Abstract
Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.
References
Armbrust, M., A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica and M. Zaharia (2010) “A View of Cloud Computing: Clearing the Clouds Away From the True Potential and Obstacles Posed by This Computing Capability,” Communications of the ACM, 53(4):50–58.10.1145/1721654.1721672Search in Google Scholar
Denning, D. E. and P. F. MacDoran (1996) “Location-Based Authentication: Grounding Cyberspace for Better Security,” Computer Fraud & Security, 1996(2):12–16.10.1016/S1361-3723(97)82613-9Search in Google Scholar
Gao, L., Q. Liu and P. Lou (2013) “Trust Evaluation in Cloud Manufacturing Environment.” In: The 19th International Conference on Industrial Engineering and Engineering Management. Springer Berlin Heidelberg, pp. 1173–1180.10.1007/978-3-642-38442-4_123Search in Google Scholar
Hashizume, K., D. G. Rosado, E. Fernández-Medina and E. B. Fernandez (2013) “An Analysis of Security Issues for Cloud Computing,” Journal of Internet Services and Applications, 4(1):1–13.10.1186/1869-0238-4-5Search in Google Scholar
He, W. and L. Xu (2014) “A State-Of-The-Art Survey of Cloud Manufacturing,” International Journal of Computer Integrated Manufacturing, DOI:10.1080/0951192X.2013.874595.Retrieved on Oct. 25, 2014 from http://www.tandfonline.com/doi/abs/10.1080/ 0951192X.2013.874595.Search in Google Scholar
He, W., L. Xu and G. Yan (2014) “Developing Vehicular Data Cloud Services in the Iot Environment,” IEEE Transactions on Industrial Informatics, 99:1–8.Search in Google Scholar
Huang, B., C. Li, C. Yin and X. Zhao (2013) “Cloud Manufacturing Service Platform for Small-and Medium-Sized Enterprises,” The International Journal of Advanced Manufacturing Technology, 65(9–12):1261–1272.10.1007/s00170-012-4255-4Search in Google Scholar
Huynh, S. X. and D. A. Quan (2008). “Cloud Computing in Manufacturing Environment.” In: AIChE Spring National Meeting, New Orleans, LA, USA, April 6th–10th, 2008.Search in Google Scholar
Li, L. (2013) “Technology Designed to Combat Fakes in the Global Supply Chain,” Business Horizons, 56:167–177.10.1016/j.bushor.2012.11.010Search in Google Scholar
Li, B.-H., L. Zhang and X. Chai (2010) “Introduction to Cloud Manufacturing,” ZTE Communications Technology, 6:5–8.Search in Google Scholar
Ning, F., W. Zhou, F. Zhang, Q. Yin and X. Ni (2011) “The Architecture of Cloud Maufacturing and its Key Technologies Research.” Proceedings of IEEE International Conference on Cloud Computing and Intelligence Systems (CCIS), pp. 259–263.Search in Google Scholar
Ns-2 (2014) The Network Simulator NS-2. Available at: http://www.isi.edu/nsnam/ns/.Search in Google Scholar
Rimal, B. P., A. Jukan, D. Katsaros and Y. Goeleven (2011). “Architectural Requirements for Cloud Computing Systems: An Enterprise Cloud Approach,” Journal of Grid Computing, 9(1):3–26.10.1007/s10723-010-9171-ySearch in Google Scholar
Scott, L. and D. E. Denning (2003) “A Location Based Encryption Technique and Some of its Applications,” In ION National Technical Meeting, Vol. 2003, pp. 730–740.Search in Google Scholar
Tan, W., S. Chen, J. Li, L. Li, T. Wang and X. Hu (2014) “A Trust Evaluation Model for E-Learning Systems,” Systems Research and Behavioral Science, 31(3):353–365.10.1002/sres.2283Search in Google Scholar
Tao, F., Y. F. Hu and Z. D. Zhou (2009) “Application and Modeling of Resource Service Trust-QoS Evaluation in Manufacturing Grid System,” International Journal of Production Research, 47(6):1521–1550.10.1080/00207540701551927Search in Google Scholar
