IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v13y2021i24p13827-d702349.html
   My bibliography  Save this article

C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment

Author

Listed:
  • Seungjin Baek

    (Department of Computer and Information Security and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea)

  • Young-Gab Kim

    (Department of Computer and Information Security and Convergence Engineering for Intelligent Drone, Sejong University, Seoul 05006, Korea)

Abstract

Although the defense field is also one of the key areas that use big data for security reasons, there is a lack of study that designs system frameworks and presents security requirements to implement big data in defense. However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield. As such, this research was conducted to apply big data in the defense domain, which is a unique field. In particular, a three-layered system framework was designed to apply big data in the C4I system, which collects, manages, and analyzes data generated from the battlefield, and the security measures required for each layer were developed. First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V’s, and the five-phase big data lifecycle were described. While presenting a framework that divides the C4I system into three layers, the roles and components of each layer are described in detail, considering the big data lifecycle and system framework. A security architecture is finally proposed by specifying security requirements for each field in the three-layered C4I system. The proposed system framework and security architecture more accurately explain the unique nature of the military domain than those studied in healthcare, smart grids, and smart cities; development directions requiring further research are described.

Suggested Citation

  • Seungjin Baek & Young-Gab Kim, 2021. "C4I System Security Architecture: A Perspective on Big Data Lifecycle in a Military Environment," Sustainability, MDPI, vol. 13(24), pages 1-19, December.
  • Handle: RePEc:gam:jsusta:v:13:y:2021:i:24:p:13827-:d:702349
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/13/24/13827/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/13/24/13827/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Jahoon Koo & Giluk Kang & Young-Gab Kim, 2020. "Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges," Sustainability, MDPI, vol. 12(24), pages 1-32, December.
    2. Xiao Song & Yulin Wu & Yaofei Ma & Yong Cui & Guanghong Gong, 2015. "Military Simulation Big Data: Background, State of the Art, and Challenges," Mathematical Problems in Engineering, Hindawi, vol. 2015, pages 1-20, November.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Fatima Rafiq & Mazhar Javed Awan & Awais Yasin & Haitham Nobanee & Azlan Mohd Zain & Saeed Ali Bahaj, 2022. "Privacy Prevention of Big Data Applications: A Systematic Literature Review," SAGE Open, , vol. 12(2), pages 21582440221, May.
    2. Ebrahim A. A. Ghaleb & P. D. D. Dominic & Suliman Mohamed Fati & Amgad Muneer & Rao Faizan Ali, 2021. "The Assessment of Big Data Adoption Readiness with a Technology–Organization–Environment Framework: A Perspective towards Healthcare Employees," Sustainability, MDPI, vol. 13(15), pages 1-33, July.
    3. Mazhar Javed Awan & Umar Farooq & Hafiz Muhammad Aqeel Babar & Awais Yasin & Haitham Nobanee & Muzammil Hussain & Owais Hakeem & Azlan Mohd Zain, 2021. "Real-Time DDoS Attack Detection System Using Big Data Approach," Sustainability, MDPI, vol. 13(19), pages 1-19, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:13:y:2021:i:24:p:13827-:d:702349. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.