Explore chapters and articles related to this topic
Big Data Technologies–Supported Generic Visualization System in an Enterprise Cyber-Physical Environment
Published in Yassine Maleh, Mohammad Shojafar, Ashraf Darwish, Abdelkrim Haqiq, Cybersecurity and Privacy in Cyber-Physical Systems, 2019
Ferda Özdemir Sönmez, Banu Günel
The security of the environment running the proposed design is the first concern. The proposed system is designed to be used in an enterprise environment which would have a firewall, an intrusion prevention system, and network security controls; these protections may be supported by server-level hardening mechanisms. The second concern for the cloud IoT system is the genuineness of the cloud platform, which does not apply to this design. The third concern is the authentication of the web application, which will be fulfilled using a standard way to implement user authentication, Spring Security (Mularien 2010). The fourth concern is the authentication of the devices to the application. In a standard Kafka installation, any user can write any messages to any topic; however, in a more advanced setup, Kafka provides authentication of Kafka clients via Secure Sockets Layer (SSL) or Simple Authentication and Security Layer (SASL). The fifth concern is the security of the authentication data stored in the cloud, which does not apply to the current solution. However, this time the security of data stored in the relational database and the Hadoop is the concern for which the system will rely on the protections of the underlying technologies. Each Hadoop component has its authentication, authorization, encryption of data at rest, and encryption of data in transit (Sharma and Navdeti 2014). Similarly, contemporary database systems have advanced protections systems (Basharat et al. 2012). The sixth concern is a secure gateway between various platforms in the distributed system. Although not included in the proposed design, Hadoop has multiple gateway structures. The seventh concern is secure messaging between devices and the application. In the proposed design, the devices/applications are not expected to send direct messages to the application, but Kafka file connectors are in charge of reading device/application log files. The eighth concern is preventing the data leakage between devices, and the ninth concern is to prevent the data leakage between devices and the application. The devices are not expected to communicate as a part of the proposed solution; as mentioned earlier, all issues related to the communication of devices and application depend on Kafka security.
Dependable workflow management system for smart farms
Published in Connection Science, 2022
Catalin Negru, George Musat, Madalin Colezea, Constantin Anghel, Alexandru Dumitrascu, Florin Pop, Carmen De Maio, Aniello Castiglione
In addition, many modules are used within the platform which helps us to easily implement some of the features. The Spring Security Framework deals with platform security, access control and session management for users. We use Social Spring module to allow users to authenticate using third party platforms. For data access, we use Spring Data JPA that offers integrated CRUD (Create, Read, Update and Delete) methods. We can also create custom queries using an SQL-like language named JPQL (Java Persistence Query Language).