{"title":"工业4.0环境中的安全性和可配置存储系统:系统文献研究","authors":"R. May","doi":"10.52825/ocp.v2i.149","DOIUrl":null,"url":null,"abstract":"An increasing amount of Industry 4.0 data storages is highly configurable. As each variant includes individual features and interactions, ensuring data security becomes increasingly challenging. However, we are missing an analysis of research on security and configurable storages in Industry 4.0, especially those based on product-line engineering. To address this gap, we conducted a literature study covering relevant state-of-the-art publications (2013–2022). Overall, security for configurable systems seems under-explored. We highlighted that security standards and concrete mitigations techniques are usually not considered. In addition, we are missing an analysis of configurable storage and software systems in concert to identify threats, risks, and vulnerabilities caused by variability.","PeriodicalId":89291,"journal":{"name":"The open conference proceedings journal","volume":"12 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security and Configurable Storage Systems in Industry 4.0 Environments: A Systematic Literature Study\",\"authors\":\"R. May\",\"doi\":\"10.52825/ocp.v2i.149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An increasing amount of Industry 4.0 data storages is highly configurable. As each variant includes individual features and interactions, ensuring data security becomes increasingly challenging. However, we are missing an analysis of research on security and configurable storages in Industry 4.0, especially those based on product-line engineering. To address this gap, we conducted a literature study covering relevant state-of-the-art publications (2013–2022). Overall, security for configurable systems seems under-explored. We highlighted that security standards and concrete mitigations techniques are usually not considered. In addition, we are missing an analysis of configurable storage and software systems in concert to identify threats, risks, and vulnerabilities caused by variability.\",\"PeriodicalId\":89291,\"journal\":{\"name\":\"The open conference proceedings journal\",\"volume\":\"12 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The open conference proceedings journal\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52825/ocp.v2i.149\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The open conference proceedings journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52825/ocp.v2i.149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Configurable Storage Systems in Industry 4.0 Environments: A Systematic Literature Study
An increasing amount of Industry 4.0 data storages is highly configurable. As each variant includes individual features and interactions, ensuring data security becomes increasingly challenging. However, we are missing an analysis of research on security and configurable storages in Industry 4.0, especially those based on product-line engineering. To address this gap, we conducted a literature study covering relevant state-of-the-art publications (2013–2022). Overall, security for configurable systems seems under-explored. We highlighted that security standards and concrete mitigations techniques are usually not considered. In addition, we are missing an analysis of configurable storage and software systems in concert to identify threats, risks, and vulnerabilities caused by variability.