. ; Pai, N. V. ; Pragathi, R. S. ; Rakshatha, S. ; Dixit, S. Comprehensive Survey on Hadoop Security. Emerg. Res. Comput. Inf. Commun. Appl. 2019, 227–236. [CrossRef]