Technical information security control support system of networked manufacturing outsourcing process

被引:0
作者
Yin, Chao [1 ]
He, Di-Zhuang [1 ]
Wang, Ming-Yuan [1 ]
机构
[1] State Key Laboratory of Mechanical Transmission, Chongqing University
来源
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | 2014年 / 20卷 / 05期
关键词
Authentication; Data encryption; Networked outsourcing; Public key infrastructure; Virtual private networks;
D O I
10.13196/j.cims.2014.05.yinchao.1255.11.20140529
中图分类号
学科分类号
摘要
Aiming at the potential security risks of technical information transmission, data sharing, identity authentication and access control in the networked manufacturing outsourcing process, a security control support system based on network security protocol design, Public Key Infrastructure(PKI) technology and cryptographic technology was puted forward to manage each link of technical information file's storage, transfer and use from three levels of transaction protocol, security authentication and encryption control. In this system, Internet Protocol Security(IPSec) and Secure Socket Layer (SSL) of the network security protocol were used respectively by enterprise trade agreement layer according to different trust degree. Through the digital certificate issued by CA certificate authority, the identity authentication and encryption key of security authentication layer was verified. Based on the session key generated randomly, the technical information file was encrypted by encryption control layer. The effectiveness and feasibility of proposed system was verified by the application cases.
引用
收藏
页码:1255 / 1265
页数:10
相关论文
共 15 条
[11]  
Zhang Y., Gao D., Development of ASP serves safe platform model in network-manufacture, Manufacture Information Engineering of China, 37, 17, pp. 18-21, (2008)
[12]  
Kamel R., Samia O.A., Dynamic data sharing and security in a collaborative product definition management system, Robotics and Computer-Integrated Manufacturing, 23, 2, pp. 217-233, (2007)
[13]  
Yin Y., Li Y., Security considerations based on PKI/CA in manufacturing grid, Wuhan University Journal of Natural Sciences, 6, 11, pp. 1414-1418, (2006)
[14]  
Yin C., Lyu H., Liu F., Networked management system for outsourcing of motorcycle parts factory, Computer Integrated Manufacturing Systems, 15, 2, pp. 369-376, (2009)
[15]  
Li J., Zhang J., The research of PKI in the application of cloud computing, Netinfo Security, 8, pp. 44-46, (2011)