Skip to main content

CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9604))

Abstract

In this demo paper we describe CallForFire, a GIS-based mission-critical defense application that can be deployed in the cloud. CallForFire enables secure computation of enemy target locations and selection of firing assets. It is built using the Nomad framework, which enables the development of secure cloud-based applications. Our experimental results validate the feasibility of this application within the Nomad framework.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. GCN: Like it or not, cloud computing is here to stay (2011). http://gcn.com/microsites/2011/cloud-computing-download/cloud-computing-application-development.aspx

  2. Alliance, C.S.: The notorious nine: cloud computing top threats in 2013. In: Top Threats Working Group (2013)

    Google Scholar 

  3. Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. Cryptology ePrint Archive, Report 2011/277 (2011)

    Google Scholar 

  4. Diallo, M.H., August, M., Hallman, R., Kline, M., Au, H., Beach, V.: Nomad: a framework for developing mission-critical cloud-based applications. In: 10th International Conference on Availability, Reliability and Security, ARES, Toulouse, France, 24–27 August 2015

    Google Scholar 

  5. Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009. ACM (2009)

    Google Scholar 

  6. Halevi, S., Shoup, V.: Design and implementation of a homomorphic-encryption library (2013)

    Google Scholar 

  7. Headquarters, Department of the Army: Tactics, Techniques, and Procedures for Observed Fire, Field Manual 6-30 (1991)

    Google Scholar 

  8. Headquarters Department of the Army Washington, D.C: FM 3–25.26 Map Reading and Land Navigation (2001)

    Google Scholar 

  9. Parmar, P.V., Padhar, S.B., Patel, S.N., Bhatt, N.I., Jhaveri, R.H.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26–32 (2014). Published by Foundation of Computer Science, New York, USA, April 2014

    Google Scholar 

  10. Porticor: Securing data in the cloud (2013). https://www.porticor.com/homomorphic-encryption/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mamadou H. Diallo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 International Financial Cryptography Association

About this paper

Cite this paper

Diallo, M.H., August, M., Hallman, R., Kline, M., Au, H., Beach, V. (2016). CallForFire: A Mission-Critical Cloud-Based Application Built Using the Nomad Framework. In: Clark, J., Meiklejohn, S., Ryan, P., Wallach, D., Brenner, M., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9604. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53357-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53357-4_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53356-7

  • Online ISBN: 978-3-662-53357-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics