Technical information security control support system of networked manufacturing outsourcing process

被引:0
作者
Yin, Chao [1 ]
He, Di-Zhuang [1 ]
Wang, Ming-Yuan [1 ]
机构
[1] State Key Laboratory of Mechanical Transmission, Chongqing University
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2014年 / 20卷 / 05期
关键词
Authentication; Data encryption; Networked outsourcing; Public key infrastructure; Virtual private networks;
D O I
10.13196/j.cims.2014.05.yinchao.1255.11.20140529
中图分类号
学科分类号
摘要
Aiming at the potential security risks of technical information transmission, data sharing, identity authentication and access control in the networked manufacturing outsourcing process, a security control support system based on network security protocol design, Public Key Infrastructure(PKI) technology and cryptographic technology was puted forward to manage each link of technical information file's storage, transfer and use from three levels of transaction protocol, security authentication and encryption control. In this system, Internet Protocol Security(IPSec) and Secure Socket Layer (SSL) of the network security protocol were used respectively by enterprise trade agreement layer according to different trust degree. Through the digital certificate issued by CA certificate authority, the identity authentication and encryption key of security authentication layer was verified. Based on the session key generated randomly, the technical information file was encrypted by encryption control layer. The effectiveness and feasibility of proposed system was verified by the application cases.
引用
收藏
页码:1255 / 1265
页数:10
相关论文
共 15 条
[1]  
Li H., Sun S., Yang H., Identity-based authentication protocol for grid-based anufacturing, Computer Integrated Manufacturing Systems, 14, 1, pp. 177-182, (2008)
[2]  
Zhang Y., Wang H., Key technologies and system implementation of distributed collaborative product design & manufacturing, Engineering Design, 9, 2, pp. 149-155, (2005)
[3]  
Ren J., Li J., Research on security architecture in networked manufacturing system, Manufacturing Automation, 32, 8, pp. 185-187, (2010)
[4]  
Hess F., Efficient identity-based signature schemes based on pairings, Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography, (2003)
[5]  
Lei Z., Design secure file transmission system in networked manufacturing based on chaos, Microelectronics & Computer, 29, 4, pp. 198-122, (2012)
[6]  
Lu R., Lin X., Cao Z., Et al., New(t, n)threshold directed signature scheme with provable security, Information Sciences, 178, 3, pp. 756-765, (2008)
[7]  
Chen X., Site security risks and preventive measures, Coal Technology, 30, 1, pp. 112-114, (2011)
[8]  
Kim T., Christopher D., Cera C., Multi-level modeling and access control for data sharing in collaborative ddsign, Advanced Engineering Informatics, 20, 1, pp. 47-57, (2006)
[9]  
Song W., Liu W., Sun D., Security system design & its implementation for collaborative supply chain, Computer Integrated Manufacturing Systems, 12, 2, pp. 292-296, (2006)
[10]  
Liu M., Yan J., Wang J., Collaboration-oriented security architecture & technologies in grid-based manufacturing pattern, Computer Integrated Manufacturing Systems, 12, 3, pp. 458-464, (2006)