Mobile Networks and Applications

, Volume 21, Issue 5, pp 865–878 | Cite as

Cloud-Integrated Cyber-Physical Systems for Complex Industrial Applications

  • Zhaogang Shu
  • Jiafu WanEmail author
  • Daqiang Zhang
  • Di Li


Recently, with many advances in wireless sensor networks, big data, mobile and cloud computing, Cyber-Physical Systems (CPS) can tightly couple cyber space with the physical world better than ever before. Also, the cloud-based systems can provide massive storage resources and low-cost computing as well as the flexibility of customizing the operating environment to Complex Industrial Applications (CIA). In our view, Cloud-integrated CPS (CCPS) will open the door to allow previously unachievable application scenarios to be built, deployed, managed and controlled effectively. In this paper, we propose a novel architecture of CCPS (termed CCPSA) and outline the enabling technologies for CIA. Then, we dissect three potential challenges and provide solutions from the perspective of CIA, including virtualized resource management techniques, the scheduling of cloud resources, and life cycle management. We hope this paper can provide insight and a roadmap for future research efforts in the emerging field of CCPS.


Cyber-physical systems Cloud computing Industrial wireless networks Complex industrial applications Big data 



This work is partially supported by National Natural Science Foundations of China (Nos. 61572220, 61262013, 51575194, 61472283 and 61103185), the Fundamental Research Funds for the Central Universities (Nos. 2015ZZ079, 2013KJ034, 2100219043 and 1600219246), the Natural Science Foundation of Guangdong Province, China (No. 2015A030313746), the Fok Ying-Tong Education Foundation, China (Grant No. 142006), and the Scientific Research Foundation for the Returned Overseas Chinese Scholars, State Education Ministry.


