Читать книгу Security Issues and Privacy Concerns in Industry 4.0 Applications - Группа авторов - Страница 44

2.4 Cloud Security Impact on M2M Communication

Оглавление

For an authorized and secure communication channel an autonomous system is required [38], many parts of a system where a machine can communicate with others, such as (i) daemon to backend, (ii) service to service, (iii) IoT tools, and (iv) CLI (client to internet service). Establishing an authorized trust system between client [39], means authorization process attempts to build trust in the cloud environment by authorizing a client. In this case, a cloud client can simply utilize cloud applications, services, and securely processes cloud infrastructure. There is no need to typically authenticate like username/password, two-way authentication, social login, and others. However, provide protected, and secure machines communication, cloud client grant credentials, this credential has two pieces of information, one is the client ID, and the second is secret. This piece of information can request access for secured resources. The cloud-based services access mechanism of secure M2M communication are as under:

 The cloud client request to the authorizing server by sending the client ID and secret along with the audience, get access to cloud infrastructure (access distinct virtual machine);

 The authorized server validate request (if successful);

 Send response by giving the access token;

 By providing the access token, cloud users request secured resources from the server.

In this chapter, we have proposed our architecture on the basis of daemon to backend secure communication channel for machines.

Security Issues and Privacy Concerns in Industry 4.0 Applications

Подняться наверх