Startseite Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Enhancing the Security of Cloud Manufacturing by Restricting Resource Access

  • Xiaoyun Liu , Wu He , Li Xu und Gongjun Yan EMAIL logo
Veröffentlicht/Copyright: 8. November 2014

Abstract

Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.


Corresponding author: Gongjun Yan, Computer Science, Unversity of Southern Indiana, 8600 University Blvd Evansville, IN 47712, USA, Phone: +8122285073

References

Armbrust, M., A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2010) “A View of Cloud Computing: Clearing the Clouds Away From the True Potential and Obstacles Posed by This Computing Capability,” Communications of the ACM, 53(4):50–58.10.1145/1721654.1721672Suche in Google Scholar

Denning, D. E. and P. F. MacDoran (1996) “Location-Based Authentication: Grounding Cyberspace for Better Security,” Computer Fraud & Security, 1996(2):12–16.10.1016/S1361-3723(97)82613-9Suche in Google Scholar

Gao, L., Q. Liu and P. Lou (2013) “Trust Evaluation in Cloud Manufacturing Environment.” In: The 19th International Conference on Industrial Engineering and Engineering Management. Springer Berlin Heidelberg, pp. 1173–1180.10.1007/978-3-642-38442-4_123Suche in Google Scholar

Hashizume, K., D. G. Rosado, E. Fernández-Medina and E. B. Fernandez (2013) “An Analysis of Security Issues for Cloud Computing,” Journal of Internet Services and Applications, 4(1):1–13.10.1186/1869-0238-4-5Suche in Google Scholar

He, W. and L. Xu (2014) “A State-Of-The-Art Survey of Cloud Manufacturing,” International Journal of Computer Integrated Manufacturing, DOI:10.1080/0951192X.2013.874595.Retrieved on Oct. 25, 2014 from http://www.tandfonline.com/doi/abs/10.1080/ 0951192X.2013.874595.Suche in Google Scholar

He, W., L. Xu and G. Yan (2014) “Developing Vehicular Data Cloud Services in the Iot Environment,” IEEE Transactions on Industrial Informatics, 99:1–8.Suche in Google Scholar

Huang, B., C. Li, C. Yin and X. Zhao (2013) “Cloud Manufacturing Service Platform for Small-and Medium-Sized Enterprises,” The International Journal of Advanced Manufacturing Technology, 65(9–12):1261–1272.10.1007/s00170-012-4255-4Suche in Google Scholar

Huynh, S. X. and D. A. Quan (2008). “Cloud Computing in Manufacturing Environment.” In: AIChE Spring National Meeting, New Orleans, LA, USA, April 6th–10th, 2008.Suche in Google Scholar

Li, L. (2013) “Technology Designed to Combat Fakes in the Global Supply Chain,” Business Horizons, 56:167–177.10.1016/j.bushor.2012.11.010Suche in Google Scholar

Li, B.-H., L. Zhang and X. Chai (2010) “Introduction to Cloud Manufacturing,” ZTE Communications Technology, 6:5–8.Suche in Google Scholar

Ning, F., W. Zhou, F. Zhang, Q. Yin and X. Ni (2011) “The Architecture of Cloud Maufacturing and its Key Technologies Research.” Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 259–263.Suche in Google Scholar

Ns-2 (2014) The Network Simulator NS-2. Available at: http://www.isi.edu/nsnam/ns/.Suche in Google Scholar

Rimal, B. P., A. Jukan, D. Katsaros and Y. Goeleven (2011). “Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach,” Journal of Grid Computing, 9(1):3–26.10.1007/s10723-010-9171-ySuche in Google Scholar

Scott, L. and D. E. Denning (2003) “A Location Based Encryption Technique and Some of its Applications,” In ION National Technical Meeting, Vol. 2003, pp. 730–740.Suche in Google Scholar

