Enhancing the Security of Cloud Manufacturing by Restricting Resource Access
Liu Xiaoyun,
He Wu,
Xu Li and
Yan Gongjun ()
Additional contact information
Liu Xiaoyun: School of Business, Anhui University, Anhui, China
He Wu: Information Technology, Old Dominion University, Norfolk, VA, USA
Xu Li: Information Technology/Decision Sciences, Old Dominion Unversity, Norfolk, VA, USA
Yan Gongjun: Computer Science, Unversity of Southern Indiana, 8600 University Blvd Evansville, IN 47712, USA, yangongjun@gmail.com
Journal of Homeland Security and Emergency Management, 2014, vol. 11, issue 4, 533-554
Abstract:
Cloud manufacturing has recently become a hot research topic in the manufacturing industry. One of the key bottlenecks that hinders the development and application of cloud manufacturing is security. As the adoption and use of manufacturing cloud depends on its security mechanism to a large extent, we propose a new resource security method to enhance the security of cloud manufacturing services by providing resources exclusive access to cloud virtual machine and restricting cloud access from unauthorized users. To enable authorized users in the right location, right time and right network to access resources, a GeoAuthentication model that maps geographic location, access time, and subnetwork information into a secret key is proposed. We also propose conflict firewall in manufacturing cloud to separate users with conflict of interest.
Keywords: cloud access restriction; cloud computing; cloud manufacturing; GeoEncryption; resource exclusive access (search for similar items in EconPapers)
Date: 2014
References: Add references at CitEc
Citations:
Downloads: (external link)
https://doi.org/10.1515/jhsem-2014-0034 (text/html)
For access to full text, subscription to the journal or payment for the individual article is required.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:bpj:johsem:v:11:y:2014:i:4:p:533-554:n:4
Ordering information: This journal article can be ordered from
https://www.degruyter.com/journal/key/jhsem/html
DOI: 10.1515/jhsem-2014-0034
Access Statistics for this article
Journal of Homeland Security and Emergency Management is currently edited by Irmak Renda-Tanali
More articles in Journal of Homeland Security and Emergency Management from De Gruyter
Bibliographic data for series maintained by Peter Golla ().