scholarly journals Assessment of researches and case studies on Cloud Manufacturing: A bibliometric analysis

Author(s):  
Daniel Alexandre Morelli ◽  
Paulo Sergio de Arruda Ignacio

Abstract Cloud computing technology has been studied in the context of industry 4.0 as a tool applied to manufacturing services and resources. Such concept is widely known as Cloud Manufacturing. This paper aims at mapping the current state of academic researches on this field, promoting the understanding of trends, references and practical applications in real-life conditions. A bibliometric analysis was conducted using two different databases – Scopus and Web of Sciences – and VOSviewer’s text mining tools and techniques. From a sample of 1,420 papers, this study identified the countries which had the largest volume of publications, the main journals related to the subject, the most influent articles, and four clusters by keywords occurrences: (i) “Optimization of manufacturing processes”, (ii) “Collaborative networks of manufacturing resources and services”, (iii) “Industry 4.0 and cloud computing systems”, and (iv) “Data reliability and cyber-security”. Finally, this work selected and analyzed the 159 articles with applied case studies, in order to stratify and to understand the most common approaches within the four pre-established categories. This article can contribute to researchers and developers searching for successful practical applications in digitalization of manufacturing chains, as well as to those who are looking for gaps in the still unexplored fields of Cloud Manufacturing. Both the assessment and the categorization of the case studies about Cloud Manufacturing is a differential in this article.

2021 ◽  
Author(s):  
Daniel Alexandre Morelli ◽  
Paulo Sergio de Arruda Ignacio

Abstract Cloud computing technology has been studied in the context of industry 4.0 as a tool applied to manufacturing services and resources. Such concept is widely known as Cloud Manufacturing. This paper aims at mapping the current state of academic researches on this field, promoting the understanding of trends, references and practical applications in real-life conditions. A bibliometric analysis was conducted using two different databases – Scopus and Web of Sciences – and VOSviewer’s text mining tools and techniques. From a sample of 1,420 papers, this study identified the countries which had the largest volume of publications, the main journals related to the subject, the most influent articles, and four clusters by keywords occurrences: (i) “Optimization of manufacturing processes”, (ii) “Collaborative networks of manufacturing resources and services”, (iii) “Industry 4.0 and cloud computing systems”, and (iv) “Data reliability and cyber-security”. Finally, this work selected and analyzed the 159 articles with applied case studies, in order to stratify and to understand the most common approaches within the four pre-established categories. This article can contribute to researchers and developers searching for successful practical applications in digitalization of manufacturing chains, as well as to those who are looking for gaps in the still unexplored fields of Cloud Manufacturing. Both the assessment and the categorization of the case studies about Cloud Manufacturing are the differentials in this article.


Author(s):  
Meltem Mutluturk ◽  
Burcu Kor ◽  
Bilgin Metin

The development of information and communication technologies (ICT) has led to many innovative technologies. The integration of technologies such as the internet of things (IoT), cloud computing, and machine learning concepts have given rise to Industry 4.0. Fog and edge computing have stepped in to fill the areas where cloud computing is inadequate to ensure these systems work quickly and efficiently. The number of connected devices has brought about cybersecurity issues. This study reviewed the current literature regarding edge/fog-based cybersecurity in IoT to display the current state.


2018 ◽  
pp. 1235-1250 ◽  
Author(s):  
Ishaani Priyadarshini

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.


Author(s):  
István Mezgár ◽  
Gianfranco Pedone

Cloud computing (CC) is generating new computing and business models because of its service-based nature, which enables collaboration and data exchange at higher level, more flexibility with better efficiency and parallel decreasing costs. Manufacturing environments can also benefit from cloud technology and follow fast changes in market demands. In these new scenarios, interoperability has vital importance in the operation and in the interaction among industrial realizations of cyber-physical systems. The chapter introduces the different cloud models and the interoperability issues concerning connected enterprise information systems. Various standardization frameworks have been developed for homogeneous integration of IT models in industrial environments: the IIRA and the RAMI 4.0 are the best-known ones. The chapter introduces both architectures; their methodological approach to industrial integration efforts and how integration can be realized through the OPC Unified Architecture. Finally, the authors propose a basic conceptual model for cloud manufacturing.


Author(s):  
Valentina Villa ◽  
Bernardino Chiaia

Industry 4.0 is encouraging the introduction of pioneering technologies even in the construction industry. Along with the development of high technology, such as augmented reality, virtual reality, and cloud computing, the development of digital twin has been growing. This contribution aims to present the potential of digital twin in the construction field, suggesting a framework that outlines the many different possible applications in construction, with reference to school buildings. First, it summarizes the current overview of digital twin applications in building construction. Then it shows that significant steps that are being taken beyond the digital model, even if the implementation of the digital twin concept in its full meaning is still a long way off. The research is moving in this direction and the evolution of the current state of the art, combined with the experience gained in the industrial sector, will soon bring a new revolution in the construction industry.


