Skip to main content

Challenges in Cybersecurity

  • Chapter
  • First Online:
Cloud-Based Cyber-Physical Systems in Manufacturing

Abstract

With the growing development of Web, Cloud and Internet applications in industry, one concern that potential users may have is the security of data, remote machines, and operators. Potential security risks in communication with remotely operated manufacturing equipment have been of recent interest which is dubbed cybersecurity in this book. The purpose of this chapter is to provide an overview of cybersecurity measures being considered to ensure the protection of data being sent to physical machines in a cybernetic system. Topics covered include: remote equipment control , security concerns in remote equipment control, existing proposed security measures for remote equipment control and the future outlook of remote equipment control and security in cybernetic systems. While common to other cybernetic systems, security issues in Cloud Manufacturing are focused in this chapter for brevity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Verl, A. Lechler, S. Wesner, A. Kirstadter, J. Schlechtendahl, L. Schubert, S. Meier, An approach for a cloud-based machine tool control. Procedia CIRP 7, 682–687 (2013)

    Article  Google Scholar 

  2. J. Schlechtendahl, F. Kretschmer, A. Lechler, A. Verl, Communication mechanisms for cloud based machine controls. Procedia CIRP 17, 830–834 (2014)

    Article  Google Scholar 

  3. Y. Wang, S. Ma, L. Ren, A security framework for cloud manufacturing. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014. doi:10.1115/MSEC2014-4082

  4. Y. Yang, R.X. Gao, Z. Fan, J. Wang, L. Wang, Cloud-based prognosis: perspective and challenge. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014

    Google Scholar 

  5. D. Shin, A socio-technical framework for internet-of-things design: a human-centered design for the internet of things. Telemat. Inform. 31(4), 519–531 (2014)

    Article  Google Scholar 

  6. L. Ren, L. Zhang, C. Zhao, X. Chai, Cloud manufacturing platform: operating paradigm, functional requirements, and architecture design. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013

    Google Scholar 

  7. L. Wang, M. Givehchi, G. Adamson, M. Holm, A sensor-driven 3D model-based approach to remote real-time monitoring. CIRP Ann. Manuf. Technol. 26, 493–496 (2011)

    Article  Google Scholar 

  8. B. Buckholtz, I. Ragai, L. Wang, Cloud manufacturing: current trends and future implementations. ASME J. Manuf. Sci. Eng. (2015)

    Google Scholar 

  9. G. Colistra, V. Pilloni, L. Atzori, The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)

    Article  Google Scholar 

  10. J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (Iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  11. D. Wu, D.W. Rosen, L. Wang, D. Schaefer, Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput. Aided Des. 59, 1–14 (2015)

    Article  Google Scholar 

  12. R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51–58 (2011)

    Article  Google Scholar 

  13. E. Oriwoh, P. Sant, G. Epiphaniou, Guidelines for internet of things deployment approaches—the thing commandments. Procedia Comput. Sci. 21, 122–131 (2013)

    Article  Google Scholar 

  14. S. Wang, L. Guo, L. Kang, C.S. Li, X. Li, Y.M. Stephane, Research on selection strategy of machining equipment in cloud manufacturing. Int. J. Adv. Manuf. Technol 71, 1549–1563 (2014)

    Article  Google Scholar 

  15. D. Zhang, L. Wang, Z. Gao, An integrated approach for remote manipulation of a high-performance reconfigurable parallel kinematic machine. J. Manuf. Syst. 29, 164–172 (2010)

    Article  Google Scholar 

  16. S. Radeka, S. Karelb, The common industrial protocol in machine safety. 25th DAAAM international symposium on intelligent manufacturing and automation, Vienna, Austria, 23–30 November, 2014. doi:10.1016/j.proeng.2015.01.431

  17. Profibus, PROFIsafe system description—safety technology and application. Profibus, (2010). http://www.profibus.com/

  18. L. Wang, W. Shen, S. Lang, Wise-ShopFloor: a web-based and sensor-driven e-shop floor. Trans. ASME J. Comput. Inf. Sci. Eng. 4(1), 56–60 (2004)

    Article  Google Scholar 

  19. X. Xu, From cloud computing to cloud manufacturing. Robot. Comput. Integr. Manuf. 28(1), 75–86 (2012)

    Article  Google Scholar 

  20. L. Wang, Wise-ShopFloor: an integrated approach for web-based collaborative manufacturing. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE, pp. 562–573

    Google Scholar 

  21. M. Holm, M. Givehchi, A. Mohammed, L. Wang, Web based monitoring and control of distant robotic operations. ASME international 2012 manufacturing science and engineering conference, Notre Dame, IN, 2012

    Google Scholar 

  22. X.V. Wang, X. Xu, Cloud manufacturing in support of sustainability. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014

