Identifying and prioritizing strategic issues of cloud services in defense organizations with a global approach

Document Type : Original Article

Authors

1 Department of Information Technology Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran

2 Associate Professor, Head of Cyber ​​Department, Faculty of National Defense University, Tehran, Iran

3 Associate Professor, Department of Business Management, Central Tehran Branch, Islamic Azad University, Tehran, Iran.

4 Assistant Professor, Supreme National Defense University, Tehran, Iran

Abstract

Cloud services, as an emerging and transformative technology, have the potential to revolutionize the entire defense service sector. The defense organizations of the Islamic Republic of Iran are no exception to this transformation. This technology brings both opportunities and threats, requiring appropriate understanding and actions. This research focuses on identifying and prioritizing the strategic issues of cloud services in defense organizations with a global approach. Issues such as information security, identity management, infrastructure, and standardization are among the key challenges. The goal of the research is to create coordination and convergence among the actors in this field at the defense and national levels. The research method is a mixed approach (quantitative and qualitative) with a descriptive-analytical framework. The results show that the development of cloud services in defense organizations requires cultural change, security measures, and the establishment of appropriate laws. Recommendations for the development of these services with a global approach are provided.

Keywords


  • منابع

    الف- فارسی

    • اشتهاردی شاه‌بیک، محمدامین (1393). سند تحلیل روند و نقشه مفهومی فناوری‌های پایگاه‌داده و رایانش ابری، پروژه نخبگان، تهران: دانشگاه صنعتی مالک اشتر.
    • آقایی، محمد (1401). «آشنایی با معماری رایانش ابری و معمار ابری»، سایت سپیدار سیستم.
    • رحمتی لارهنگ، مهدی؛ مهدی‌نژاد نوری، محمد؛ طالبی، مرتضی؛ و اسکندری، حسین (1401). «ارائه الگوی دفاع هوشمند سایبری از زیرساخت‌های حیاتی جمهوری اسلامی ایران»، فصلنامه مطالعات راهبردی فضای سایبر، 2(3)، 89-12.
    • عبدی، فریدون (1390). «سامانة فرماندهی و کنتـرل C4Iو بررسـی نقـش رایانه‌ها در آن»، فصـلنامه مدیریت نظامی، 11(42)، 70-43.
    • عبدی‌پور، سانیا (1402). «آشنایی با معماری رایانش ابری و معمار ابری»، سایت سپیدار سیستم.
    • غضنفرپور، مجید؛ موسوی، سید مجید (1400). «معماری به‌کارگیری رایانش ابری در سازمان‌ها»، همایش تخصصی مهندسی دفاعی با عنوان «تهدیدات سایبرالکترونیک».
    • مهدی‌نژاد نوری، محمدرضا؛ سعادتی، مجتبی؛ خسروجردی، علی؛ فخری، مجید (1396). «طراحی الگوی سازمان‌های دفاعی دانش‌بنیان»، فصلنامه علمی-‌پژوهشی مطالعات دفاعی راهبردی، 15(68)، 92-71.
    • ولوی، محمدرضا؛ موحدی‌ صفت، محمدرضا (1395). «ارائه یک مدل معماری بومی رایانش ابری در بخش دفاعی»، فصلنامه امنیت ملی، 6(19)، 169-147.
    • ولوی، محمدرضا؛ موحدی صفت، محمدرضا (1397). «ارائه یک چارچوب معماری امن برای شبکه دفاعی کشور»، فصلنامه علمی‌-پژوهشی مطالعات دفاعی استراتژیک، 16(73)، 46-27.
    • ولوی، محمدرضا؛ موحدی صفت، محمدرضا؛ باقری کوشالشاه، ایمان (1396). «ارائه الگوی راهبردی مهاجرت سازمان‌های دفاعی به محیط رایانش ابری»، فصلنامه مدیریت نظامی، 17(65)، 106-130.

