Journal of Systems Engineering and Electronics ›› 2024, Vol. 35 ›› Issue (5): 1177-1189.doi: 10.23919/JSEE.2024.000112

• SYSTEMS ENGINEERING • Previous Articles     Next Articles

Cloud edge integrated security architecture of new cloud manufacturing system

Longbo ZHAO(), Bohu LI(), Haitao YUAN()   

  • Received:2024-06-07 Online:2024-10-18 Published:2024-11-06
  • Contact: Longbo ZHAO E-mail:zlbbuaa@126.com;bohuli@moon.bjnet.edu.cn;yuan@buaa.edu.cn
  • About author:
    ZHAO Longbo was born in 1983. He received his B.S. degree from Beihang University, Beijing, China in 2005. He is currently pursuing his Ph.D. degree of automation science and electrical engineering in Beihang University. His research interests include cloud manufacturing, network security, and deep learning. E-mail: zlbbuaa@126.com

    LI Bohu was born in 1938. He graduated from Tsinghua University, Beijing, China, in 1961. His research interests include distributed simulation and cloud computing. He is a member of the Chinese Academy of Engineering. E-mail: bohuli@moon.bjnet.edu.cn

    YUAN Haitao was born in 1986. He received his Ph.D. degree in computer engineering from New Jersey Institute of Technology, Newark, New Jersey, USA, in 2020. He is currently an associate professor at the School of Automation Science and Electrical Engineering in Beihang University, Beijing, China. His research interests include cloud computing, edge computing, data centers, big data, machine learning, deep learning, and optimization algorithms. E-mail: yuan@buaa.edu.cn

Abstract:

With the rapid development of cloud manufacturing technology and the new generation of artificial intelligence technology, the new cloud manufacturing system (NCMS) built on the connotation of cloud manufacturing 3.0 presents a new business model of “Internet of everything, intelligent leading, data driving, shared services, cross-border integration, and universal innovation”. The network boundaries are becoming increasingly blurred, NCMS is facing security risks such as equipment unauthorized use, account theft, static and extensive access control policies, unauthorized access, supply chain attacks, sensitive data leaks, and industrial control vulnerability attacks. Traditional security architectures mainly use information security technology, which cannot meet the active security protection requirements of NCMS. In order to solve the above problems, this paper proposes an integrated cloud-edge-terminal security system architecture of NCMS. It adopts the zero trust concept and effectively integrates multiple security capabilities such as network, equipment, cloud computing environment, application, identity, and data. It adopts a new access control mode of “continuous verification + dynamic authorization”, classified access control mechanisms such as attribute-based access control, role-based access control, policy-based access control, and a new data security protection system based on blockchain, achieving “trustworthy subject identity, controllable access behavior, and effective protection of subject and object resources”. This architecture provides an active security protection method for NCMS in the digital transformation of large enterprises, and can effectively enhance network security protection capabilities and cope with increasingly severe network security situations.

Key words: new cloud manufacturing system (NCMS), integrated cloud-edge-terminal, security system architecture, zero trust