{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T22:40:57Z","timestamp":1764715257155,"version":"build-2065373602"},"reference-count":57,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T00:00:00Z","timestamp":1725235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci"],"abstract":"<jats:p>Cloud manufacturing allows multiple manufacturers to contribute their manufacturing facilities and assets for monitoring, operating, and controlling common processes of manufacturing and services controlled through cloud computing. The modern framework is driven by the seamless integration of technologies evolved under Industry 4.0. The entire digitalized manufacturing systems operate through the Internet, and hence, cybersecurity threats have become a problem area for manufacturing companies. The impacts can be very serious because cyber-attacks can penetrate operations carried out in the physical infrastructure, causing explosions, crashes, collisions, and other incidents. This research is a thematic literature review of the deterrence to such attacks by protecting IoT devices by employing provenance blockchain and artificial intelligence. The literature review was conducted on four themes: cloud manufacturing design, cybersecurity risks to the IoT, provenance blockchains for IoT security, and artificial intelligence for IoT security. These four themes of the literature review were critically analyzed to visualize a framework in which provenance blockchain and artificial intelligence can be integrated to offer a more effective solution for protecting IoT devices used in cloud manufacturing from cybersecurity threats. The findings of this study can provide an informative framework.<\/jats:p>","DOI":"10.3390\/sci6030051","type":"journal-article","created":{"date-parts":[[2024,9,2]],"date-time":"2024-09-02T10:07:35Z","timestamp":1725271655000},"page":"51","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Fortifying Industry 4.0: Internet of Things Security in Cloud Manufacturing through Artificial Intelligence and Provenance Blockchain\u2014A Thematic Literature Review"],"prefix":"10.3390","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-2000-2170","authenticated-orcid":false,"given":"Mifta Ahmed","family":"Umer","sequence":"first","affiliation":[{"name":"School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa 18869, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8720-6295","authenticated-orcid":false,"given":"Elefelious Getachew","family":"Belay","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering, Addis Ababa Institute of Technology (AAiT), Addis Ababa University, Addis Ababa 18869, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2079-3234","authenticated-orcid":false,"given":"Luis Borges","family":"Gouveia","sequence":"additional","affiliation":[{"name":"Science and Technology Faculty, University Fernando Pessoa, 349 4249-004 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2024,9,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Ustundag, A., Cevikcan, E., Akdil, K.Y., Ustundag, A., and Cevikcan, E. (2018). Maturity and readiness model for industry 4.0 strategy. Industry 4.0: Managing the Digital Transformation, Springer International Publishing.","DOI":"10.1007\/978-3-319-57870-5"},{"key":"ref_2","unstructured":"Ustundag, A., Cevikcan, E., Ervural, B.C., and Ervural, B. (2018). Overview of cyber security in the industry 4.0 era. Industry 4.0: Managing the Digital Transformation, Springer International Publishing."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Salkin, C., Oner, M., Ustundag, A., and Cevikcan, E. (2018). A conceptual framework for Industry 4.0. Industry 4.0: Managing the Digital Transformation, Springer International Publishing.","DOI":"10.1007\/978-3-319-57870-5_1"},{"key":"ref_4","unstructured":"Sobers, R. (2022, March 04). Cybersecurity Statistics and Trends for 2022 Varonis. Available online: https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/."},{"key":"ref_5","unstructured":"Brooks, C. (2023, March 04). Cybersecurity in 2022\u2014A Fresh Look at Some Very Alarming Stats Forbes. Available online: https:\/\/www.forbes.com\/sites\/chuckbrooks\/2022\/01\/21\/cybersecurity-in-2022--a-fresh-look-at-some-very-alarming-stats\/?sh=53d0641b6b61."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1007\/s10669-015-9540-y","article-title":"Systems engineering framework for cyber physical security and resilience","volume":"35","author":"DiMase","year":"2015","journal-title":"Environ. Syst. Decis."