Skip to main content
Top

2018 | OriginalPaper | Chapter

3. Challenges in Cybersecurity

Authors : Lihui Wang, Xi Vincent Wang

Published in: Cloud-Based Cyber-Physical Systems in Manufacturing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the growing development of Web, Cloud and Internet applications in industry, one concern that potential users may have is the security of data, remote machines, and operators. Potential security risks in communication with remotely operated manufacturing equipment have been of recent interest which is dubbed cybersecurity in this book. The purpose of this chapter is to provide an overview of cybersecurity measures being considered to ensure the protection of data being sent to physical machines in a cybernetic system. Topics covered include: remote equipment control, security concerns in remote equipment control, existing proposed security measures for remote equipment control and the future outlook of remote equipment control and security in cybernetic systems. While common to other cybernetic systems, security issues in Cloud Manufacturing are focused in this chapter for brevity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A. Verl, A. Lechler, S. Wesner, A. Kirstadter, J. Schlechtendahl, L. Schubert, S. Meier, An approach for a cloud-based machine tool control. Procedia CIRP 7, 682–687 (2013)CrossRef A. Verl, A. Lechler, S. Wesner, A. Kirstadter, J. Schlechtendahl, L. Schubert, S. Meier, An approach for a cloud-based machine tool control. Procedia CIRP 7, 682–687 (2013)CrossRef
2.
go back to reference J. Schlechtendahl, F. Kretschmer, A. Lechler, A. Verl, Communication mechanisms for cloud based machine controls. Procedia CIRP 17, 830–834 (2014)CrossRef J. Schlechtendahl, F. Kretschmer, A. Lechler, A. Verl, Communication mechanisms for cloud based machine controls. Procedia CIRP 17, 830–834 (2014)CrossRef
3.
go back to reference Y. Wang, S. Ma, L. Ren, A security framework for cloud manufacturing. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014. doi:10.1115/MSEC2014-4082 Y. Wang, S. Ma, L. Ren, A security framework for cloud manufacturing. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014. doi:10.​1115/​MSEC2014-4082
4.
go back to reference Y. Yang, R.X. Gao, Z. Fan, J. Wang, L. Wang, Cloud-based prognosis: perspective and challenge. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014 Y. Yang, R.X. Gao, Z. Fan, J. Wang, L. Wang, Cloud-based prognosis: perspective and challenge. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014
5.
go back to reference D. Shin, A socio-technical framework for internet-of-things design: a human-centered design for the internet of things. Telemat. Inform. 31(4), 519–531 (2014)CrossRef D. Shin, A socio-technical framework for internet-of-things design: a human-centered design for the internet of things. Telemat. Inform. 31(4), 519–531 (2014)CrossRef
6.
go back to reference L. Ren, L. Zhang, C. Zhao, X. Chai, Cloud manufacturing platform: operating paradigm, functional requirements, and architecture design. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013 L. Ren, L. Zhang, C. Zhao, X. Chai, Cloud manufacturing platform: operating paradigm, functional requirements, and architecture design. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013
7.
go back to reference L. Wang, M. Givehchi, G. Adamson, M. Holm, A sensor-driven 3D model-based approach to remote real-time monitoring. CIRP Ann. Manuf. Technol. 26, 493–496 (2011)CrossRef L. Wang, M. Givehchi, G. Adamson, M. Holm, A sensor-driven 3D model-based approach to remote real-time monitoring. CIRP Ann. Manuf. Technol. 26, 493–496 (2011)CrossRef
8.
go back to reference B. Buckholtz, I. Ragai, L. Wang, Cloud manufacturing: current trends and future implementations. ASME J. Manuf. Sci. Eng. (2015) B. Buckholtz, I. Ragai, L. Wang, Cloud manufacturing: current trends and future implementations. ASME J. Manuf. Sci. Eng. (2015)
9.
