EconPapers    
Economics at your fingertips  
 

Enhancing the Security of Cloud Manufacturing by Restricting Resource Access

Liu Xiaoyun, He Wu, Xu Li and Yan Gongjun ()
Additional contact information
Liu Xiaoyun: School of Business, Anhui University, Anhui, China
He Wu: Information Technology, Old Dominion University, Norfolk, VA, USA
Xu Li: Information Technology/Decision Sciences, Old Dominion Unversity, Norfolk, VA, USA
Yan Gongjun: Computer Science, Unversity of Southern Indiana, 8600 University Blvd Evansville, IN 47712, USA, yangongjun@gmail.com

Journal of Homeland Security and Emergency Management, 2014, vol. 11, issue 4, 533-554

Abstract: Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.

Keywords: cloud access restriction; cloud computing; cloud manufacturing; GeoEncryption; resource exclusive access (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1515/jhsem-2014-0034 (text/html)
For access to full text, subscription to the journal or payment for the individual article is required.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bpj:johsem:v:11:y:2014:i:4:p:533-554:n:4

Ordering information: This journal article can be ordered from
https://www.degruyter.com/journal/key/jhsem/html

DOI: 10.1515/jhsem-2014-0034

Access Statistics for this article

Journal of Homeland Security and Emergency Management is currently edited by Irmak Renda-Tanali

More articles in Journal of Homeland Security and Emergency Management from De Gruyter
Bibliographic data for series maintained by Peter Golla ().

 
Page updated 2025-03-19
Handle: RePEc:bpj:johsem:v:11:y:2014:i:4:p:533-554:n:4