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1007\/s13347-017-0279-x","article-title":"Fair, transparent, and accountable algorithmic decision-making processes","volume":"31","author":"Lepri","year":"2018","journal-title":"Philos. Technol."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Nwafor, E., Campbell, A., Hill, D., and Bloom, G. (2017, January 4\u20138). Towards a provenance collection framework for internet of things devices. Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), San Francisco, CA, USA.","DOI":"10.1109\/UIC-ATC.2017.8397531"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2053951719826856","DOI":"10.1177\/2053951719826856","article-title":"Beyond mystery: Putting algorithmic accountability in context","volume":"6","author":"Reddy","year":"2019","journal-title":"Big Data Soc."},{"key":"ref_10","unstructured":"Raj, P., and Deka, G. (2018). Blockchain Technology: Supply Chain Insights from ERP. Advances in Computers, Elsevier. Volume 111: Blockchain Technology: Platforms, Tools and Use Cases."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Terzi, S., Nizamas, A., Tzovaras, D., Zacharaki, A., Votis, K., Stamelos, I., and Ioannidis, D. (2019, January 28\u201330). Transforming the Supply-chain management and Industry Logistics with Blockchain Smart Contracts. Proceedings of the PCI \u201819, Nicosia, Cyprus.","DOI":"10.1145\/3368640.3368655"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Obaidat, M.A., Obeidat, S., Holst, J., Al Hayajneh, A., and Brown, J. (2020). A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures. Computers, 9.","DOI":"10.3390\/computers9020044"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Belguith, S., Laurent, M., Gehani, A., and Russello, G. (2020, January 8\u201310). Prov-Trust: Towards a trustworthy SGX-based data provenance system. Proceedings of the 17th International Joint Conference on e-Business and Telecommunications\u2014Volume 3: SECRYPT, Paris, France.","DOI":"10.5220\/0009889302250237"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Mahmood, Z. (2021). Perspectives of Blockchain in Cybersecurity: Applications and Future Developments. Industry Use Cases on Blockchain Technology Applications in IoT and the Financial Sector, IGI Global.","DOI":"10.4018\/978-1-7998-6650-3.ch001"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ramachandran, A., and Kantarcioglu, M. (2018, January 19\u201321). Smart provenance: A distributed, blockchain based data provenance system. Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, Tempe, AZ, USA.","DOI":"10.1145\/3176258.3176333"},{"key":"ref_16","unstructured":"Veisi, P. (2019). Visualizing Provenance in a Supply Chain Using Ethereum Blockchain. [Master\u2019s Thesis, Department of Computer Science, University of Saskatchewan]."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"94668","DOI":"10.1109\/ACCESS.2021.3089681","article-title":"Security Threats and Artificial Intelligence Based Countermeasures for Internet of Things Networks: A Comprehensive Survey","volume":"9","author":"Zaman","year":"2021","journal-title":"IEEE Access"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1414","DOI":"10.1002\/cpe.1679","article-title":"Secure SCADA Framework for the Protection of Energy Control Systems","volume":"23","author":"Alcaraz","year":"2011","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_19","unstructured":"Bailey, D., and Wright, E. (2003). Practical SCADA for Industry, Elsevier."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MPE.2008.931384","article-title":"Grid of the Future","volume":"7","author":"Ipakchi","year":"2009","journal-title":"IEEE Power Energy Mag."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Karnouskos, S., and Colombo, A.W. (2011, January 7\u201310). Architecting the next generation of service-based SCADA\/DCS system of systems. Proceedings of the IECON 2011\u201437th Annual Conference of the IEEE Industrial Electronics Society, Melbourne, VIC, Australia.","DOI":"10.1109\/IECON.2011.6119279"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Carlsson, O. (2017). Engineering of IoT Automation Systems. [Ph.D. Thesis, Lule\u2019a University of Technology].","DOI":"10.1201\/9781315367897-7"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"3613","DOI":"10.1007\/s00170-019-03398-7","article-title":"Cloud manufacturing: Challenges, recent advances, open research issues, and future trends","volume":"102","author":"Ghomi","year":"2019","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Phanden, R.K., Mathiyazhagan, K., Kumar, R., and Paulo Davim, J. (2021). Security in manufacturing systems in the age of industry 4.0: Pitfalls and possibilities in Advances in Industrial and Production Engineering, Springer International Publishing. Lecture Notes in Mechanical Engineering.","DOI":"10.1007\/978-981-33-4320-7"},{"key":"ref_25","first-page":"395","article-title":"Decentralised network architecture for cloud manufacturing","volume":"30","author":"Skulj","year":"2017","journal-title":"Int. J. Comput. Integr. Manuf."