go back to reference G. Colistra, V. Pilloni, L. Atzori, The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef G. Colistra, V. Pilloni, L. Atzori, The problem of task allocation in the internet of things and the consensus-based approach. Comput. Netw. 73, 98–111 (2014)CrossRef
10.
go back to reference J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (Iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, Internet of things (Iot): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
11.
go back to reference D. Wu, D.W. Rosen, L. Wang, D. Schaefer, Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput. Aided Des. 59, 1–14 (2015)CrossRef D. Wu, D.W. Rosen, L. Wang, D. Schaefer, Cloud-based design and manufacturing: a new paradigm in digital manufacturing and design innovation. Comput. Aided Des. 59, 1–14 (2015)CrossRef
12.
go back to reference R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51–58 (2011)CrossRef R. Roman, P. Najera, J. Lopez, Securing the internet of things. Computer 44(9), 51–58 (2011)CrossRef
13.
go back to reference E. Oriwoh, P. Sant, G. Epiphaniou, Guidelines for internet of things deployment approaches—the thing commandments. Procedia Comput. Sci. 21, 122–131 (2013)CrossRef E. Oriwoh, P. Sant, G. Epiphaniou, Guidelines for internet of things deployment approaches—the thing commandments. Procedia Comput. Sci. 21, 122–131 (2013)CrossRef
14.
go back to reference S. Wang, L. Guo, L. Kang, C.S. Li, X. Li, Y.M. Stephane, Research on selection strategy of machining equipment in cloud manufacturing. Int. J. Adv. Manuf. Technol 71, 1549–1563 (2014)CrossRef S. Wang, L. Guo, L. Kang, C.S. Li, X. Li, Y.M. Stephane, Research on selection strategy of machining equipment in cloud manufacturing. Int. J. Adv. Manuf. Technol 71, 1549–1563 (2014)CrossRef
15.
go back to reference D. Zhang, L. Wang, Z. Gao, An integrated approach for remote manipulation of a high-performance reconfigurable parallel kinematic machine. J. Manuf. Syst. 29, 164–172 (2010)CrossRef D. Zhang, L. Wang, Z. Gao, An integrated approach for remote manipulation of a high-performance reconfigurable parallel kinematic machine. J. Manuf. Syst. 29, 164–172 (2010)CrossRef
16.
go back to reference S. Radeka, S. Karelb, The common industrial protocol in machine safety. 25th DAAAM international symposium on intelligent manufacturing and automation, Vienna, Austria, 23–30 November, 2014. doi:10.1016/j.proeng.2015.01.431 S. Radeka, S. Karelb, The common industrial protocol in machine safety. 25th DAAAM international symposium on intelligent manufacturing and automation, Vienna, Austria, 23–30 November, 2014. doi:10.​1016/​j.​proeng.​2015.​01.​431
18.
go back to reference L. Wang, W. Shen, S. Lang, Wise-ShopFloor: a web-based and sensor-driven e-shop floor. Trans. ASME J. Comput. Inf. Sci. Eng. 4(1), 56–60 (2004)CrossRef L. Wang, W. Shen, S. Lang, Wise-ShopFloor: a web-based and sensor-driven e-shop floor. Trans. ASME J. Comput. Inf. Sci. Eng. 4(1), 56–60 (2004)CrossRef
19.
go back to reference X. Xu, From cloud computing to cloud manufacturing. Robot. Comput. Integr. Manuf. 28(1), 75–86 (2012)CrossRef X. Xu, From cloud computing to cloud manufacturing. Robot. Comput. Integr. Manuf. 28(1), 75–86 (2012)CrossRef
20.
go back to reference L. Wang, Wise-ShopFloor: an integrated approach for web-based collaborative manufacturing. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE, pp. 562–573 L. Wang, Wise-ShopFloor: an integrated approach for web-based collaborative manufacturing. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE, pp. 562–573
21.
go back to reference M. Holm, M. Givehchi, A. Mohammed, L. Wang, Web based monitoring and control of distant robotic operations. ASME international 2012 manufacturing science and engineering conference, Notre Dame, IN, 2012 M. Holm, M. Givehchi, A. Mohammed, L. Wang, Web based monitoring and control of distant robotic operations. ASME international 2012 manufacturing science and engineering conference, Notre Dame, IN, 2012
22.
go back to reference X.V. Wang, X. Xu, Cloud manufacturing in support of sustainability. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014 X.V. Wang, X. Xu, Cloud manufacturing in support of sustainability. ASME 2014 international manufacturing science and engineering conference, Detroit, MI, USA, 9–13 June 2014
23.
go back to reference O. Kuyoro’Shade, I. Frank, A. Oludele, Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 247–255 (2011) O. Kuyoro’Shade, I. Frank, A. Oludele, Cloud computing security issues and challenges. Int. J. Comput. Netw. 3(5), 247–255 (2011)
24.
go back to reference L. Almutair, S. Zaghloul, A new virtualization-based security architecture in a cloud computing environment. 3rd international conference on digital information processing and communication, Dubai, UAE, 30 Jan–1 Feb 2013, pp. 676–686 L. Almutair, S. Zaghloul, A new virtualization-based security architecture in a cloud computing environment. 3rd international conference on digital information processing and communication, Dubai, UAE, 30 Jan–1 Feb 2013, pp. 676–686
25.
go back to reference S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRef
26.
go back to reference J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)CrossRef J. Che, Y. Duan, T. Zhang, J. Fan, Study on the security models and strategies of cloud computing. Procedia Eng. 23, 586–593 (2011)CrossRef
27.
go back to reference F. Shahzad, State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Comput. Sci. 37, 357–362 (2014)CrossRef F. Shahzad, State-of-the-art survey on cloud computing security Challenges, approaches and solutions. Procedia Comput. Sci. 37, 357–362 (2014)CrossRef
28.
go back to reference L. Rabai, B. Arfa, M. Jouini, A.B. Aissa, A. Mili, A cybersecurity model in cloud computing environments. J. King Saud Univers. Comput. Inf. Sci. 25(1), 63–75 (2013)CrossRef L. Rabai, B. Arfa, M. Jouini, A.B. Aissa, A. Mili, A cybersecurity model in cloud computing environments. J. King Saud Univers. Comput. Inf. Sci. 25(1), 63–75 (2013)CrossRef
29.
go back to reference R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control. ACM workshop on Cloud Computing Security (CCSW), Chicago, IL, 2009, pp. 85–90 R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control. ACM workshop on Cloud Computing Security (CCSW), Chicago, IL, 2009, pp. 85–90
30.
go back to reference A.K. Talukder, L. Zimmerman, H.A. Prahalad, Cloud economics: principles, costs, and benefits, in Cloud Computing: Principles, Systems, and Applications, 1st ed., (Springer, London, 2010) A.K. Talukder, L. Zimmerman, H.A. Prahalad, Cloud economics: principles, costs, and benefits, in Cloud Computing: Principles, Systems, and Applications, 1st ed., (Springer, London, 2010)
33.
go back to reference T. Khorshed, S. Ali, S. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)CrossRef T. Khorshed, S. Ali, S. Wasimi, A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 28(6), 833–851 (2012)CrossRef
34.
go back to reference J. Chaudhary, H. Patel, D. Patel, S. Patel, Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing, CUBE international information technology conference, New York, NY, 2012, pp. 557–560 J. Chaudhary, H. Patel, D. Patel, S. Patel, Tradeoffs between performance and security of cryptographic primitives used in storage as a service for cloud computing, CUBE international information technology conference, New York, NY, 2012, pp. 557–560
35.
go back to reference C. Vecchiola, T. Selvi, R. Buyya, Cloud platforms in industry (McGraw-Hill, Mastering Cloud Computing, 2013) C. Vecchiola, T. Selvi, R. Buyya, Cloud platforms in industry (McGraw-Hill, Mastering Cloud Computing, 2013)
37.