    Google Scholar 

  23. O. Kuyoro’Shade, I. Frank, A. Oludele, Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 247–255 (2011)

    Google Scholar 

  24. L. Almutair, S. Zaghloul, A new virtualization-based security architecture in a cloud computing environment. 3rd international conference on digital information processing and communication, Dubai, UAE, 30 Jan–1 Feb 2013, pp. 676–686

    Google Scholar 

  25. S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)

    Article  Google Scholar 

  26. J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)

    Article  Google Scholar 

  27. F. Shahzad, State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Comput. Sci. 37, 357–362 (2014)

    Article  Google Scholar 

  28. L. Rabai, B. Arfa, M. Jouini, A.B. Aissa, A. Mili, A cybersecurity model in cloud computing environments. J. King Saud Univers. Comput. Inf. Sci. 25(1), 63–75 (2013)

    Article  Google Scholar 

  29. R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control. ACM workshop on Cloud Computing Security (CCSW), Chicago, IL, 2009, pp. 85–90

    Google Scholar 

  30. A.K. Talukder, L. Zimmerman, H.A. Prahalad, Cloud economics: principles, costs, and benefits, in Cloud Computing: Principles, Systems, and Applications, 1st ed., (Springer, London, 2010)

    Google Scholar 

  31. Cloud Security Alliance, Top Threats to Cloud Computing (2010). http://www.cloudsecurityalliance.org

  32. J. Spring, Monitoring cloud computing by layer, part 1. Secur. Priv. IEEE 9(2), 66–68 (2011). doi:10.1109/MSP.2011.33

    Article  Google Scholar 

  33. T. Khorshed, S. Ali, S. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)

    Article  Google Scholar 

  34. J. Chaudhary, H. Patel, D. Patel, S. Patel, Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing, CUBE international information technology conference, New York, NY, 2012, pp. 557–560

    Google Scholar 

  35. C. Vecchiola, T. Selvi, R. Buyya, Cloud platforms in industry (McGraw-Hill, Mastering Cloud Computing, 2013)

    Google Scholar 

  36. Cloud Security Alliance, Security Guidance For Critical Areas Of Focus In Cloud Computing, vol. 2.1, 2009. http://www.cloudsecurityalliance.org

  37. M.G. Avram, Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 12, 529–534 (2014)

    Article  Google Scholar 

  38. D. Stock, M. Stöhr, U. Rauschecker, T. Bauernhansl, Cloud-based platform to facilitate access to manufacturing IT. 8th international conference on digital enterprise technology, Stuttgart, Germany, 2014. doi:10.1016/j.procir.2014.10.045

  39. A. Kang, J.H. Park, L. Barolli, H.Y. Jeong, CMMI security model for cloud manufacturing system’s network. Eighth international conference on broadband, wireless computing, communication and applications, Compiegne, France, 28–30 Oct, 2013

    Google Scholar 

  40. P. Holtewert, R. Wutzke, J. Seidelmann, T. Bauernhansl, Virtual fort knox federative, secure and cloud-based platform for manufacturing. Forty sixth CIRP conference on manufacturing systems, 2013, pp. 527–532. doi:10.1016/j.procir.2013.06.027

  41. P. Loshin, Transmission control protocol In TCP/IP Clearly Explained, 4th edn 2003, pp. 351–382. doi:10.1016/B978-155860782-8/50021-X

  42. C. Gurkok, Securing cloud computing systems, in Network and System Security, ch. 4 (2013)

    Google Scholar 

  43. X.V. Wang, X.W. Xu, Virtualize manufacturing capabilities in the cloud: requirements and architecture. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013

    Google Scholar 

  44. C.S. Horstmann, G. Cornell, Core Java, vol. II–Advanced Features, 8th edn, Prentice Hall, 2008. ISBN 978-0-13-235479-0

    Google Scholar 

  45. L. Monostori, Cyber-physical production systems: roots, expectations and R&D challenges. Var. Manag. Manuf 17, 9–13 (2014)

    Google Scholar 

  46. P.H. Griffin, Telebiometric authentication objects. Procedia Comput. Sci. 36, 393–400 (2014)

    Article  Google Scholar 

  47. A.M. Bahaa-Eldin, M.A.A. Sobh, A comprehensive software copy protection and digital rights management platform. Ain Shams Eng. J. 5(3), 703–720 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lihui Wang .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Wang, L., Wang, X.V. (2018). Challenges in Cybersecurity. In: Cloud-Based Cyber-Physical Systems in Manufacturing . Springer, Cham. https://doi.org/10.1007/978-3-319-67693-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67693-7_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67692-0

  • Online ISBN: 978-3-319-67693-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics