Skip to main content

2020 | OriginalPaper | Buchkapitel

Securing Manufacturing Intelligence for the Industrial Internet of Things

verfasst von : Hussain Al-Aqrabi, Richard Hill, Phil Lane, Hamza Aagela

Erschienen in: Fourth International Congress on Information and Communication Technology

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Widespread interest in the emerging area of predictive analytics is driving the manufacturing industry to explore new approaches to the collection and management of data through Industrial Internet of Things (IIoT) devices. Analytics processing for Business Intelligence (BI) is an intensive task, presenting both a competitive advantage as well as a security vulnerability in terms of the potential for losing Intellectual property (IP). This article explores two approaches to securing BI in the manufacturing domain. Simulation results indicate that a Unified Threat Management (UTM) model is simpler to maintain and has less potential vulnerabilities than a distributed security model. Conversely, a distributed model of security out-performs the UTM model and offers more scope for the use of existing hardware resources. In conclusion, a hybrid security model is proposed where security controls are segregated into a multi-cloud architecture.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ashton, K.: That “Internet of Things” thing. RFiD J. (2009) Ashton, K.: That “Internet of Things” thing. RFiD J. (2009)
2.
Zurück zum Zitat Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013)CrossRef
3.
Zurück zum Zitat Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A., Rong, X.: Data mining for the Internet of things: literature review and challenges. Int. J. Distrib. Sens. Netw. 11(8) (2015) Chen, F., Deng, P., Wan, J., Zhang, D., Vasilakos, A., Rong, X.: Data mining for the Internet of things: literature review and challenges. Int. J. Distrib. Sens. Netw. 11(8) (2015)
5.
Zurück zum Zitat Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., Sotiriadis, S.: Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency Comput. Pract. Experience 27(8), 1966–1984 (2015)CrossRef Ikram, A., Anjum, A., Hill, R., Antonopoulos, N., Liu, L., Sotiriadis, S.: Approaching the Internet of things (IoT): a modelling, analysis and abstraction framework. Concurrency Comput. Pract. Experience 27(8), 1966–1984 (2015)CrossRef
6.
Zurück zum Zitat Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, CERP IoT (2010) Sundmaeker, H., Guillemin, P., Friess, P., Woelfflé, S.: Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, CERP IoT (2010)
8.
Zurück zum Zitat Wang, S., Wan, J., Zhang, D., Li, D. Zhang, C.: Towards the smart factory for Industrie 4.0: a self-organized multi-agent system assisted with big data based feedback and coordination, Comput. Netw. 101, 158–168 (2016) Wang, S., Wan, J., Zhang, D., Li, D. Zhang, C.: Towards the smart factory for Industrie 4.0: a self-organized multi-agent system assisted with big data based feedback and coordination, Comput. Netw. 101, 158–168 (2016)
9.
Zurück zum Zitat Wang, S., Wan, J., Li, D., Zhang, C.: Implementing smart factory of industrie 4.0: an outlook. Int. J. Distrib. Sens. Netw. 12, 1 (2016) Wang, S., Wan, J., Li, D., Zhang, C.: Implementing smart factory of industrie 4.0: an outlook. Int. J. Distrib. Sens. Netw. 12, 1 (2016)
10.
Zurück zum Zitat Liu, Q., Wan, J., Zhou, K.: Cloud manufacturing service system for industrial-cluster-oriented application. J. Internet Technol. 15(3), 373–380 (2014) Liu, Q., Wan, J., Zhou, K.: Cloud manufacturing service system for industrial-cluster-oriented application. J. Internet Technol. 15(3), 373–380 (2014)
11.
Zurück zum Zitat Hill, M., Devitt, J., Anjum, A., Ali, M.: Towards In-Transit Analytics for Industry 4.0. FCST2017. IEEE Computer Society (2017) Hill, M., Devitt, J., Anjum, A., Ali, M.: Towards In-Transit Analytics for Industry 4.0. FCST2017. IEEE Computer Society (2017)
12.
Zurück zum Zitat Katic, N., Quirchmayr, G., Schiefer, J., Stolba, M., Tjoa, A.M.: A Prototype Model for Data Warehouse Security Based on Metadata. University of Vienna, pp. 1–9 (2006) Katic, N., Quirchmayr, G., Schiefer, J., Stolba, M., Tjoa, A.M.: A Prototype Model for Data Warehouse Security Based on Metadata. University of Vienna, pp. 1–9 (2006)
13.
Zurück zum Zitat Rosenthal, R., Sciore, E.: View security as the basis for data warehouse security. In: Jeusfeld, M., Shu, H., Staudt, M., Vossen, G. (eds.) Proceedings of the International Workshop on Design and Management of Data Warehouses (DMDW’2000), pp. 1–8. Stockholm, Sweden, June 5–6 (2000) Rosenthal, R., Sciore, E.: View security as the basis for data warehouse security. In: Jeusfeld, M., Shu, H., Staudt, M., Vossen, G. (eds.) Proceedings of the International Workshop on Design and Management of Data Warehouses (DMDW’2000), pp. 1–8. Stockholm, Sweden, June 5–6 (2000)
14.
Zurück zum Zitat Kadan, A.: Security Management of Intelligent Technologies in Business Intelligence Systems. Yanka Kupala State University of Grodno, pp. 1–3 (2012) Kadan, A.: Security Management of Intelligent Technologies in Business Intelligence Systems. Yanka Kupala State University of Grodno, pp. 1–3 (2012)
15.
Zurück zum Zitat Fernandez-Medinaa, E., Trujillo, J., Villarroel, R., Piattini, M.: Developing secure data warehouses with a UML extension. Inform. Syst. 32, 826–856 (2007)CrossRef Fernandez-Medinaa, E., Trujillo, J., Villarroel, R., Piattini, M.: Developing secure data warehouses with a UML extension. Inform. Syst. 32, 826–856 (2007)CrossRef
16.
Zurück zum Zitat Ahmad, S., Ahmad, R.: An Improved Security Framework for Data Warehouse: A Hybrid Approach. IEEE, pp. 1586–1590 Ahmad, S., Ahmad, R.: An Improved Security Framework for Data Warehouse: A Hybrid Approach. IEEE, pp. 1586–1590
17.
Zurück zum Zitat Brankovic, L., Estivill-Castro, V.: Privacy issues in knowledge discovery and data mining. Department of Computer Science and Software Engineering, The University of Newcastle, Australia, pp. 1–12 (2000) Brankovic, L., Estivill-Castro, V.: Privacy issues in knowledge discovery and data mining. Department of Computer Science and Software Engineering, The University of Newcastle, Australia, pp. 1–12 (2000)
18.
Zurück zum Zitat Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Taking the business intelligence to the clouds. In: 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 953–958. IEEE Computer Society, Liverpool (2012) Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Taking the business intelligence to the clouds. In: 9th International Conference on Embedded Software and Systems (HPCC-ICESS), pp. 953–958. IEEE Computer Society, Liverpool (2012)
19.
Zurück zum Zitat Blanco, C., Prez-Castillo, R., Hernndez, A., Fernndez-Medina, E., Trujillo, J.: Towards a modernization process for secure data warehouses. In: Pedersen, T.B., Mohania, M.K., Tjoa, A.M. (eds.) LNCS, vol. 5691, pp. 24–35. Springer, Heidelberg (2009) Blanco, C., Prez-Castillo, R., Hernndez, A., Fernndez-Medina, E., Trujillo, J.: Towards a modernization process for secure data warehouses. In: Pedersen, T.B., Mohania, M.K., Tjoa, A.M. (eds.) LNCS, vol. 5691, pp. 24–35. Springer, Heidelberg (2009)
20.
Zurück zum Zitat Stobla, N., Banek, M., Tjoa, A. M.: The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. Vienna University of Technology and University of Zagreb, pp. 1–11 Stobla, N., Banek, M., Tjoa, A. M.: The Security Issue of Federated Data Warehouses in the Area of Evidence-Based Medicine. Vienna University of Technology and University of Zagreb, pp. 1–11
21.
Zurück zum Zitat Abadi, D. J.: Data management in the cloud: limitations and opportunities. Data Eng. 32(1), 3–11 (IEEE Computer Society) (2009) Abadi, D. J.: Data management in the cloud: limitations and opportunities. Data Eng. 32(1), 3–11 (IEEE Computer Society) (2009)
22.