go back to reference M.G. Avram, Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 12, 529–534 (2014)CrossRef M.G. Avram, Advantages and challenges of adopting cloud computing from an enterprise perspective. Procedia Technol. 12, 529–534 (2014)CrossRef
38.
go back to reference D. Stock, M. Stöhr, U. Rauschecker, T. Bauernhansl, Cloud-based platform to facilitate access to manufacturing IT. 8th international conference on digital enterprise technology, Stuttgart, Germany, 2014. doi:10.1016/j.procir.2014.10.045 D. Stock, M. Stöhr, U. Rauschecker, T. Bauernhansl, Cloud-based platform to facilitate access to manufacturing IT. 8th international conference on digital enterprise technology, Stuttgart, Germany, 2014. doi:10.​1016/​j.​procir.​2014.​10.​045
39.
go back to reference A. Kang, J.H. Park, L. Barolli, H.Y. Jeong, CMMI security model for cloud manufacturing system’s network. Eighth international conference on broadband, wireless computing, communication and applications, Compiegne, France, 28–30 Oct, 2013 A. Kang, J.H. Park, L. Barolli, H.Y. Jeong, CMMI security model for cloud manufacturing system’s network. Eighth international conference on broadband, wireless computing, communication and applications, Compiegne, France, 28–30 Oct, 2013
40.
go back to reference P. Holtewert, R. Wutzke, J. Seidelmann, T. Bauernhansl, Virtual fort knox federative, secure and cloud-based platform for manufacturing. Forty sixth CIRP conference on manufacturing systems, 2013, pp. 527–532. doi:10.1016/j.procir.2013.06.027 P. Holtewert, R. Wutzke, J. Seidelmann, T. Bauernhansl, Virtual fort knox federative, secure and cloud-based platform for manufacturing. Forty sixth CIRP conference on manufacturing systems, 2013, pp. 527–532. doi:10.​1016/​j.​procir.​2013.​06.​027
42.
go back to reference C. Gurkok, Securing cloud computing systems, in Network and System Security, ch. 4 (2013) C. Gurkok, Securing cloud computing systems, in Network and System Security, ch. 4 (2013)
43.
go back to reference X.V. Wang, X.W. Xu, Virtualize manufacturing capabilities in the cloud: requirements and architecture. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013 X.V. Wang, X.W. Xu, Virtualize manufacturing capabilities in the cloud: requirements and architecture. ASME 2013 international manufacturing science and engineering conference, Madison, WI, USA, 10–14 June 2013
44.
go back to reference C.S. Horstmann, G. Cornell, Core Java, vol. II–Advanced Features, 8th edn, Prentice Hall, 2008. ISBN 978-0-13-235479-0 C.S. Horstmann, G. Cornell, Core Java, vol. II–Advanced Features, 8th edn, Prentice Hall, 2008. ISBN 978-0-13-235479-0
45.
go back to reference L. Monostori, Cyber-physical production systems: roots, expectations and R&D challenges. Var. Manag. Manuf 17, 9–13 (2014) L. Monostori, Cyber-physical production systems: roots, expectations and R&D challenges. Var. Manag. Manuf 17, 9–13 (2014)
46.
go back to reference P.H. Griffin, Telebiometric authentication objects. Procedia Comput. Sci. 36, 393–400 (2014)CrossRef P.H. Griffin, Telebiometric authentication objects. Procedia Comput. Sci. 36, 393–400 (2014)CrossRef
47.
go back to reference A.M. Bahaa-Eldin, M.A.A. Sobh, A comprehensive software copy protection and digital rights management platform. Ain Shams Eng. J. 5(3), 703–720 (2014) A.M. Bahaa-Eldin, M.A.A. Sobh, A comprehensive software copy protection and digital rights management platform. Ain Shams Eng. J. 5(3), 703–720 (2014)
Metadata
Title
Challenges in Cybersecurity
Authors
Lihui Wang
Xi Vincent Wang
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-67693-7_3

Premium Partners