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"102217","DOI":"10.1016\/j.rcim.2021.102217","article-title":"Service-oriented industrial internet of things gateway for cloud manufacturing","volume":"73","author":"Liu","year":"2022","journal-title":"Robot. Comput. Integr. Manuf."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1108\/IMDS-12-2020-0726","article-title":"Cloud manufacturing architecture: A critical analysis of its development, characteristics and future agenda to support its adoption","volume":"121","author":"Lim","year":"2021","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"4854","DOI":"10.1080\/00207543.2018.1449978","article-title":"Scheduling in cloud manufacturing: State-of-the-art and research challenges","volume":"57","author":"Liu","year":"2019","journal-title":"Int. J. Prod. Res."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1461","DOI":"10.1007\/s00170-021-08436-x","article-title":"From IoT-based cloud manufacturing approach to intelligent additive manufacturing: Industrial Internet of Things\u2014An overview","volume":"119","author":"Haghnegahdar","year":"2022","journal-title":"Int. J. Adv. Manuf. Technol."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Obaidat, M., Khodiaeva, M., Obeidat, S., Salane, D., and Holst, J. (2019). Security Architecture Framework for Internet of Things (IoT). 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 10\u201312 October 2019, IEEE.","DOI":"10.1109\/UEMCON47517.2019.8993096"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Sadeghi, A., Wachsmann, C., and Waidner, M. (2015, January 7\u201311). Security and Privacy Challenges in Industrial Internet of Things. Proceedings of the DAC \u201915, San Francisco, CA, USA.","DOI":"10.1145\/2744769.2747942"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1016\/j.clsr.2017.12.004","article-title":"Avoiding the internet of insecure industrial things","volume":"34","author":"Urquhart","year":"2018","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Mahmood, Z. (2019). Mitigating Threats and Vulnerabilities of RFID in IoT Through Outsourcing Computations for Public Key Cryptography. Security, Privacy and Trust in the IoT Environment, Springer.","DOI":"10.1007\/978-3-030-18075-1"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.future.2013.10.006","article-title":"Digital provenance: Enabling secure data forensics in cloud computing","volume":"37","author":"Li","year":"2014","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_35","unstructured":"Carata, L. (2018). Provenance-Based Computing. [Ph.D. Thesis, University of Cambridge]."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Ali, S., Wang, G., Bhuiyan, M.Z.A., and Jiang, H. (2018, January 8\u201312). Secure data provenance in cloud-centric internet of things via blockchain smart contracts. Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld\/SCALCOM\/UIC\/ATC\/CBDCom\/IOP\/SCI), Guangzhou, China.","DOI":"10.1109\/SmartWorld.2018.00175"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2643","DOI":"10.1007\/s11227-019-03028-9","article-title":"Threats on the horizon: Understanding security threats in the era of cyber-physical systems","volume":"76","author":"Hammoudeh","year":"2020","journal-title":"J. Supercomput."},{"key":"ref_38","unstructured":"Ali, M. (2016). Provenance-Based Data Traceability Model and Policy Enforcement Framework for Cloud Services. [Ph.D. Thesis, University of Southampton]."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Liang, X., Shetty, S., Tosh, D., Kamhoua, C., Kwait, K., and Njilla, L. (2017, January 14\u201317). ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. Proceedings of the 2017 17th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing, Madrid, Spain.","DOI":"10.1109\/CCGRID.2017.8"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Arumugam, S.S., Umashankar, V., Narendra, N.C., Badrinath, R., Mujumdar, A.P., Holler, J., and Herranz, A.H. (2018, January 3\u20136). IoT Enabled Smart Logistics Using Smart Contracts. Proceedings of the 2018 8th International Conference on Logistics, Informatics and Service Sciences (LISS), Toronto, ON, Canada.","DOI":"10.1109\/LISS.2018.8593220"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Suhail, S., Hong, C.S., Ahmad, Z.U., Zafar, F., and Khan, A. (2016). Introducing Secure Provenance in IoT: Requirements and Challenges, In 2016 International Workshop on Secure Internet of Things, Heraklion, Greece, 26\u201330 September 2016, IEEE.","DOI":"10.1109\/SIoT.2016.011"},{"key":"ref_42","first-page":"1","article-title":"A secure and extensible blockchain-based data provenance framework for the Internet of Things","volume":"28","author":"Sigwart","year":"2020","journal-title":"Pers. Ubiquitous Comput."