Trust Issues for Big Data About High-Value Manufactured Parts

被引:6
作者
Adhikari, Anku [1 ]
Hojjati, Avesta [1 ]
Shen, Juanli [1 ]
Hsu, Jui-Ting [1 ]
King, William P. [1 ]
Winslett, Marianne [1 ]
机构
[1] Univ Illinois, Urbana, IL 61801 USA
来源
2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2016年
关键词
Digital threads; digital-threads-as-a-service (DTaaS); manufacturing; cloud computing;
D O I
10.1109/BigDataSecurity-HPSC-IDS.2016.50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the world of high-value manufacturing, an imperative for productivity and quality are driving the manufacturing community towards integration of all information captured about a product along the manufacturing value chain, from its design and manufacture through usage, maintenance, and decommissioning. Much of this information is already captured, but it is scattered across many organizations, with significant variation among levels of security consciousness and information technology sophistication. Any weak link in this chain of organizations constitutes a threat that can have a major negative impact for organizations all along the chain. In this paper, we explain the reasons for the move towards integration of information about high-value manufactured products. We introduce the concept of a digital thread, which is the entre set of information about the life history of a manufactured object. We outline several key threats to digital threads that have not been fully addressed in previous work on securing provenance information, and propose digital-threads-as-a-service (DTaaS) as a potential way to mitigate several of the open issues.
引用
收藏
页码:24 / 29
页数:6
相关论文
共 22 条
[1]  
[Anonymous], 2011, BIG DATA NEXT FRONTI
[2]  
Barr J., 2015, AMAZON WEB SERV 0708
[3]  
Bisceglie J., 2014, CYBERSECURITY ADV MA
[4]  
Braun U., 2008, HOTSEC
[5]  
Carroll J. J., 2005, P WWW
[6]  
Cheney J., 2011, IEEE COMP SEC FDN S
[7]  
Chong S., 2009, TAPP
[8]  
Freedberg S., 2013, BREAKING DEFENS 0620
[9]  
Furstoss C., 2013, CIO REV, V3, P12
[10]  
Hasan R., 2009, ACM T STORAGE, V5