Home Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
Article
Licensed
Unlicensed Requires Authentication

Enhancing the Security of Cloud Manufacturing by Restricting Resource Access

  • Xiaoyun Liu , Wu He , Li Xu and Gongjun Yan EMAIL logo
Published/Copyright: November 8, 2014

Abstract

Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.


Corresponding author: Gongjun Yan, Computer Science, Unversity of Southern Indiana, 8600 University Blvd Evansville, IN 47712, USA, Phone: +8122285073

References

Armbrust, M., A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2010) “A View of Cloud Computing: Clearing the Clouds Away From the True Potential and Obstacles Posed by This Computing Capability,” Communications of the ACM, 53(4):50–58.10.1145/1721654.1721672Search in Google Scholar

Denning, D. E. and P. F. MacDoran (1996) “Location-Based Authentication: Grounding Cyberspace for Better Security,” Computer Fraud & Security, 1996(2):12–16.10.1016/S1361-3723(97)82613-9Search in Google Scholar

Gao, L., Q. Liu and P. Lou (2013) “Trust Evaluation in Cloud Manufacturing Environment.” In: The 19th International Conference on Industrial Engineering and Engineering Management. Springer Berlin Heidelberg, pp. 1173–1180.10.1007/978-3-642-38442-4_123Search in Google Scholar

Hashizume, K., D. G. Rosado, E. Fernández-Medina and E. B. Fernandez (2013) “An Analysis of Security Issues for Cloud Computing,” Journal of Internet Services and Applications, 4(1):1–13.10.1186/1869-0238-4-5Search in Google Scholar

He, W. and L. Xu (2014) “A State-Of-The-Art Survey of Cloud Manufacturing,” International Journal of Computer Integrated Manufacturing, DOI:10.1080/0951192X.2013.874595.Retrieved on Oct. 25, 2014 from http://www.tandfonline.com/doi/abs/10.1080/ 0951192X.2013.874595.Search in Google Scholar

He, W., L. Xu and G. Yan (2014) “Developing Vehicular Data Cloud Services in the Iot Environment,” IEEE Transactions on Industrial Informatics, 99:1–8.Search in Google Scholar

Huang, B., C. Li, C. Yin and X. Zhao (2013) “Cloud Manufacturing Service Platform for Small-and Medium-Sized Enterprises,” The International Journal of Advanced Manufacturing Technology, 65(9–12):1261–1272.10.1007/s00170-012-4255-4Search in Google Scholar

Huynh, S. X. and D. A. Quan (2008). “Cloud Computing in Manufacturing Environment.” In: AIChE Spring National Meeting, New Orleans, LA, USA, April 6th–10th, 2008.Search in Google Scholar

Li, L. (2013) “Technology Designed to Combat Fakes in the Global Supply Chain,” Business Horizons, 56:167–177.10.1016/j.bushor.2012.11.010Search in Google Scholar

Li, B.-H., L. Zhang and X. Chai (2010) “Introduction to Cloud Manufacturing,” ZTE Communications Technology, 6:5–8.Search in Google Scholar

Ning, F., W. Zhou, F. Zhang, Q. Yin and X. Ni (2011) “The Architecture of Cloud Maufacturing and its Key Technologies Research.” Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 259–263.Search in Google Scholar

Ns-2 (2014) The Network Simulator NS-2. Available at: http://www.isi.edu/nsnam/ns/.Search in Google Scholar

Rimal, B. P., A. Jukan, D. Katsaros and Y. Goeleven (2011). “Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach,” Journal of Grid Computing, 9(1):3–26.10.1007/s10723-010-9171-ySearch in Google Scholar

Scott, L. and D. E. Denning (2003) “A Location Based Encryption Technique and Some of its Applications,” In ION National Technical Meeting, Vol. 2003, pp. 730–740.Search in Google Scholar

Tan, W., S. Chen, J. Li, L. Li, T. Wang and X. Hu (2014) “A Trust Evaluation Model for E-Learning Systems,” Systems Research and Behavioral Science, 31(3):353–365.10.1002/sres.2283Search in Google Scholar

Tao, F., Y. F. Hu and Z. D. Zhou (2009) “Application and Modeling of Resource Service Trust-QoS Evaluation in Manufacturing Grid System,” International Journal of Production Research, 47(6):1521–1550.10.1080/00207540701551927Search in Google Scholar

Tao, F., L. Zhang and A. Y. C. Nee (2011a) “A Review of the Application of Grid Technology in Manufacturing,” International Journal of Production Research, 49(13):4119–4155.10.1080/00207541003801234Search in Google Scholar

Tao, F., L. Zhang, V. C. Venkatesh, Y. L. Luo and Y. Cheng (2011b) “Cloud Manufacturing: a Computing and Service-Oriented Manufacturing Model,” Journal of Engineering Manufacture, 225(10):1969–1976.10.1177/0954405411405575Search in Google Scholar

Wang, X. V. and X. W. Xu (2013) “An Interoperable Solution for Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 29(4):232–247.10.1016/j.rcim.2013.01.005Search in Google Scholar

Wang, H. Y., W. He and F. K. Wang (2012) “Enterprise Cloud Service Architectures,” Information Technology and Management, 13(4):445–454.10.1007/s10799-012-0139-4Search in Google Scholar

Xie, X., L. Liu, and Y. Z. Cao (2011). “Trust Model Based on Feedback Evaluation in Cloud Manufacturing Environment,” Advanced Materials Research, 308:1740–1745.10.4028/www.scientific.net/AMR.308-310.1740Search in Google Scholar

Xu, X. (2012) “From Cloud Computing to Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 28(1):75–86.10.1016/j.rcim.2011.07.002Search in Google Scholar

Xu, L. and W. Viriyasitavat (2014) “A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows,” IEEE Transactions on Industrial Informatics, 10:1478–1485.10.1109/TII.2014.2301378Search in Google Scholar

Yan, G., J. Lin, D. B. Rawat and W. Yang (2011) “A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks.” In: Intelligent Computing and Information Science. Springer Berlin Heidelberg, pp. 693–698.10.1007/978-3-642-18134-4_110Search in Google Scholar

Yan, G., S. Olariu and M. C. Weigle (2008) “Providing VANET Security through Active Position Detection,” Computer Communications: Special Issue on Mobility Protocols for ITS/VANET, 31(12):2883–2897.10.1016/j.comcom.2008.01.009Search in Google Scholar

Yan, G., W. Yang, J. Lin and D. B. Rawat (2012) “Cross-layer Location Information Security in Vehicular Networks,” Journal of Next Generation Information Technology (JNIT), 3(2):37–56.10.4156/jnit.vol3.issue2.5Search in Google Scholar

Yan, G., D. Wen, S. Olariu and M. C. Weigle (2013). “Security Challenges in Vehicular Cloud Computing,” IEEE Transactions on Intelligent Transportation Systems, 14:284–294.10.1109/TITS.2012.2211870Search in Google Scholar

Yan, G., S. Olariu, J. Wang and S. Arif (2014) “Towards Providing Scalable and Robust Privacy in Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, 25(7):1896–1906.Search in Google Scholar

Zhang, L., Y. Luo, F. Tao, B. Li, L. Ren, X. Zhang, H. Guo, Y. Cheng, A. Hu and Y. Liu (2014) “Cloud Manufacturing: A New Manufacturing Paradigm,” Enterprise Information Systems, 8(2): 167–187.10.1080/17517575.2012.683812Search in Google Scholar

Published Online: 2014-11-8
Published in Print: 2014-12-1

©2014 by De Gruyter

Downloaded on 23.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2014-0034/html?lang=en
Scroll to top button