Electronics ◽  
2018 ◽  
Vol 7 (11) ◽  
pp. 310 ◽  
Author(s):  
Hui Yin ◽  
Jixin Zhang ◽  
Yinqiao Xiong ◽  
Xiaofeng Huang ◽  
Tiantian Deng

Clustering is a fundamental and critical data mining branch that has been widely used in practical applications such as user purchase model analysis, image color segmentation, outlier detection, and so on. With the increasing popularity of cloud computing, more and more encrypted data are converging to cloud computing platforms for enjoying the revolutionary advantages of the cloud computing paradigm, as well as mitigating the deeply concerned data privacy issues. However, traditional data encryption makes existing clustering schemes no more effective, which greatly obstructs effective data utilization and frustrates the wide adoption of cloud computing. In this paper, we focus on solving the clustering problem over encrypted cloud data. In particular, we propose a privacy-preserving k-means clustering technology over encrypted multi-dimensional cloud data by leveraging the scalar-product-preserving encryption primitive, called PPK-means. The proposed technique is able to achieve efficient multi-dimensional data clustering as well to preserve the confidentiality of the outsourced cloud data. To the best of our knowledge, our work is the first to explore the privacy-preserving multi-dimensional data clustering in the cloud computing environment. Extensive experiments in simulation data-sets and real-life data-sets demonstrate that our proposed PPK-means is secure, efficient, and practical.


Author(s):  
Ishaani Priyadarshini

With technology flourishing at a rapid rate, humans have been able to achieve considerable heights of success. Accomplishment of tasks nowadays is either a click away or a command away in most of the technological arenas. One such realm of technology is that of Robotics which has been there for almost a century and continues advancing day by day. The evolution of robotics has ranged from the basic remote controlled systems to humanoid robots. With applications as well as accuracy increasing for every new system implemented, security risks too have been making their way into the new invention. Since different robots have been created for different purposes in different fields like the defense, household, medical or the space, protecting systems against their exploitation is of utmost importance as these fields incorporate sensitive as well as intricate tasks. This chapter focuses on the security aspects of Robotics. The necessity of Cyber security in Robotics has been explored by taking different kinds of robots used in different fields. The current state of Robotics is vulnerable to many risks and several case studies have been highlighted to support the need of securing Robotics by identifying several risks to which it is vulnerable. Apart from that mitigation strategies have been discussed to secure the domain of Robotics. An attack comparison has been made for three robots in analyzing them against the vulnerabilities faced by them.


2022 ◽  
pp. 25-44
Author(s):  
Ali Hussain ◽  
Miss Laiha Mat Kiah

Cloud content hosting and redistribution is enabling convenient and easy access to online content thereby accelerating the adoption and penetration of internet in past two decades. The current Industry 4.0 revolution and adoption and acceleration efforts are leveraging cloud computing as a means to store, retrieve, and share data. This makes the internet a relatively vulnerable to content abuse and increase the demand of clear consent before data consumption and redistribution. The growth of cloud computing and management technologies is penetrating in the market, and digital rights management (DRM) practices are needed for better and ethically safe online space. This chapter talks about state-of-the-art DRM paradigms being proposed in the literature and critically discusses their technical performance, flexibility, and immutability challenges. This chapter will clarify internet governance implementation roadmap for Industry 4.0 revolution by critically analyzing the cloud technology stack and ethical features by advocating Cloud DRM.


Author(s):  
István Mezgár ◽  
Gianfranco Pedone

Cloud computing (CC) is generating new computing and business models because of its service-based nature, which enables collaboration and data exchange at higher level, more flexibility with better efficiency and parallel decreasing costs. Manufacturing environments can also benefit from cloud technology and follow fast changes in market demands. In these new scenarios, interoperability has vital importance in the operation and in the interaction among industrial realizations of cyber-physical systems. The chapter introduces the different cloud models and the interoperability issues concerning connected enterprise information systems. Various standardization frameworks have been developed for homogeneous integration of IT models in industrial environments: the IIRA and the RAMI 4.0 are the best-known ones. The chapter introduces both architectures; their methodological approach to industrial integration efforts and how integration can be realized through the OPC Unified Architecture. Finally, the authors propose a basic conceptual model for cloud manufacturing.


Sign in / Sign up

Export Citation Format

Share Document