Zurück zum Zitat Fienberg, S.E.: Privacy and confidentiality in an e-Commerce world: data mining, data warehousing, matching and disclosure limitation. Statistical Sci. 21(2), 143–154 (Institute of mathematical Statistics) (2006) Fienberg, S.E.: Privacy and confidentiality in an e-Commerce world: data mining, data warehousing, matching and disclosure limitation. Statistical Sci. 21(2), 143–154 (Institute of mathematical Statistics) (2006)
23.
Zurück zum Zitat Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In: Proceedings of (CSS) and (ICESS), pp. 137–144. IEEE, France, Paris (2014) Al-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: A multi-layer hierarchical inter-cloud connectivity model for sequential packet inspection of tenant sessions accessing BI as a service. In: Proceedings of (CSS) and (ICESS), pp. 137–144. IEEE, France, Paris (2014)
24.
Zurück zum Zitat Al-Aqrabi, H., Liu, L., Hill, H., Cui, L., Li, J.: Faceted search in business intelligence on the cloud. In: Proceedings of GREENCOM-ITHINGS-CPSCOM, pp. 842–849. IEEE, China, Beijing (2013) Al-Aqrabi, H., Liu, L., Hill, H., Cui, L., Li, J.: Faceted search in business intelligence on the cloud. In: Proceedings of GREENCOM-ITHINGS-CPSCOM, pp. 842–849. IEEE, China, Beijing (2013)
25.
Zurück zum Zitat Beer, M., Huang, W., Hill, R.: Designing community care systems with AUML. In: Proceedings of the International Conference on Computer, Communication and Control Technologies (CCCT ‘03) and the 9th International Conference on Information Systems Analysis and Synthesis (ISAS ‘03), Orlando, USA, July 31–August 2, IEEE Computer Society, pp. 247–253 (2003) Beer, M., Huang, W., Hill, R.: Designing community care systems with AUML. In: Proceedings of the International Conference on Computer, Communication and Control Technologies (CCCT ‘03) and the 9th International Conference on Information Systems Analysis and Synthesis (ISAS ‘03), Orlando, USA, July 31–August 2, IEEE Computer Society, pp. 247–253 (2003)
26.
Zurück zum Zitat Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: Transforming conceptual model into logical model for temporal data warehouse security: a case study. Int. J. Adv. Comput. Sci. Appl. 3(3), 115–122 (2012) Farhan, M.S., Marie, M.E., El-Fangary, L.M., Helmy, Y.K.: Transforming conceptual model into logical model for temporal data warehouse security: a case study. Int. J. Adv. Comput. Sci. Appl. 3(3), 115–122 (2012)
27.
Zurück zum Zitat Priebe, T., Pernul, G.: Towards OLAP security design survey and research issues. In: Proceedings of Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), pp. 33–40, 10 Nov 2000. ACM, McLean, VA, USA (2000) Priebe, T., Pernul, G.: Towards OLAP security design survey and research issues. In: Proceedings of Third ACM International Workshop on Data Warehousing and OLAP (DOLAP 2000), pp. 33–40, 10 Nov 2000. ACM, McLean, VA, USA (2000)
28.
Zurück zum Zitat Cuzzocrea, A., Bertino, E., Sacca, D.: Towards a theory for privacy preserving distributed OLAP. In: PAIS12, pp. 1-6, 30 March 2012. ACM, Berlin, Germany (2012) Cuzzocrea, A., Bertino, E., Sacca, D.: Towards a theory for privacy preserving distributed OLAP. In: PAIS12, pp. 1-6, 30 March 2012. ACM, Berlin, Germany (2012)
29.
Zurück zum Zitat Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: SIGMOD 2005, pp. 1–12, 14–16 June 2005. ACM, Baltimore, Maryland, USA (2005) Agrawal, R., Srikant, R., Thomas, D.: Privacy preserving OLAP. In: SIGMOD 2005, pp. 1–12, 14–16 June 2005. ACM, Baltimore, Maryland, USA (2005)
30.
