The cloud client request to the authorizing server by sending the client ID and secret along with the audience, get access to cloud infrastructure (access distinct virtual machine);
The authorized server validate request (if successful);
Send response by giving the access token;
By providing the access token, cloud users request secured resources from the server.
In this chapter, we have proposed our architecture on the basis of daemon to backend secure communication channel for machines.
2.4.1 Cloud Computing Security Application in the Fourth Industrial Revolution (4.0)
The fourth industrial revolution is the transformation of industrial and manufacturing products, introducing the new stages in the organization, valuing creation processes, and controlling the organizational value chain. Cloud computing (CC) is one of the biggest aspects to boost manufacturing products. CC brought about a remarkable overhaul of the enterprise’s phenomena, a significant investment to establish IT infrastructure. In almost every business, CC benefits in many ways. The most prominent features are the flexibility to pay for resources, 24/7 availability, on-demand means resource elasticity, based on need only. Moreover, when it comes to Infrastructure-as-a-Service (IaaS), an existing infrastructure on the pay-as-you-go platform, an obvious choice for enterprises saving on the cost of investment to acquire, control, available, manage, and maintain server all the time. Infrastructure becomes a commodity; the majority of businesses use the services of the cloud to enhance the manufacturing productions, whether or not they know about the cloud.
To show the advantage of cloud computing in industry 4.0, we have adopted the real-world scenario to make the concept clear. Consider your business has multiple locations, you might have trouble connecting the team, and trying to collaborate on the same project, because of the distance between them. The same issue arises when your employees work remotely. The thing is how we can tackle the situation; cloud collaboration tools allow your people to access the same project and connect several people remotely in a single go. Accessing the real-time project reduces time and money and has many advantages: the ability to upload documents and send via email remotely; decreasing the time for updating; easy to monitor and get updates on the project completion; enhancing communication, reducing cost, and increasing productivity.
Consider another aspect: your company rapidly grows, but you do not have a way to scale your infrastructure. With the rapid enhancement of organizational production growth, you want to hire employees, but you do not have an idea of when and how large it will become. When you purchase convectional internal infrastructure, and potentially you want employees to maintain, that will increase the cost of purchases and hiring employees. In this situation, the cloud is the better solution; no matter how quickly you grow, cloud service provider simply provides scale on-demand IT infrastructure as per need and pay for what you used. The prominent feature in this scenario is protected machine communication; it is a trustable remote service; it provides a secure channel to access IT resources; you can rely on it.
2.5 Conclusion
The rapid growth of cloud computing, especially the use of cloud-based IT infrastructure in recent years, creates new challenges for network investigators. Essential means for remote prevention in the cloud-based industry 4.0 environment, tackle the security threats between machine communications that enhance the need of forensics in the cloud. In a cloud environment, it is hard to determine the location of virtual resources, which may change even a certain time frame. Network forensics needs to be limited in a multitenant environment, the reason behind the specific system under observation. We have analyzed the critical problems with a specific concentration on forensics for the cloud service models, and proposed a generic model for secure communication between M2M in a cloud-based environment. For the sake of prevention, we developed a system architecture and integrated implementation of network forensics modules that identify security challenges and its impact on the fourth industrial revolution application, with the support of the OpenNebula cloud management infrastructure. The security issues that our method solved are: First, facilitate cloud users by providing a mechanism of remote network forensics for data acquisition, processes, and monitor means overall control the physical location of virtual resources independently. Second, another limitation in cloud computing that is infringing privacy and security; the proposed approach ensures the separation of cloud users in a multitenant environment. The last is to remove the cost of transferring network collected data, impalement external investigation tools that analyze and control internal cloud services by network investigators. This contribution eliminates the disadvantages of traditional cloud-based services that run locally on the internal infrastructure of the industry.
References
1. Sun, Panjun. “Research on cloud computing service based on trust access control.” International Journal of Engineering Business Management 12 (2020): 1847979019897444.
2. Siddiqui, Shadab, Manuj Darbari, and Diwakar Yagyasen. “A comprehensive study of challenges and issues in cloud computing.” In Soft Computing and Signal Processing, pp. 325-344. Springer, Singapore, 2019.
3. Chong, Ngo Yang. “Cloud Computing Challenges in a General Perspective.” Journal of Computing and Management Studies 3 (2019).
4. Meghanathan, Natarajan, Sumanth Reddy Allam, and Loretta A. Moore. “Tools and techniques for network forensics.” arXiv preprint arXiv:1004.0570 (2010).
5. Garfinkel, Simson. “Network forensics: Tapping the internet.” IEEE Internet Computing 6 (2002): 60-66.
6. Sikos, Leslie F. “Packet analysis for network forensics: a comprehensive survey.” Forensic Science International: Digital Investigation 32 (2020): 200892.
7. Frank, Alejandro Germán, Lucas Santos Dalenogare, and Néstor Fabián Ayala. “Industry 4.0 technologies: Implementation patterns in manufacturing companies.” International Journal of Production Economics 210 (2019): 15-26.
8. Bassi, Lorenzo. “Industry 4.0: Hope, hype or revolution?.” In 2017 IEEE 3rd International Forum on Research and Technologies for Society and Industry (RTSI), pp. 1-6. IEEE, 2017.
9. Lasi, Heiner, Peter Fettke, Hans-Georg Kemper, Thomas Feld, and Michael Hoffmann. “Industry 4.0.” Business & Information Systems Engineering 6, no. 4 (2014): 239-242.
10. Vaidya, Saurabh, Prashant Ambad, and Santosh Bhosle. “Industry 4.0–a glimpse.” Procedia Manufacturing 20 (2018): 233-238.
11. Agolla, Joseph Evans. “Human capital in the smart manufacturing and industry 4.0 revolution.” Digital Transformation in Smart Manufacturing (2018): 41-58.
12. Bahrin, Mohd Aiman Kamarul, Mohd Fauzi Othman, Nor Hayati Nor Azli, and Muhamad Farihin Talib. “Industry 4.0: A review on industrial automation and robotic.” Jurnal Teknologi 78, no. 6-13 (2016).
13. Varghese, Anitha, and Deepaknath Tandur. “Wireless requirements and challenges in Industry 4.0.” In 2014 International Conference on Contemporary Computing and Informatics (IC3I), pp. 634-638. IEEE, 2014.
14. Lee, Jay, Hossein Davari, Jaskaran Singh, and Vibhor Pandhare. “Industrial Artificial Intelligence for industry 4.0-based manufacturing systems.” Manufacturing Letters 18 (2018): 20-23.
15. Lo, Anthony, Yee Wei Law, and Martin Jacobsson. “A cellular-centric service architecture for machine-to-machine (M2M) communications.” IEEE wireless communications 20, no. 5 (2013): 143-151.
16. Wu, Geng, Shilpa Talwar, Kerstin Johnsson, Nageen Himayat, and Kevin D. Johnson. “M2M: From mobile to embedded internet.” IEEE Communications Magazine 49, no.