Integrated information life-cycle, data management and secret key lifecycle management for military applications

  • Authors:
  • Nikolaos Doukas;Konstantinos Ntaikos;Ntaikos Bardis

  • Affiliations:
  • University of Military Education, Hellenic Army Academy, Department of Computer Sciences, Vari and University of Military Education, Hellenic Air Force Academy, Department of Computer Sciences, De ...;University of Military Education, Hellenic Air Force Academy, Department of Computer Sciences, Dekelia Air Base, Tatoi, Greece;University of Military Education, Hellenic Army Academy, Vari and University of Military Education, Hellenic Naval Academy, Piraeus and University of Military Education, Hellenic Air Force Academy ...

  • Venue:
  • MAMECTIS'08 Proceedings of the 10th WSEAS international conference on Mathematical methods, computational techniques and intelligent systems
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

One of the major problems that security aware organizations, such as the military, are concerned with when introducing innovative computational systems inside their operations is the fact that such systems will be allowing the sharing of critical information between multiple users that are connected on different terminals and are possibly located in different sites. All these features represent possible compromises in information security and hence demand the use of advanced encryption algorithms. In the case of such large scale systems, the concept of information lifecycle management has been proposed to help rationalise disk usage for distributed data storage and backup. In this paper the need for a standard to offer services for information security by encryption in such systems is explained. Such schemes exist for the case of asymmetric encryption but not for the case of symmetric key encryption. The requirements from a key management scheme are outlined. An extension of the concept of lifecycle management is proposed for this purpose. The secret key management scheme is shown to be suitable for providing an integrated information protection solution for military and critical civil systems.