| 研究生: |
林東逸 Lin, Tung-Yi |
|---|---|
| 論文名稱: |
基於雲端運算之設備監控系統之管理與安全機制設計與實作 Design and Implementation of Management and Security Mechanisms for Cloud Computing based Equipment Monitoring Systems |
| 指導教授: |
鄭芳田
Cheng, Fan-Tien |
| 共同指導教授: |
洪敏雄
Hung, Min-Hsiung |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 製造資訊與系統研究所 Institute of Manufacturing Information and Systems |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 中文 |
| 論文頁數: | 57 |
| 中文關鍵詞: | 設備監控系統 、雲端運算 、系統安全防護架構 、雲端服務管理機制 |
| 外文關鍵詞: | Equipment Monitoring System, Cloud Computing, System Security Protection Architecture, Cloud Service Management Mechanism |
| 相關次數: | 點閱:123 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
當設備數量龐大時,傳統以網際網路為基礎的設備監控系統即可能面臨計算與儲存能力不足的問題,降低系統的運作效能。隨著資訊與網路科技的快速發展,雲端運算已成為網際網路運用的新趨勢。企業若採用雲端運算技術來建置設備監控系統,將可隨需動態地調升或降低所需的計算與儲存資源,且僅須依用多少付多少的方式付費,免除自行建置與維護資訊基礎建設與硬體的昂貴成本,使得系統維運成本降至最低,進而有效增加企業的商業利益。然而,要能成功推廣雲端化系統,必需提供有效的系統與資料保護措施。目前已經有很多文獻,探討一般雲端環境中不同的安全問題,並提出解決方法。但是,並沒有文獻探討雲端化設備監控系統及其安全問題。因此,本論文將提出一個雲端化的設備監控系統,並探討其各項管理與安全需求,然後據以發展符合需求之系統安全防護架構與雲端服務管理機制,以確保本機台監控系統能於雲端順利且安全地運作。最後,本論文利用各項實驗測試數據,展示本論文所提之系統安全防護架構之效能。本論文之研究成果可以作為發展雲端化設備監控系統之有用參考。
Once the number of equipment becomes large, the traditional Internet-based equipment monitoring system (EMS) may encounter the problem of computing and storage capability shortage, thereby reducing the system performance. With the rapid development of information and network technology, cloud computing has become a new trend of Internet applications. If enterprises adopt cloud computing technologies to construct EMSs, they can dynamically increase or decrease the required computing and storage resources on demand and pay by use, without needing the expensive costs of creating and maintaining the information infrastructure and hardware themselves. This approach can make the system’s operational costs to the lowest and thus effectively increase the business benefits. However, to successfully promote the cloud systems, it is necessary to provide effective system and data protection measures. Currently, there has been a lot of literature to explore different security problems in general cloud environments and propose solutions. However, there is no literature to investigate the cloud-based EMS and its associated security problems. Thus, this thesis presents a cloud-based EMS and studies its management and security needs. Accordingly, this thesis develops a system security protection architecture and a cloud service management mechanism to ensure that the EMS can operate smoothly and safely in the cloud. Finally, several experimental test data are used to demonstrate the effectiveness and performance of the proposed system security protection architecture. The research results of this thesis can a useful reference for developing cloud-based EMSs.
[1] Y.-C. Su, F.-T. Cheng, M.-H. Hung, and H.-C. Huang, “Intelligent Prognostics System Design and Implementation,” IEEE Transactions on Semiconductor Manufacuring, Vol. 19, No. 2, pp. 195-207, May 2006.
[2] R. Chakraborty, S. Ramireddy, T.S. Raghu, and H.R. Rao, “The Information Assurance Practice of Cloud Computing Vendors,” IEEE Computer Magazine, Vol. 12, No. 4, pp. 29-37, March 2010.
[3] S. Zhang, S. Zhang, X. Chen, and S. Wu, “Analysis and Research of Cloud Computing System Instance,” in Proc. of the Second International Conference on Future Networks ( ICFN 2010), p.88-92, Jan. 2010.
[4] IDC Web Site. URL: http://www.idc.com/
[5] L.M. Kaufman, “Can Public Cloud Security Meet its Unique Challenge,” IEEE Security & Privacy, Vol. 8, No. 4, pp. 55-57, July 2010.
[6] P. Hofmann and D. Woods, “Cloud Computing: The Limits of Public Clouds for Business Application,” IEEE Computer Magnize, Vol. 14, No. 6, pp. 90-93, Nov. 2010.