Zurück zum Zitat Shu, Z., Wan, J., Zhang, D., Li, D.: Cloud-integrated cyber-physical systems for complex industrial applications. Mobile Netw. Appl., 1–14 (2015) Shu, Z., Wan, J., Zhang, D., Li, D.: Cloud-integrated cyber-physical systems for complex industrial applications. Mobile Netw. Appl., 1–14 (2015)
31.
Zurück zum Zitat Li, X., Li, D., Wan, J., Vasilakos, A., Lai, C., Wang, S.: A review of industrial wireless networks in the context of industry 4.0. Wireless Netw., 1–19 (2015) Li, X., Li, D., Wan, J., Vasilakos, A., Lai, C., Wang, S.: A review of industrial wireless networks in the context of industry 4.0. Wireless Netw., 1–19 (2015)
32.
Zurück zum Zitat Baker, C., Anjum, A., Hill, R., Bessis, N., Liaquat Kiani, S.: Improving cloud datacentre scalability, agility and performance using OpenFlow. In: Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE Computer Society (2012) Baker, C., Anjum, A., Hill, R., Bessis, N., Liaquat Kiani, S.: Improving cloud datacentre scalability, agility and performance using OpenFlow. In: Proceedings of the 4th International Conference on Intelligent Networking and Collaborative Systems (INCoS), IEEE Computer Society (2012)
33.
Zurück zum Zitat Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P04), pp. 1–15. IEEE Computer Society (2004) Wang, L., Jajodia, S., Wijesekera, D.: Securing OLAP data cubes against privacy breaches. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P04), pp. 1–15. IEEE Computer Society (2004)
35.
Zurück zum Zitat Garcia-Campos, J.M., Reina, D.G., Toral, S.L., Bessis, N., Barrero, F., Asimakopoulou, E., Hill, R.: Performance evaluation of reactive routing protocols for VANETs in urban scenarios following good simulation practices, In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Santa Cantarina, Brazil, 8–10 July, pp. 1–8. ISBN: 978-1-4799-8872-3 (2015). https://doi.org/10.1109/IMIS.2015.5 Garcia-Campos, J.M., Reina, D.G., Toral, S.L., Bessis, N., Barrero, F., Asimakopoulou, E., Hill, R.: Performance evaluation of reactive routing protocols for VANETs in urban scenarios following good simulation practices, In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Santa Cantarina, Brazil, 8–10 July, pp. 1–8. ISBN: 978-1-4799-8872-3 (2015). https://​doi.​org/​10.​1109/​IMIS.​2015.​5
36.
Zurück zum Zitat A1-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Business intelligence security on the clouds: challenges solutions and future directions. In: Proceedings of 7th International Symposium on Service Oriented System Engineering, pp. 137–144. 25–28 March 2013 A1-Aqrabi, H., Liu, L., Hill, R., Antonopoulos, N.: Business intelligence security on the clouds: challenges solutions and future directions. In: Proceedings of 7th International Symposium on Service Oriented System Engineering, pp. 137–144. 25–28 March 2013
37.
Zurück zum Zitat Sotiriadis, S., Bessis, N., Antonopoulos, N., Hill, R.: Meta-scheduling algorithms for managing inter-cloud interoperability. Int. J. High Perform. Comput. Netw. 7(2), 156–172 (2013)CrossRef Sotiriadis, S., Bessis, N., Antonopoulos, N., Hill, R.: Meta-scheduling algorithms for managing inter-cloud interoperability. Int. J. High Perform. Comput. Netw. 7(2), 156–172 (2013)CrossRef
38.
Zurück zum Zitat Sotiriadis, S., Bessis, N., Anjum, A., Buyya, R.: An inter-cloud meta-scheduling (icms) simulation framework: Architecture and evaluation. IEEE Trans. Serv. Comput. (2015) Sotiriadis, S., Bessis, N., Anjum, A., Buyya, R.: An inter-cloud meta-scheduling (icms) simulation framework: Architecture and evaluation. IEEE Trans. Serv. Comput. (2015)
Metadaten
Titel
Securing Manufacturing Intelligence for the Industrial Internet of Things
verfasst von
Hussain Al-Aqrabi
Richard Hill
Phil Lane
Hamza Aagela
Copyright-Jahr
2020
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-32-9343-4_21

Neuer Inhalt