Abstract
Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.
References
Armbrust, M., A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2010) “A View of Cloud Computing: Clearing the Clouds Away From the True Potential and Obstacles Posed by This Computing Capability,” Communications of the ACM, 53(4):50–58.10.1145/1721654.1721672Suche in Google Scholar
Denning, D. E. and P. F. MacDoran (1996) “Location-Based Authentication: Grounding Cyberspace for Better Security,” Computer Fraud & Security, 1996(2):12–16.10.1016/S1361-3723(97)82613-9Suche in Google Scholar
Gao, L., Q. Liu and P. Lou (2013) “Trust Evaluation in Cloud Manufacturing Environment.” In: The 19th International Conference on Industrial Engineering and Engineering Management. Springer Berlin Heidelberg, pp. 1173–1180.10.1007/978-3-642-38442-4_123Suche in Google Scholar
Hashizume, K., D. G. Rosado, E. Fernández-Medina and E. B. Fernandez (2013) “An Analysis of Security Issues for Cloud Computing,” Journal of Internet Services and Applications, 4(1):1–13.10.1186/1869-0238-4-5Suche in Google Scholar
He, W. and L. Xu (2014) “A State-Of-The-Art Survey of Cloud Manufacturing,” International Journal of Computer Integrated Manufacturing, DOI:10.1080/0951192X.2013.874595.Retrieved on Oct. 25, 2014 from http://www.tandfonline.com/doi/abs/10.1080/ 0951192X.2013.874595.Suche in Google Scholar
He, W., L. Xu and G. Yan (2014) “Developing Vehicular Data Cloud Services in the Iot Environment,” IEEE Transactions on Industrial Informatics, 99:1–8.Suche in Google Scholar
Huang, B., C. Li, C. Yin and X. Zhao (2013) “Cloud Manufacturing Service Platform for Small-and Medium-Sized Enterprises,” The International Journal of Advanced Manufacturing Technology, 65(9–12):1261–1272.10.1007/s00170-012-4255-4Suche in Google Scholar
Huynh, S. X. and D. A. Quan (2008). “Cloud Computing in Manufacturing Environment.” In: AIChE Spring National Meeting, New Orleans, LA, USA, April 6th–10th, 2008.Suche in Google Scholar
Li, L. (2013) “Technology Designed to Combat Fakes in the Global Supply Chain,” Business Horizons, 56:167–177.10.1016/j.bushor.2012.11.010Suche in Google Scholar
Li, B.-H., L. Zhang and X. Chai (2010) “Introduction to Cloud Manufacturing,” ZTE Communications Technology, 6:5–8.Suche in Google Scholar
Ning, F., W. Zhou, F. Zhang, Q. Yin and X. Ni (2011) “The Architecture of Cloud Maufacturing and its Key Technologies Research.” Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 259–263.Suche in Google Scholar
Ns-2 (2014) The Network Simulator NS-2. Available at: http://www.isi.edu/nsnam/ns/.Suche in Google Scholar
Rimal, B. P., A. Jukan, D. Katsaros and Y. Goeleven (2011). “Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach,” Journal of Grid Computing, 9(1):3–26.10.1007/s10723-010-9171-ySuche in Google Scholar
Scott, L. and D. E. Denning (2003) “A Location Based Encryption Technique and Some of its Applications,” In ION National Technical Meeting, Vol. 2003, pp. 730–740.Suche in Google Scholar
Tan, W., S. Chen, J. Li, L. Li, T. Wang and X. Hu (2014) “A Trust Evaluation Model for E-Learning Systems,” Systems Research and Behavioral Science, 31(3):353–365.10.1002/sres.2283Suche in Google Scholar
Tao, F., Y. F. Hu and Z. D. Zhou (2009) “Application and Modeling of Resource Service Trust-QoS Evaluation in Manufacturing Grid System,” International Journal of Production Research, 47(6):1521–1550.10.1080/00207540701551927Suche in Google Scholar
Tao, F., L. Zhang and A. Y. C. Nee (2011a) “A Review of the Application of Grid Technology in Manufacturing,” International Journal of Production Research, 49(13):4119–4155.10.1080/00207541003801234Suche in Google Scholar
Tao, F., L. Zhang, V. C. Venkatesh, Y. L. Luo and Y. Cheng (2011b) “Cloud Manufacturing: a Computing and Service-Oriented Manufacturing Model,” Journal of Engineering Manufacture, 225(10):1969–1976.10.1177/0954405411405575Suche in Google Scholar
Wang, X. V. and X. W. Xu (2013) “An Interoperable Solution for Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 29(4):232–247.10.1016/j.rcim.2013.01.005Suche in Google Scholar
Wang, H. Y., W. He and F. K. Wang (2012) “Enterprise Cloud Service Architectures,” Information Technology and Management, 13(4):445–454.10.1007/s10799-012-0139-4Suche in Google Scholar
Xie, X., L. Liu, and Y. Z. Cao (2011). “Trust Model Based on Feedback Evaluation in Cloud Manufacturing Environment,” Advanced Materials Research, 308:1740–1745.10.4028/www.scientific.net/AMR.308-310.1740Suche in Google Scholar
Xu, X. (2012) “From Cloud Computing to Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 28(1):75–86.10.1016/j.rcim.2011.07.002Suche in Google Scholar
Xu, L. and W. Viriyasitavat (2014) “A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows,” IEEE Transactions on Industrial Informatics, 10:1478–1485.10.1109/TII.2014.2301378Suche in Google Scholar
Yan, G., J. Lin, D. B. Rawat and W. Yang (2011) “A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks.” In: Intelligent Computing and Information Science. Springer Berlin Heidelberg, pp. 693–698.10.1007/978-3-642-18134-4_110Suche in Google Scholar
Yan, G., S. Olariu and M. C. Weigle (2008) “Providing VANET Security through Active Position Detection,” Computer Communications: Special Issue on Mobility Protocols for ITS/VANET, 31(12):2883–2897.10.1016/j.comcom.2008.01.009Suche in Google Scholar
Yan, G., W. Yang, J. Lin and D. B. Rawat (2012) “Cross-layer Location Information Security in Vehicular Networks,” Journal of Next Generation Information Technology (JNIT), 3(2):37–56.10.4156/jnit.vol3.issue2.5Suche in Google Scholar
Yan, G., D. Wen, S. Olariu and M. C. Weigle (2013). “Security Challenges in Vehicular Cloud Computing,” IEEE Transactions on Intelligent Transportation Systems, 14:284–294.10.1109/TITS.2012.2211870Suche in Google Scholar
Yan, G., S. Olariu, J. Wang and S. Arif (2014) “Towards Providing Scalable and Robust Privacy in Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, 25(7):1896–1906.Suche in Google Scholar
Zhang, L., Y. Luo, F. Tao, B. Li, L. Ren, X. Zhang, H. Guo, Y. Cheng, A. Hu and Y. Liu (2014) “Cloud Manufacturing: A New Manufacturing Paradigm,” Enterprise Information Systems, 8(2): 167–187.10.1080/17517575.2012.683812Suche in Google Scholar
©2014 by De Gruyter
Artikel in diesem Heft
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education
Artikel in diesem Heft
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education