Abstract
With the growing development of Web, Cloud and Internet applications in industry, one concern that potential users may have is the security of data, remote machines, and operators. Potential security risks in communication with remotely operated manufacturing equipment have been of recent interest which is dubbed cybersecurity in this book. The purpose of this chapter is to provide an overview of cybersecurity measures being considered to ensure the protection of data being sent to physical machines in a cybernetic system. Topics covered include: remote equipment control , security concerns in remote equipment control, existing proposed security measures for remote equipment control and the future outlook of remote equipment control and security in cybernetic systems. While common to other cybernetic systems, security issues in Cloud Manufacturing are focused in this chapter for brevity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Verl, A. Lechler, S. Wesner, A. Kirstadter, J. Schlechtendahl, L. Schubert, S. Meier, An approach for a cloud-based machine tool control. Procedia CIRP 7, 682–687 (2013)
J. Schlechtendahl, F. Kretschmer, A. Lechler, A. Verl, Communication mechanisms for cloud based machine controls. Procedia CIRP 17, 830–834 (2014)
Y. Wang, S. Ma, L. Ren, A security framework for cloud manufacturing. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014. doi:10.1115/MSEC2014-4082
Y. Yang, R.X. Gao, Z. Fan, J. Wang, L. Wang, Cloud-based prognosis: perspective and challenge. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014
D. Shin, A socio-technical framework for internet-of-things design: a human-centered design for the internet of things. Telemat. Inform. 31(4), 519–531 (2014)
L. Ren, L. Zhang, C. Zhao, X. Chai, Cloud manufacturing platform: operating paradigm, functional requirements, and architecture design. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013
L. Wang, M. Givehchi, G. Adamson, M. Holm, A sensor-driven 3D model-based approach to remote real-time monitoring. CIRP Ann. Manuf. Technol. 26, 493–496 (2011)
B. Buckholtz, I. Ragai, L. Wang, Cloud manufacturing: current trends and future implementations. ASME J. Manuf. Sci. Eng. (2015)
G. Colistra, V. Pilloni, L. Atzori, The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)
J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (Iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)
D. Wu, D.W. Rosen, L. Wang, D. Schaefer, Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput. Aided Des. 59, 1–14 (2015)
R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51–58 (2011)
E. Oriwoh, P. Sant, G. Epiphaniou, Guidelines for internet of things deployment approaches—the thing commandments. Procedia Comput. Sci. 21, 122–131 (2013)
S. Wang, L. Guo, L. Kang, C.S. Li, X. Li, Y.M. Stephane, Research on selection strategy of machining equipment in cloud manufacturing. Int. J. Adv. Manuf. Technol 71, 1549–1563 (2014)
D. Zhang, L. Wang, Z. Gao, An integrated approach for remote manipulation of a high-performance reconfigurable parallel kinematic machine. J. Manuf. Syst. 29, 164–172 (2010)
S. Radeka, S. Karelb, The common industrial protocol in machine safety. 25th DAAAM international symposium on intelligent manufacturing and automation, Vienna, Austria, 23–30 November, 2014. doi:10.1016/j.proeng.2015.01.431
Profibus, PROFIsafe system description—safety technology and application. Profibus, (2010). http://www.profibus.com/
L. Wang, W. Shen, S. Lang, Wise-ShopFloor: a web-based and sensor-driven e-shop floor. Trans. ASME J. Comput. Inf. Sci. Eng. 4(1), 56–60 (2004)
X. Xu, From cloud computing to cloud manufacturing. Robot. Comput. Integr. Manuf. 28(1), 75–86 (2012)
L. Wang, Wise-ShopFloor: an integrated approach for web-based collaborative manufacturing. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE, pp. 562–573
M. Holm, M. Givehchi, A. Mohammed, L. Wang, Web based monitoring and control of distant robotic operations. ASME international 2012 manufacturing science and engineering conference, Notre Dame, IN, 2012
