Cloud Manufacturing: Security, Privacy and Forensic Concerns

被引:85
作者
Esposito, Christian [1 ,2 ]
Castiglione, Aniello [1 ,2 ]
Martini, Ben [3 ]
Choo, Kim-Kwang Raymond [4 ,5 ,6 ]
机构
[1] Univ Naples Federico II, Naples, Italy
[2] Univ Salerno, Fisciano, Italy
[3] Univ South Australia, Adelaide, SA 5001, Australia
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX USA
[5] Queensland Univ Technol, Informat Secur, Brisbane, Qld 4001, Australia
[6] Australian Comp Soc, Sydney, NSW, Australia
关键词
FRAMEWORK;
D O I
10.1109/MCC.2016.79
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing benefits from widespread adoption in every sector of our society and economy, due, at least in part, to the promise of cost-effective and elastic provisioning of computing resources. Manufacturing is one domain where cloud computing is starting to be seen as a promising solution to strengthen collaboration and cooperation capabilities, fostered by novel organization models and strategies. The combination of the cloud computing and manufacturing domains has brought the advent of 'cloud manufacturing,' which is rethinking the way manufacturing enterprises are organized and how they can realize the advantages of cloud computing in their operations. However, the full application of cloud manufacturing is hindered by several issues, of which security is one of the most challenging. This column presents an overview of the key security issues relating to cloud manufacturing and briefly surveys the state of the art on this topic. © 2014 IEEE.
引用
收藏
页码:16 / 22
页数:7
相关论文
共 18 条
[1]  
[Anonymous], 2013, FACT FUT MULT ROADM
[2]  
[Anonymous], 2009, ADV INFORM SECURITY
[3]   Collaborative networked organizations - Concepts and practice in manufacturing enterprises [J].
Camarinha-Matos, Luis M. ;
Afsarmanesh, Hamideh ;
Galeano, Nathalie ;
Molina, Arturo .
COMPUTERS & INDUSTRIAL ENGINEERING, 2009, 57 (01) :46-60
[4]  
Cloud Security Alliance, 2016, TREACH
[5]   On Security in Publish/Subscribe Services: A Survey [J].
Esposito, Christian ;
Ciampi, Mario .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (02) :966-997
[6]   Understanding Cloud Computing Vulnerabilities [J].
Grobauer, Bernd ;
Walloschek, Tobias ;
Stoecker, Elmar .
IEEE SECURITY & PRIVACY, 2011, 9 (02) :50-57
[7]  
Koren Y., 2010, GLOBAL MANUFACTURING, DOI DOI 10.1002/9780470618813.CH9
[8]   Cloud computing - The business perspective [J].
Marston, Sean ;
Li, Zhi ;
Bandyopadhyay, Subhajyoti ;
Zhang, Juheng ;
Ghalsasi, Anand .
DECISION SUPPORT SYSTEMS, 2011, 51 (01) :176-189
[9]   An integrated conceptual digital forensic framework for cloud computing [J].
Martini, Ben ;
Choo, Kim-Kwang Raymond .
DIGITAL INVESTIGATION, 2012, 9 (02) :71-80
[10]   A strategic framework for networked manufacturing [J].
Montreuil, B ;
Frayret, JM ;
D'Amours, S .
COMPUTERS IN INDUSTRY, 2000, 42 (2-3) :299-317