Tan, W., S. Chen, J. Li, L. Li, T. Wang and X. Hu (2014) “A Trust Evaluation Model for E-Learning Systems,” Systems Research and Behavioral Science, 31(3):353–365.10.1002/sres.2283Suche in Google Scholar

Tao, F., Y. F. Hu and Z. D. Zhou (2009) “Application and Modeling of Resource Service Trust-QoS Evaluation in Manufacturing Grid System,” International Journal of Production Research, 47(6):1521–1550.10.1080/00207540701551927Suche in Google Scholar

Tao, F., L. Zhang and A. Y. C. Nee (2011a) “A Review of the Application of Grid Technology in Manufacturing,” International Journal of Production Research, 49(13):4119–4155.10.1080/00207541003801234Suche in Google Scholar

Tao, F., L. Zhang, V. C. Venkatesh, Y. L. Luo and Y. Cheng (2011b) “Cloud Manufacturing: a Computing and Service-Oriented Manufacturing Model,” Journal of Engineering Manufacture, 225(10):1969–1976.10.1177/0954405411405575Suche in Google Scholar

Wang, X. V. and X. W. Xu (2013) “An Interoperable Solution for Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 29(4):232–247.10.1016/j.rcim.2013.01.005Suche in Google Scholar

Wang, H. Y., W. He and F. K. Wang (2012) “Enterprise Cloud Service Architectures,” Information Technology and Management, 13(4):445–454.10.1007/s10799-012-0139-4Suche in Google Scholar

Xie, X., L. Liu, and Y. Z. Cao (2011). “Trust Model Based on Feedback Evaluation in Cloud Manufacturing Environment,” Advanced Materials Research, 308:1740–1745.10.4028/www.scientific.net/AMR.308-310.1740Suche in Google Scholar

Xu, X. (2012) “From Cloud Computing to Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 28(1):75–86.10.1016/j.rcim.2011.07.002Suche in Google Scholar

Xu, L. and W. Viriyasitavat (2014) “A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows,” IEEE Transactions on Industrial Informatics, 10:1478–1485.10.1109/TII.2014.2301378Suche in Google Scholar

Yan, G., J. Lin, D. B. Rawat and W. Yang (2011) “A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks.” In: Intelligent Computing and Information Science. Springer Berlin Heidelberg, pp. 693–698.10.1007/978-3-642-18134-4_110Suche in Google Scholar

Yan, G., S. Olariu and M. C. Weigle (2008) “Providing VANET Security through Active Position Detection,” Computer Communications: Special Issue on Mobility Protocols for ITS/VANET, 31(12):2883–2897.10.1016/j.comcom.2008.01.009Suche in Google Scholar

Yan, G., W. Yang, J. Lin and D. B. Rawat (2012) “Cross-layer Location Information Security in Vehicular Networks,” Journal of Next Generation Information Technology (JNIT), 3(2):37–56.10.4156/jnit.vol3.issue2.5Suche in Google Scholar

Yan, G., D. Wen, S. Olariu and M. C. Weigle (2013). “Security Challenges in Vehicular Cloud Computing,” IEEE Transactions on Intelligent Transportation Systems, 14:284–294.10.1109/TITS.2012.2211870Suche in Google Scholar

Yan, G., S. Olariu, J. Wang and S. Arif (2014) “Towards Providing Scalable and Robust Privacy in Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, 25(7):1896–1906.Suche in Google Scholar

Zhang, L., Y. Luo, F. Tao, B. Li, L. Ren, X. Zhang, H. Guo, Y. Cheng, A. Hu and Y. Liu (2014) “Cloud Manufacturing: A New Manufacturing Paradigm,” Enterprise Information Systems, 8(2): 167–187.10.1080/17517575.2012.683812Suche in Google Scholar

Published Online: 2014-11-8
Published in Print: 2014-12-1

©2014 by De Gruyter

Heruntergeladen am 23.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2014-0034/html?lang=de
Button zum nach oben scrollen