Скачать книгу

mechanism of secure M2M communication are as under:

       The cloud client request to the authorizing server by sending the client ID and secret along with the audience, get access to cloud infrastructure (access distinct virtual machine);

       The authorized server validate request (if successful);

       Send response by giving the access token;

       By providing the access token, cloud users request secured resources from the server.

      In this chapter, we have proposed our architecture on the basis of daemon to backend secure communication channel for machines.

      2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0)

      The fourth industrial revolution is the transformation of industrial and manufacturing products, introducing the new stages in the organization, valuing creation processes, and controlling the organizational value chain. Cloud computing (CC) is one of the biggest aspects to boost manufacturing products. CC brought about a remarkable overhaul of the enterprise’s phenomena, a significant investment to establish IT infrastructure. In almost every business, CC benefits in many ways. The most prominent features are the flexibility to pay for resources, 24/7 availability, on-demand means resource elasticity, based on need only. Moreover, when it comes to Infrastructure-as-a-Service (IaaS), an existing infrastructure on the pay-as-you-go platform, an obvious choice for enterprises saving on the cost of investment to acquire, control, available, manage, and maintain server all the time. Infrastructure becomes a commodity; the majority of businesses use the services of the cloud to enhance the manufacturing productions, whether or not they know about the cloud.

      Consider another aspect: your company rapidly grows, but you do not have a way to scale your infrastructure. With the rapid enhancement of organizational production growth, you want to hire employees, but you do not have an idea of when and how large it will become. When you purchase convectional internal infrastructure, and potentially you want employees to maintain, that will increase the cost of purchases and hiring employees. In this situation, the cloud is the better solution; no matter how quickly you grow, cloud service provider simply provides scale on-demand IT infrastructure as per need and pay for what you used. The prominent feature in this scenario is protected machine communication; it is a trustable remote service; it provides a secure channel to access IT resources; you can rely on it.

      1. Sun, Panjun. “Research on cloud computing service based on trust access control.” International Journal of Engineering Business Management 12 (2020): 1847979019897444.

      2. Siddiqui, Shadab, Manuj Darbari, and Diwakar Yagyasen. “A comprehensive study of challenges and issues in cloud computing.” In Soft Computing and Signal Processing, pp. 325-344. Springer, Singapore, 2019.

      3. Chong, Ngo Yang. “Cloud Computing Challenges in a General Perspective.” Journal of Computing and Management Studies 3 (2019).

      4. Meghanathan, Natarajan, Sumanth Reddy Allam, and Loretta A. Moore. “Tools and techniques for network forensics.” arXiv preprint arXiv:1004.0570 (2010).

      5. Garfinkel, Simson. “Network forensics: Tapping the internet.” IEEE Internet Computing 6 (2002): 60-66.

      6. Sikos, Leslie F. “Packet analysis for network forensics: a comprehensive survey.” Forensic Science International: Digital Investigation 32 (2020): 200892.

      7. Frank, Alejandro Germán, Lucas Santos Dalenogare, and Néstor Fabián Ayala. “Industry 4.0 technologies: Implementation patterns in manufacturing companies.” International Journal of Production Economics 210 (2019): 15-26.

      8. Bassi, Lorenzo. “Industry 4.0: Hope, hype or revolution?.” In 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI), pp. 1-6. IEEE, 2017.

      9. Lasi, Heiner, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. “Industry 4.0.” Business & Information Systems Engineering 6, no. 4 (2014): 239-242.

      10. Vaidya, Saurabh, Prashant Ambad, and Santosh Bhosle. “Industry 4.0–a glimpse.” Procedia Manufacturing 20 (2018): 233-238.

      11. Agolla, Joseph Evans. “Human capital in the smart manufacturing and industry 4.0 revolution.” Digital Transformation in Smart Manufacturing (2018): 41-58.

      12. Bahrin, Mohd Aiman Kamarul, Mohd Fauzi Othman, Nor Hayati Nor Azli, and Muhamad Farihin Talib. “Industry 4.0: A review on industrial automation and robotic.” Jurnal Teknologi 78, no. 6-13 (2016).

      13. Varghese, Anitha, and Deepaknath Tandur. “Wireless requirements and challenges in Industry 4.0.” In 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 634-638. IEEE, 2014.

      14. Lee, Jay, Hossein Davari, Jaskaran Singh, and Vibhor Pandhare. “Industrial Artificial Intelligence for industry 4.0-based manufacturing systems.” Manufacturing Letters 18 (2018): 20-23.

      15. Lo, Anthony, Yee Wei Law, and Martin Jacobsson. “A cellular-centric service architecture for machine-to-machine (M2M) communications.” IEEE wireless communications 20, no. 5 (2013): 143-151.

      16. Wu, Geng, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson. “M2M: From mobile to embedded internet.” IEEE Communications Magazine 49, no.

Скачать книгу