Tao, F., L. Zhang and A. Y. C. Nee (2011a) “A Review of the Application of Grid Technology in Manufacturing,” International Journal of Production Research, 49(13):4119–4155.10.1080/00207541003801234Search in Google Scholar
Tao, F., L. Zhang, V. C. Venkatesh, Y. L. Luo and Y. Cheng (2011b) “Cloud Manufacturing: a Computing and Service-Oriented Manufacturing Model,” Journal of Engineering Manufacture, 225(10):1969–1976.10.1177/0954405411405575Search in Google Scholar
Wang, X. V. and X. W. Xu (2013) “An Interoperable Solution for Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 29(4):232–247.10.1016/j.rcim.2013.01.005Search in Google Scholar
Wang, H. Y., W. He and F. K. Wang (2012) “Enterprise Cloud Service Architectures,” Information Technology and Management, 13(4):445–454.10.1007/s10799-012-0139-4Search in Google Scholar
Xie, X., L. Liu, and Y. Z. Cao (2011). “Trust Model Based on Feedback Evaluation in Cloud Manufacturing Environment,” Advanced Materials Research, 308:1740–1745.10.4028/www.scientific.net/AMR.308-310.1740Search in Google Scholar
Xu, X. (2012) “From Cloud Computing to Cloud Manufacturing,” Robotics and Computer-Integrated Manufacturing, 28(1):75–86.10.1016/j.rcim.2011.07.002Search in Google Scholar
Xu, L. and W. Viriyasitavat (2014) “A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows,” IEEE Transactions on Industrial Informatics, 10:1478–1485.10.1109/TII.2014.2301378Search in Google Scholar
Yan, G., J. Lin, D. B. Rawat and W. Yang (2011) “A Geographic Location-Based Security Mechanism for Intelligent Vehicular Networks.” In: Intelligent Computing and Information Science. Springer Berlin Heidelberg, pp. 693–698.10.1007/978-3-642-18134-4_110Search in Google Scholar
Yan, G., S. Olariu and M. C. Weigle (2008) “Providing VANET Security through Active Position Detection,” Computer Communications: Special Issue on Mobility Protocols for ITS/VANET, 31(12):2883–2897.10.1016/j.comcom.2008.01.009Search in Google Scholar
Yan, G., W. Yang, J. Lin and D. B. Rawat (2012) “Cross-layer Location Information Security in Vehicular Networks,” Journal of Next Generation Information Technology (JNIT), 3(2):37–56.10.4156/jnit.vol3.issue2.5Search in Google Scholar
Yan, G., D. Wen, S. Olariu and M. C. Weigle (2013). “Security Challenges in Vehicular Cloud Computing,” IEEE Transactions on Intelligent Transportation Systems, 14:284–294.10.1109/TITS.2012.2211870Search in Google Scholar
Yan, G., S. Olariu, J. Wang and S. Arif (2014) “Towards Providing Scalable and Robust Privacy in Vehicular Networks,” IEEE Transactions on Intelligent Transportation Systems, 25(7):1896–1906.Search in Google Scholar
Zhang, L., Y. Luo, F. Tao, B. Li, L. Ren, X. Zhang, H. Guo, Y. Cheng, A. Hu and Y. Liu (2014) “Cloud Manufacturing: A New Manufacturing Paradigm,” Enterprise Information Systems, 8(2): 167–187.10.1080/17517575.2012.683812Search in Google Scholar
©2014 by De Gruyter
Articles in the same Issue
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education
Articles in the same Issue
- Frontmatter
- Editorial
- Special Issue on Cybersecurity, Cybercrime, Cyberwar
- Articles
- A Criminological Perspective on Power Grid Cyber attacks: Using Routine Activities Theory to Rational Choice Perspective to Explore Adversarial Decision-Making
- From Weakest Link to Security Hero: Transforming Staff Security Behavior
- Transforming the UK Home Office into a Department for Homeland Security: Reflecting on an Interview with a Litigant Defending Against Online Retaliatory Feedback in the US
- Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
- Evaluation of Efficiency of Transcoding Steganography
- Light Weight Tabletop Exercise for Cybersecurity Education