[7] A.Chuvakin and G. Peterson, “How to Do Application Logging Right,” IEEE Security & Privacy , Vol. 8, No. 4, pp. 82-85, July 2010.
[8] G. Peterson, “Don’t Trust. And Verify: A Security Architecture Stack for the Cloud,” IEEE Security & Privacy, Vol. 8, No. 5, pp. 83-86, Oct. 2010.
[9] F. Rocha, M. Correia, and S.Abreu, “Confidentiality and Privacy in the Final Frontier: Inside the Clouds,” IEEE Computer Magazine, Digital Object Identifier: 10.1109/MC.2011.223, 2011. (In Press)
[10] H. Takabi, J.B.D. Joshi, and G. Ahn, “Security and Privacy Challenge in Cloud Computing Environment,” IEEE Computer Magazine, Vol. 8, No. 6, pp. 27-31, Dec. 2010.
[11] J. Harauz, L. M. Kaufman, and B. Potter, “Data Security in the World Computing,” IEEE Security & Privacy, Vol. 7, No. 10, pp. 64-64, July-Auguest 2009.
[12] Q. Wang, C. Wang, K. Ren, W.-J. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Computer Society, Vol. 22, No. 5, pp. 847-859, March 2011.
[13] 小朱的技術隨手寫網站. URL: http://www.dotblogs.com.tw/regionbbs/Default.aspx
[14] M. Zhou, R. Zhang, W. Xie, W. Qian, and A. Zhou, “Security and Privacy in Cloud Computing: A Survey,” IEEE Computer Magazine, Vol. 22, No. 5, pp. 847-859, March 2011.
[15] S. Ramgovind, M.M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,” Information Security for South Africa, pp. 847-859, Auguest 2010.
[16] B. Sotomayor, R.S. Montero, I.M. Llorente, and I. Foster, “Virtual Infrastructure Management in Private and Hybrid Cloud,” IEEE Computer Magazine, Vol. 13, No. 5, pp. 14-22, Sept. 2011.
[17] G. Lin, D. Fu, J. Zhu, and G. Dasmalchi, “Cloud Computing: IT as a Service,” IEEE Computer Magazine, Vol. 11, No. 2, pp.10-13, April 2009.
[18] M-H. Hung, R.-W. Ho, and F.-T. Cheng, “An e-Diagnostics Framework with Security Considerations for Semiconductor Factories,” in Proc. of 2004 Semiconductor Manufacturing Technology Workshop, pp. 37-40, Sept. 2004.
[19] C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Computer Magazine, Digital Object Identifier: 10.1109/TSC.2011.24, 2011. (In Press)
[20] Amazon Web Services Web Site. URL: http://aws.amazon.com/
[21] Microsoft Windows Azure Web Site. URL:
http://www.microsoft.com/windowsazure/features/compute/
[22] Y.-T. Huang and F.-T. Cheng, “Automatic Data Quality Evaluation For the AVM System,” IEEE Transactions on Semiconductor Manufacuring, Vol. 24, No. 3, pp. 445-454, August 2011.
[23] F.-T. Cheng; J.Y.-C. Chang, H.-C. Huang, C.-A. Kao, Y.-L. Chen, and J.-L. Peng, “Benefit Model of Virtual Metrology and Integrating AVM Into MES,” IEEE Transactions on Semiconductor Manufacturing, Vol. 24, Issue 2, pp. 261-272, May 2011.
[24] C. Wang, Q. Wang, K. Ren, and W. Lou, “ Establishing Trust in Cloud Computing,” IEEE Computer Magazine, Vol. 12, No. 5, pp. 20-27, Sept. 2010.
[25] 小朱,「Windows Azure教戰手扎」,基峯資訊出版,台北,2010年9月。
[26] 李智樺,「Windows Azure雲端運算開發實戰」,悅知文化出版社,台北,2010年7月。
[27] SEMI (Semiconductor Equipment and Material International). http://www.semi.org/
[28] M.-H. Hung, F.-T. Cheng, and S.-C. Yeh, “Development of a Web-Services-Based e-Diagnostics Framework for Semiconductor Manufacturing Industry,” IEEE Transactions on Semiconductor Manufacturing, Vol. 17, No. 5, pp. 122-135, Feb. 2005.
校內:2013-09-07公開