Manufacturing Paradigm Shift Towards Better Cloud Computing in the Military Environment: A New Model for Collaboration in the Operational Information Exchange Networks

  • Michele TutinoEmail author
  • Jörn Mehnen
Part of the Springer Series in Advanced Manufacturing book series (SSAM)


Today’s budgets are tighter than those at any time in recent history. However, despite severe budget constraints, military demands for highly dynamic federated mission are still increasing especially toward Information Technology (IT). This introduces new challenges for organizations. They are moving from a device-centric view of IT toward a view that is application, people, and information centric. Military organizations are not excluded from this new process which is the fundament of a new theory called Network Enabled Capability (NEC). In addition, the requirements of timeliness, accuracy, ubiquity, assurance and security, rapid exchange of information in the battlefield across all pieces and organizations are the leverage to accomplish the military mission and fundamental for the command and control process also defined with the Observe, Orient, Decide, Act cycle ( OODA). Cloud Computing aligns, on one hand, with this new world view and challenges, as the existing infrastructures can be used more efficiently and expanded quicker and leverage the implementation of NEC in the military operations where concepts like information assurance, information sharing, flexibility and scalability are getting more and more important. On the other hand it raises new threats and issues such as the erosion of trust boundaries, ubiquitous connectivity, the amorphous nature of information interchange, the ineffectiveness of traditional static security controls, and the dynamic nature of Cloud services. All this requires new thinking and a new knowledge management approach. However, the new service models, operational models and new technology employed to enable the implementation of Cloud Computing may present different risks and additional requirements to the organization. Especially military specific requirements and priorities need to be considered when moving towards tactical Collaborative Cloud. The information exchange requirements in the military operation/mission are growing and getting more complex. In addition security mechanisms and processes often hamper the mission to keep pace with the environmental conditions. Methods such as Reach Back or Home Base clarify that also the military perimeter has changed and modern Command, Control and Information System (CCIS) are best practice for Cloud Computing. This chapter will describe the landscape of Cloud Computing and will focus the view on the possibility of implementing this new concept in the military world. The strengths and the weakness that the implementation of Cloud Computing can introduce in the military operations will be highlighted. In addition, an analysis on what Cloud Computing introduces in the NEC is presented as a starting point for future and more specific studies.


Cloud Computing Cloud Service Cloud Infrastructure Military Operation Private Cloud 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This research was carried out as a part of the CASES project which is supported by a Marie Curie International Research Staff Exchange Scheme Fellowship within the 7th European Community Framework Programme under the grant agreement No 294931. The chapter reflects only the authors’ views and the Union is not liable for any use that may be made of the information contained therein.


  1. 1.
    Cloud Security Alliance (CSA) (2009) Security guidance for critical areas of focus in cloud computing v2.1. Study document Dec 2009. (last access 26 Aug 2011)
  2. 2.
    European Defence Agency—Euronec Consortium (2009) EU NEC vision report, PT NEC, European defence agency report prepared by Euronec ConsortiumGoogle Scholar
  3. 3.
    European Defence Agency (EDA) (2009) End-to-end security management in a hetrogeneous environment, EDA 08-CAP-027Google Scholar
  4. 4.
    U.S. National Security Agency (NSA) (2009) Enterprise security management: a context overview, document number, US National Security AgencyGoogle Scholar
  5. 5.
    CESG (2009) Study on security management infrastructure, UK national technical authority for information assuranceGoogle Scholar
  6. 6.
    Kretzshmar M, Eyermann F (2009) A multi-layer architecture for a security management infrastructure, MilCIS 2009 conference chapter, European Defence Agency, BruxellesGoogle Scholar
  7. 7.
    European Defence Agency (EDA) (2010) Collaboration in the cloud and challenges to cyber defence (EDA documentation for government use only). Draft version 5, CIS, EDAGoogle Scholar
  8. 8.
    Trimble S (2011) Cloud computing takes next step in Afghanistan. Flight Int J, Reed Business Information Ltd. 17 May 2011Google Scholar
  9. 9.
    Daly JJ (2009) Simulation-based command and control applications in a service-oriented, cloud computing environment. In: Hamilton BA (ed) Study document, ArlingtonGoogle Scholar
  10. 10.
    Armbrust M et al (2009) Above the clouds: a Berkeley view of cloud computing, University of California, Berkeley, 10 Feb 2009Google Scholar
  11. 11.
    Vaquero L, Rodero-Merino L, Caceres J, Lindner M (2009) A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput Commun Rev 39(1):50–55Google Scholar
  12. 12.
    Böhm M, Leimeister S, Riedl C, Krcmar H (2010) Cloud computing and computing evolution. Technische Universität München (TUM), GermanyGoogle Scholar
  13. 13.
    Mell P, Grance T (2009) Effectively and securely using the cloud computing paradigm, 15, NIST, 17 July 2009. (Accessed May 2010)
  14. 14.
    ISACA (2009) Cloud computing: business and benefits with security, governance and assurance perspective. ISACA J, an ISACA Emerging Technology White ChapterGoogle Scholar
  15. 15.
    Rhoton J (2010) Cloud computing explained: implementation handbook for enterprises, Recursive Limited, ISBN-10: 0-9563556-0-9Google Scholar
  16. 16.
    Fox W, Jameson H, Keggler J (2010) Commanding information superiority, compendium by armada international, C4ISR (Reassessing the battlespace), October/NovemberGoogle Scholar
  17. 17.
    Valpolini P, Biass EH, Keggler J (2010) A new breed compendium by armada international, new soldier equipment (the right stuff), October/NovemberGoogle Scholar
  18. 18.
    Nelson M (2009) Cloud computing and public policy, briefing chapter for the ICCP technology foresight forum, JT03270509, DATI/ICPGoogle Scholar
  19. 19.
    Kretzschmar M (2010) Secure collaboration in the military cloud, presentation to EDA PT CIS meeting, european defence agency, BruxellesGoogle Scholar
  20. 20.
    Wlodarczyk TW, Rong C, Haalend Thorsen KA (2009) Industrial cloud: toward inter-enterprise integration. Comput Sci J 5931:460–471Google Scholar
  21. 21.
    Alberts DS, Hayes RE (2003) Power to the edge: command and control in the information age, CCRP publication series. ISBN 1-893723-13-5. (last access 24 Aug 2011)
  22. 22.
    Cebrowsky AK, Garstka JJ (1998) Network-centric warfare: its origin and future. Naval Institute, U.SGoogle Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.LTC ITAFCIS2EuroairgroupItaly
  2. 2.Manufacturing DepartmentCranfield UniversityCranfieldUK

Personalised recommendations