Securing Manufacturing Intelligence for the Industrial Internet of Things

被引:8
作者
Al-Aqrabi, Hussain [1 ]
Hill, Richard [1 ]
Lane, Phil [1 ]
Aagela, Hamza [1 ]
机构
[1] Univ Huddersfield, Dept Comp Sci, Huddersfield, W Yorkshire, England
来源
FOURTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, VOL 2 | 2020年 / 1027卷
关键词
Business Intelligence; Security; Industrial Internet of Things;
D O I
10.1007/978-981-32-9343-4_21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Widespread interest in the emerging area of predictive analytics is driving the manufacturing industry to explore new approaches to the collection and management of data through Industrial Internet of Things (IIoT) devices. Analytics processing for Business Intelligence (BI) is an intensive task, presenting both a competitive advantage as well as a security vulnerability in terms of the potential for losing Intellectual property (IP). This article explores two approaches to securing BI in the manufacturing domain. Simulation results indicate that a Unified Threat Management (UTM) model is simpler to maintain and has less potential vulnerabilities than a distributed security model. Conversely, a distributed model of security out-performs the UTM model and offers more scope for the use of existing hardware resources. In conclusion, a hybrid security model is proposed where security controls are segregated into a multi-cloud architecture.
引用
收藏
页码:267 / 282
页数:16
相关论文
共 38 条
[1]  
Abadi D.J., 2009, IEEE Data Eng. Bull, V32, P3
[2]  
Agrawalla R.K., 2005, Share Prices and Macroeconomic Variables in India: An Approach to Investigate the Relationship between Stock Markets and Economic Growth, P1
[3]  
Ahmad Sajjad, 2010, Proceedings of 2010 International Symposium on Information Technology (ITSim 2010), P1586, DOI 10.1109/ITSIM.2010.5561644
[4]  
Al-Aqrabi Hussain, 2013, 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, Physical and Social Computing (CPSCom), P842, DOI 10.1109/GreenCom-iThings-CPSCom.2013.148
[5]  
Al-Aqrabi H., 2014, P CSS ICESS IEEE FRA, P137
[6]   Business Intelligence Security on the Clouds: Challenges, Solutions and Future Directions [J].
Al-Aqrabi, Hussain ;
Liu, Lu ;
Hill, Richard ;
Ding, Zhijun ;
Antonopoulos, Nick .
2013 IEEE SEVENTH INTERNATIONAL SYMPOSIUM ON SERVICE-ORIENTED SYSTEM ENGINEERING (SOSE 2013), 2013, :137-144
[7]   Taking the Business Intelligence to the Clouds [J].
Al-Aqrabi, Hussain ;
Liu, Lu ;
Hill, Richard ;
Antonopoulos, Nick .
2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, :953-958
[8]  
[Anonymous], 2016, GLOB IND 4 0 SURV S
[9]  
[Anonymous], 2015, GARTNER SAYS 6 4 BIL
[10]  
Ashton K., 2009, RFID J, V22, P97