The challenges of cybersecurity frameworks to protect data required for the development of advanced maintenance

被引:20
作者
Campos, Jaime [1 ]
Sharma, Pankaj [2 ]
Jantunen, Erkki [3 ]
Baglee, David [4 ]
Fumagalli, Luca [5 ]
机构
[1] Linnaeus Univ, Dept Informat, SE-35195 Vaxjo, Sweden
[2] IIT Delhi, Dept Mech Engn, New Delhi, India
[3] VTT Tech Res Ctr Finland, POB 1000, FI-02044 Espoo, Finland
[4] Univ Sunderland, Dept Comp Engn & Technol, Sunderland SR2 7EE, Durham, England
[5] Politecn Milan, Dept Management Econ & Ind Engn, Milan, Italy
来源
PRODUCT-SERVICE SYSTEMS ACROSS LIFE CYCLE | 2016年 / 47卷
关键词
Big data; cloud computing; maintenance engineering; asset management; CLOUD; MOBILE;
D O I
10.1016/j.procir.2016.03.059
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The main objective of the paper is to highlight the important aspects of the data management in condition monitoring and maintenance, especially when the emergent technologies, such as the cloud computing and big data, are to be considered in the maintenance department. In addition, one of the main data management elements highlighted in the current work are the cybersecurity issues which might be one of the biggest obstacles hindering the development of cloud based big data for condition-based maintenance (CBM) purposes. Further, the benefits and current risks of storing a company's data in the cloud are highlighted. The authors discuss as well different data needs in various processes in the area of asset management. In addition, the challenges and issues to be addressed for the optimal use of the company data at the cloud together with the big data approach are addressed. This is seen as an important part in an effort to achieve sustainable information and communication technologies for the industry. (C) 2016 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:222 / 227
页数:6
相关论文
共 31 条
[11]   Mobile, Cloud, and Big Data Computing: Contributions, Challenges, and New Directions in Telecardiology [J].
Hsieh, Jui-Chien ;
Li, Ai-Hsien ;
Yang, Chung-Chi .
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2013, 10 (11) :6131-6153
[12]  
ISACA, 2014, CISC VIS NETW IND GL
[13]  
Jansen W.A., 2011, guidelines on security and privacy in public cloud computing
[14]   Towards secure mobile cloud computing: A survey [J].
Khan, Abdul Nasir ;
Kiah, M. L. Mat ;
Khan, Samee U. ;
Madani, Sajjad A. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05) :1278-1299
[15]  
Kitchin R., 2013, Dialogues in Human Geography, V3, P262
[16]   Big data's impact on privacy, security and consumer welfare [J].
Kshetri, Nir .
TELECOMMUNICATIONS POLICY, 2014, 38 (11) :1134-1145
[17]   Enhanced Attribute Based Encryption for Cloud Computing [J].
Kumar, Saravana N. ;
Lakshmi, Rajya G., V ;
Balamurugan, B. .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 :689-696
[18]  
Kurtz J., 2013, SMART AN LEAD SUMM N
[19]  
Lee J., 2000, MANUFACTURING LEADER, V02, P1
[20]   Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey [J].
Manvi, Sunilkurnar S. ;
Shyam, Gopal Krishna .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 :424-440