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"153826","DOI":"10.1109\/ACCESS.2020.3018170","article-title":"Research on Artificial Intelligence Enhancing Internet of Things Security: A Survey","volume":"8","author":"Wu","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"8872586","DOI":"10.1155\/2020\/8872586","article-title":"Artificial Intelligence for Securing IoT Services in Edge Computing: A Survey","volume":"2020","author":"Xu","year":"2020","journal-title":"Secur. Commun. Netw."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"114066","DOI":"10.1109\/ACCESS.2020.2996214","article-title":"A Machine Learning Security Framework for Iot Systems","volume":"8","author":"Bagaa","year":"2020","journal-title":"IEEE Access"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1440538","DOI":"10.1155\/2022\/1440538","article-title":"Artificial Intelligence-Based Security Protocols to Resist Attacks in Internet of Things","volume":"2022","author":"Khilar","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/s43926-020-00001-4","article-title":"Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity","volume":"1","author":"Kuzlu","year":"2021","journal-title":"Discov. Internet Things"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"73.1","DOI":"10.1145\/3448614","article-title":"Sustainable Security for the Internet of Things Using Artificial Intelligence Architectures","volume":"21","author":"Iwendi","year":"2021","journal-title":"ACM Trans. Internet Technol."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Abdullah, M., Baashar, Y., Alhussain, H., Alwadain, A., Aziz, N., Capretz, L.F., and Abdulkadir, S.J. (2022). Detecting Cybersecurity attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics, 11.","DOI":"10.3390\/electronics11020198"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Wasson, C.S. (2006). System Analysis, Design, and Development Concepts, Principles, and Practices, Wiley.","DOI":"10.1002\/0471728241"},{"key":"ref_51","unstructured":"Ethereum (2023, May 02). Intro to Ethereum. Ethereum.Org. Available online: https:\/\/ethereum.org\/en\/developers\/docs\/intro-to-ethereum\/."},{"key":"ref_52","unstructured":"Ethereum (2023, May 02). Introduction to Smart Contracts. Ethereum.Org. Available online: https:\/\/ethereum.org\/en\/developers\/docs\/smart-contracts\/."},{"key":"ref_53","unstructured":"Ethereum (2023, May 02). Intro to DApps. Ethereum.Org. Available online: https:\/\/ethereum.org\/en\/developers\/docs\/dapps\/."},{"key":"ref_54","unstructured":"Hyperledger (2023, May 02). Fabric Docs\u2014Introduction. Hyperledger Fabric. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.5\/blockchain.html."},{"key":"ref_55","unstructured":"Hyperledger (2023, May 04). Hyperledger Fabric Model. Hyperledger Fabric Docs, 2023d. Available online: https:\/\/hyperledger-fabric.readthedocs.io\/en\/release-2.5\/fabric_model.html."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Anees, T., Habib, Q., Al-Shamayleh, A.S., Khalil, W., Obaidat, M.A., and Akhunzada, A. (2023). The Integration of WoT and Edge Computing: Issues and Challenges. Sustainability, 15.","DOI":"10.3390\/su15075983"},{"key":"ref_57","unstructured":"Barclay, I., Preece, A., and Taylor, I. (2018, January 18\u201321). Defining the Collective Intelligence Supply Chain. Proceedings of the AAAI FSS-18: Artificial Intelligence in Government and Public Sector, Arlington, WA, USA."}],"container-title":["Sci"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2413-4155\/6\/3\/51\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:46:59Z","timestamp":1760111219000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2413-4155\/6\/3\/51"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,2]]},"references-count":57,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2024,9]]}},"alternative-id":["sci6030051"],"URL":"https:\/\/doi.org\/10.3390\/sci6030051","relation":{},"ISSN":["2413-4155"],"issn-type":[{"type":"electronic","value":"2413-4155"}],"subject":[],"published":{"date-parts":[[2024,9,2]]}}}