X.V. Wang, X. Xu, Cloud manufacturing in support of sustainability. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014
O. Kuyoro’Shade, I. Frank, A. Oludele, Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 247–255 (2011)
L. Almutair, S. Zaghloul, A new virtualization-based security architecture in a cloud computing environment. 3rd international conference on digital information processing and communication, Dubai, UAE, 30 Jan–1 Feb 2013, pp. 676–686
S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)
J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)
F. Shahzad, State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Comput. Sci. 37, 357–362 (2014)
L. Rabai, B. Arfa, M. Jouini, A.B. Aissa, A. Mili, A cybersecurity model in cloud computing environments. J. King Saud Univers. Comput. Inf. Sci. 25(1), 63–75 (2013)
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control. ACM workshop on Cloud Computing Security (CCSW), Chicago, IL, 2009, pp. 85–90
A.K. Talukder, L. Zimmerman, H.A. Prahalad, Cloud economics: principles, costs, and benefits, in Cloud Computing: Principles, Systems, and Applications, 1st ed., (Springer, London, 2010)
Cloud Security Alliance, Top Threats to Cloud Computing (2010). http://www.cloudsecurityalliance.org
J. Spring, Monitoring cloud computing by layer, part 1. Secur. Priv. IEEE 9(2), 66–68 (2011). doi:10.1109/MSP.2011.33
T. Khorshed, S. Ali, S. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)
J. Chaudhary, H. Patel, D. Patel, S. Patel, Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing, CUBE international information technology conference, New York, NY, 2012, pp. 557–560
C. Vecchiola, T. Selvi, R. Buyya, Cloud platforms in industry (McGraw-Hill, Mastering Cloud Computing, 2013)
Cloud Security Alliance, Security Guidance For Critical Areas Of Focus In Cloud Computing, vol. 2.1, 2009. http://www.cloudsecurityalliance.org
M.G. Avram, Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 12, 529–534 (2014)
D. Stock, M. Stöhr, U. Rauschecker, T. Bauernhansl, Cloud-based platform to facilitate access to manufacturing IT. 8th international conference on digital enterprise technology, Stuttgart, Germany, 2014. doi:10.1016/j.procir.2014.10.045
A. Kang, J.H. Park, L. Barolli, H.Y. Jeong, CMMI security model for cloud manufacturing system’s network. Eighth international conference on broadband, wireless computing, communication and applications, Compiegne, France, 28–30 Oct, 2013
P. Holtewert, R. Wutzke, J. Seidelmann, T. Bauernhansl, Virtual fort knox federative, secure and cloud-based platform for manufacturing. Forty sixth CIRP conference on manufacturing systems, 2013, pp. 527–532. doi:10.1016/j.procir.2013.06.027
P. Loshin, Transmission control protocol In TCP/IP Clearly Explained, 4th edn 2003, pp. 351–382. doi:10.1016/B978-155860782-8/50021-X
C. Gurkok, Securing cloud computing systems, in Network and System Security, ch. 4 (2013)
X.V. Wang, X.W. Xu, Virtualize manufacturing capabilities in the cloud: requirements and architecture. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013
C.S. Horstmann, G. Cornell, Core Java, vol. II–Advanced Features, 8th edn, Prentice Hall, 2008. ISBN 978-0-13-235479-0
L. Monostori, Cyber-physical production systems: roots, expectations and R&D challenges. Var. Manag. Manuf 17, 9–13 (2014)
P.H. Griffin, Telebiometric authentication objects. Procedia Comput. Sci. 36, 393–400 (2014)
A.M. Bahaa-Eldin, M.A.A. Sobh, A comprehensive software copy protection and digital rights management platform. Ain Shams Eng. J. 5(3), 703–720 (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Wang, L., Wang, X.V. (2018). Challenges in Cybersecurity. In: Cloud-Based Cyber-Physical Systems in Manufacturing . Springer, Cham. https://doi.org/10.1007/978-3-319-67693-7_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-67693-7_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67692-0
Online ISBN: 978-3-319-67693-7
eBook Packages: EngineeringEngineering (R0)