    ب- انگلیسی

    • Alavizadeh, H., Aref, S., Kim, D. S., & Jang-Jaccard, J. (2022). Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Transactions on Emerging Topics in Computing10(4), pp. 1772-1788.
    • AlDaajeh, S.; Alrabaee, S. (2024). Strategic cybersecurity. Computers & Security, 141, 103845.
    • Alkhafaji, A.; & Nelson, R. A. (2013). Strategic management: formulation, implementation, and control in a dynamic environment, Routledge.
    • Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., & Ayaz, M. (2021). A systematic literature review on cloud computing security: threats and mitigation strategies, Ieee Access9, pp. 57792-57807.
    • Ardagna, D. (2015). Cloud and multi-cloud computing: current challenges and future applications, In 2015 IEEE/ACM 7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems(pp. 1-2). IEEE.
    • Balashova, S. A., & Musin, T. I. (2022). Cloud computing: global trends and challenges for Russia in the time of sanctions. R-Economy. 2022. Vol. 8. Iss. 38(3), pp. 268-280.
    • Chan, K., Singh, S., Ramaya, R., & Lim, K. H. (2005). Spirit & System: Leadership Development for a Third Generation SAF [4th Pointer Monograph].
    • Chinchole, A. (2022). Why is cloud security important?, Cloudlytics. Available at: https://cloudlytics.com/why-is-cloud-security-important.
    • Cloud Security Alliance (2021). CSA enterprise architecture reference guide, Cloud Security Alliance, Available at: https://cloudsecurityalliance.org/artifacts/enterprise-architecture-reference-guide-v2
    • Consensus Editorial (2022). Cloud security definition. Consensus, Available at: https://www.consensus.com/cloud/security/
    • David, F. R. (2011). Strategic management concepts and cases, Prentice hall.
    • Department of Defense (2021). Department of Defense outside the Continental United States (OCONUS) cloud strategy, Office of the DOD Chief Information Officer.
    • D'Silva, F. (2023). How to improve cloud security: 9 expert strategies. Ntiva, Available at https://www.ntiva.com/blog/9-tips-for-improving-cloud-computing-security.
    • El Kafhali, S., El Mir, I., & Hanini, M. (2022). Security threats, defense mechanisms, challenges, and future directions in cloud computing. Archives of Computational Methods in Engineering, 29(1), pp.223-246.
    • Gompert, D. C., Lachow, I., Perkins, J., Smith, R. C., & Wells, L. (2006). Battle-Wise: Seeking Time-Information Superiority in Networked Warfare, Center for Technology and National Security Policy.
    • Guffey, J.; Li, Y. (2023). Cloud Service Misconfigurations: Emerging Threats, Enterprise Data Breaches and Solutions. In 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0806-0812). IEEE.
    • Gupta, Y; Vashisth, R. (2023). Cyber Threats in Cloud Computing Environment. In 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 548-555). IEEE.
    • Jasti, A., Shah, P., Nagaraj, R., & Pendse, R. (2010). Security in multi-tenancy cloud, In 44th Annual 2010 IEEE International Carnahan Conference on Security Technology (pp. 35-41). IEEE.
    • McKinsey & Company (2022). Cloud in China: The outlook for 2025. McKinsey, Available at https://www.mckinsey.com/ capabilities /mckinsey-digital/our-insights/cloud-in-china-the-outlook-for-2025
    • Microsoft Azure (2021). What is cloud computing? A beginner’s guide, Microsoft, Available at: https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/#benefits.
    • Pacheco, M (2023). Private cloud architecture: A complete overview. TierPoint, Available at: https://www.tierpoint.com/blog/ private-cloud-architecture/
    • Reddy, J. M.; Monika, J. M. (2012). Integrate military with distributed cloud computing and secure virtualization. In 2012 SC Companion: High Performance Computing, Networking Storage and Analysis (pp. 1200-1206). IEEE.
    • Rishika, S. (2024). Cloud storage of military data: Risks and opportunities in active war zones,
    • Sangfor Technologies. (2023). What is Security as a Service (SECaaS)? Sangfor, Available at: https://www.sangfor.com/ glossary/ cybersecurity/ what-is-security-service-secaas
    • Правительство Российской Федерации. (2023). Правительство утвердило Стратегию развития отрасли связи до 2035 года. Government.ru, Available at http://government.ru/news/50304/.