Security Issues and Privacy Concerns in Industry 4.0 Applications

Здесь есть возможность читать онлайн «Security Issues and Privacy Concerns in Industry 4.0 Applications» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Security Issues and Privacy Concerns in Industry 4.0 Applications: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Security Issues and Privacy Concerns in Industry 4.0 Applications»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

The scope of
is to envision the need for security in Industry 4.0 applications and the research opportunities for the future. This book discusses the security issues in the Industry 4.0 applications for research development. It will also enable the reader to develop solutions for the security threats and attacks that prevail in the industry. The chapters will be framed on par with advancements in the industry in the area of Industry 4.0 with its applications in additive manufacturing, cloud computing, IoT (Internet of Things), and many others. This book helps a researcher and an industrial specialist to reflect on the latest trend and the need for technological change in Industry 4.0.
Smart water management using IoT, cloud security issues with network forensics, regional language recognition for industry 4.0, IoT based health care management system, artificial intelligence for fake profile detection, and packet drop detection in agriculture-based IoT are covered in this outstanding new volume. Leading innovations such as smart drone for railway track cleaning, everyday life-supporting blockchain and big data, effective prediction using machine learning, classification of the dog breed based on CNN, load balancing using the SPE approach and cyber culture impact on media consumers are also addressed.
Whether a reference for the veteran engineer or an introduction to the technologies covered in the book for the student, this is a must-have for any library.

Security Issues and Privacy Concerns in Industry 4.0 Applications — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Security Issues and Privacy Concerns in Industry 4.0 Applications», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

2.1.3.1 Infrastructure-as-a-Service (IaaS)

Infrastructure-as-a-Service (IaaS) is one of the types of cloud service models, the computing infrastructure that manages the overall cloud services over the internet. On-demand quickly scales up and down infrastructure services [21], working on the mechanism like a pay-as-you-go platform where cloud users pay only for what they use. This avoids the expense of buying additional physical IT-infrastructure and managed complex server and other data center resources. In a cloud environment, IaaS offers resources as an individual service component, cloud service provider [22] manages the IT-resources in a virtualized environment, and the users can focus only on installation, configuration, and software maintenance. The cloud service providers enable users to elastically utilize virtual server and storage resources by a pay-per-use method, forming networks that tie them all together [23]. By renting IaaS from a cloud service provider, essentially, cloud users not only have on-demand hardware services but also provisioning software services that automate it.

2.1.3.2 Challenges of Cloud Security in Fourth Industrial Revolution

The IT revolution has brought an important transformation in the industrial manufacturing processes with high impact [27]; this envelopment promotes the latest technology trends such as cloud-based systems, Internet of Things (IoT), Big Data Analysis, and others in the fourth industrial revolution. However, new innovative solutions carry challenges and limitations, such as unexpected risk, security vulnerabilities, infringing privacy, and many more [24]. Increased reliance on innovations may gain a competitive advantage [25], but on a certain note, security issues have been one of the most insignificant challengeable aspects for conducting successful business communication and transaction between machines on the cloud platform [26]. This chapter, highlighting the reflections and emphasizing the security issues and limitations of industry 4.0, raises awareness towards good security practice within the fourth industrial revolution:

Inadequate Access Management

Multi-tenancy

Data Loss

Data Breaches

Infringing Privacy

Cost of Transferring

The chapter is structured as follows. The next section presents the generic model architecture for network forensics and cloud security issue in the industry 4.0 application. Section 2.3discusses the model implementation, implementation platform used, such as Open Nebula and Network Miner for analysis of security threats. Section 2.4focuses on the machine-to-machine communication impact on industrial 4.0 applications, and also describes an application scenario of cloud computing security in the domain of industry 4.0. Finally, we conclude our chapter in Section 2.5.

2.2 Generic Model Architecture

This chapter considers cloud-based IT infrastructure in which a cloud service provider (CSP) executes virtual machine (VM) [28], cloud users get full control over the services like software, running on the VM, and these VMs are managed by the virtual machine monitor (VMM) [28]. CSP manages the physical machine with the help of hypervisor and provides resources on-demand to the cloud users [29]; the users have no right to access them directly. Multiple cloud users can share the same infrastructure or IT resources. In the event of malicious attacks, users’ virtual machines can easily be compromised.

The proposed architecture performs as the autonomous authorized third party of network forensics investigation, which forensically investigates cloud-based virtual resources (such as security threats as well as data acquisition, multi-tenant, and infringing privacy) with the support provided by CSP. The factor which we assume here is that we can only trust the cloud provider and the IT infrastructure, whereas cloud users’ VMs are untrusted. However, the behavior of a virtual machine needs to be modified for secure M2M communication; a malicious attacker manipulates data (gains access to the user’s virtual machine). Therefore, we do not collect forensics data while the process is running on the user virtual machine rather than apply forensics investigation directly. The virtualized cloud infrastructure guarantees virtual machine isolation [28]; it is completely clear that the attacker does not access other VMs itself or VMM running on the same physical host.

Several types of research have been published that relate the situation of the trust in the cloud infrastructure, justified through a technical mechanism. Susan F. Crowell says [30] regarding the VMs trust, for virtual machine trust isolation in an IaaS cloud environment, embodiments of the invention monitor level of suspicious activities on the particular virtual machine using embedded node agents. Crowell addresses the critical problems of VMs over the cloud, for example, to create a trustworthy cloud infrastructure by designing a security audit system: verify clients’ data confidentiality and integrity [32], measure virtual machines root-of-trust [31], enforce by a technical mechanism not only by Service Level Agreements (SLAs) contracts.

In this chapter, we present a model for network forensics to investigate security threats (malicious attacks) when machines communicate with each other in a cloud environment. The forensics process model (shown in Figure 2.1) depends on five process-layers that interact with the control manager, and the adaptation of the process-layers from the flow of the process of the NIST network forensics model [33]. The process-layers perform independent tasks regarding the incident investigation of cloud computing security issues. The investigational tasks execute a parallel and distributed manner in a multitenant environment. We already discussed the multitenancy in the above section 2.1.3.2.

In this section, we describe the purpose of an individual process-layer; the first process-layer is the collection of data or data collection layer, in which overall data is captured. The control manager interacts with the data collection and decides when to start or stop the data capturing process. The data collection coordinates with the migration of VM in the cloud environment and the control manager simultaneously collects data traffic of VM migration. On the next process-layer is the separation or filtration; the actual task of the process-layer is to filter captured data by cloud user. The main advantage is that each set of data maintains data accordingly to the single cloud users. Additionally, separation can compress user-specific collected data; reduce the size, and filtering forensically network data traffic.

Figure 21 Network forensics process model for cloud investigation In the - фото 7

Figure 2.1 Network forensics process model for cloud investigation.

In the third process-layer, the accumulator or aggregate layer deals with the adds data from multiple sources of a single cloud user. The cloud user utilizes resources from distinct physical locations such as load balancing then the accumulator collects all data from multiple source location. Furthermore, this layer helps to collaborate with all the network data into a single set. The fourth layer is data analysis, analysis of the preprocessed data set for the detailed investigation. The control manager configures the complete transmission from data capture to the accumulation layer, analysis process-layer is run as a cloud service in the cloud environment. The last process-layer is documentation, which presents the analysis results and consequence to tackle the entire security threats.

The proposed forensics network architecture for secure machine communication translates the conceptual blocks of separate services as described in Table 2.1.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Представляем Вашему вниманию похожие книги на «Security Issues and Privacy Concerns in Industry 4.0 Applications» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications»

Обсуждение, отзывы о книге «Security Issues and Privacy Concerns in Industry 4.0 Applications» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x