  1. 1.
    Wang S, Wan J, Li D, Zhang C (2015) Implementing smart factory of industrie 4.0: an outlook. Int J Distrib Sensor Netw, 2015, Article ID 681806, 10 pages. DOI: 10.1155/2015/681806.
  2. 2.
    Wan J, Zhang D, Zhao S, Yang L T, Lloret J (2014) Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges and solutions. IEEE Commun Mag 52(8):106–113Google Scholar
  3. 3.
    Sridhar S, Hahn A, Govindarasu M (2012) Cyber-physical system security for the electric power grid. Proc IEEE 100(1):210–224CrossRefGoogle Scholar
  4. 4.
    Banerjee A, Venkatasubramanian K, Mukherjee T, Gupta S (2012) Ensuring safety, security, and sustainability of mission-critical cyber-physical systems. Proc of the IEEE 100(1):283–299Google Scholar
  5. 5.
    Rajhans A, Bhave A, Ruchkin I, Krogh BH, Garlan D, Platzer A, Schmerl B (2014) Supporting Heterogeneity in Cyber-Physical Systems Architectures. IEEE Trans Autom Control 59(12):3178–3193Google Scholar
  6. 6.
    Derler P, Lee EA, Alberto SV (2012) Modeling cyber-physical systems. Proc IEEE 100(1):13–28CrossRefGoogle Scholar
  7. 7.
    Chen F, Deng P, Wan J, Zhang D, Vasilakos A, Rong X (2015) Data Mining for the Internet of Things: Literature Review and Challenges. Int J Distrib Sensor Netw, 2015, Article ID 431047, 14 pages. DOI: 10.1155/2015/431047.
  8. 8.
    Caliskan S, Rungger M, Majumdar R (2014) Towards robustness for cyber-physical systems. IEEE Trans Autom Control 59(12):3151–3163MathSciNetCrossRefGoogle Scholar
  9. 9.
    Wan J, Zhang D, Sun Y, Lin K, Zou C, Cai H (2014) VCMIA: a novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. Mobile Networks and Applications 19(2):153–160CrossRefGoogle Scholar
  10. 10.
    Chen M, Zhang Y, Li Y, Mao S, Leung V (2015) EMC: emotion-aware mobile cloud computing in 5G. IEEE Netw 29(2):32–38CrossRefGoogle Scholar
  11. 11.
    Rajkumar R (2012) A cyber–physical future. Proc IEEE 100(2):1309–1312CrossRefGoogle Scholar
  12. 12.
    Vamvoudakis KG, Hespanha JP, Sinopoli B, Mo Y (2014) Detection in adversarial environments. IEEE Trans Autom Control 59(12):3209–3223MathSciNetCrossRefGoogle Scholar
  13. 13.
    Demirel B, Zou Z, Soldati P, Johansson M (2014) Modular design of jointly optimal controllers and forwarding policies for wireless control. IEEE Trans Autom Control 59(12):3252–3265MathSciNetCrossRefGoogle Scholar
  14. 14.
    Trimpe S, D’Andrea R (2014) Event-based state estimation with variance-based triggering. IEEE Trans Autom Control 59(12):3266–3281MathSciNetCrossRefGoogle Scholar
  15. 15.
    Liu Q, Wan J, Zhou K (2014) Cloud manufacturing service system for industrial-cluster-oriented application. Journal Internet Technology 15(3):373–380Google Scholar
  16. 16.
    Zhang D, Wan J, Liu Q, Guan X, Liang X (2012) A taxonomy of agent technologies for ubiquitous computing environments. KSII Trans Internet Infor Syst 6(2):547–565Google Scholar
  17. 17.
    Wan J, Yan H, Li D, Zhou K, Zeng L (2013) Cyber-physical systems for optimal energy management scheme of autonomous electric vehicle. Comput J 56(8):947–956CrossRefGoogle Scholar
  18. 18.
    Baliga J, Ayre RWA, Hinton K, Tucker RS (2011) Green cloud computing: balancing energy in processing, storage, and transport. Proc IEEE 99(1):149–167CrossRefGoogle Scholar
  19. 19.
    Warneke D, Kao O (2011) Exploiting dynamic resource allocation for efficient parallel data processing in the Cloud. IEEE Trans Parallel Distrib Syst 22(6):985–997CrossRefGoogle Scholar
  20. 20.
    Khazaei H, Mišić J, Mišić VB, Rashwand S (2013) Analysis of a pool management scheme for cloud computing centers. IEEE Trans Parallel Distrib Syst 24(5):849–861CrossRefGoogle Scholar
  21. 21.
    Jain R, Paul S (2013) Network virtualization and software defined networking for cloud computing-a survey. IEEE Communications Managzine 2013:24–31CrossRefGoogle Scholar
  22. 22.
    Xiao Z, Xiao Y (2013) Security and privacy in cloud computing. IEEE Commun Surv Tutorials 15(2):843–859CrossRefGoogle Scholar
  23. 23.
    Drath R, Horch A (2014) Industrie 4. 0: Hit or Hype? IEEE Ind Electron Mag 8(2):56–58Google Scholar
  24. 24.
    Chen M, Wan J, González S, Liao X, Leung V (2014) A survey of recent developments in home M2M networks. IEEE Commun Surv Tutorials 16(1):98–114CrossRefGoogle Scholar
  25. 25.
    Chen M, Zhang Y, Li Y, Hassan M, Alamri A (2015) AIWAC: affective interaction through wearable computing and cloud technology. IEEE Wirel Commun 22(1):20–27CrossRefGoogle Scholar
  26. 26.
    Li D, Li F, Huang X (2010) A model based integration framework for computer numerical control system development. Robot Comput Integr Manuf 26(4):333–343CrossRefGoogle Scholar
  27. 27.
    Z. Shu, D. Li, Y. Hu, F. Ye and J. Wan. From models to code: automatic development process for embedded control system. Proc. of IEEE Int. Conf. on Network, Sensor and Control, Shanya, China, pp. 660–665, 2008.Google Scholar
  28. 28.
    Wan J, Li D, Yan H, Zhang P (2010) Fuzzy feedback scheduling algorithm based on central processing unit utilization for a software-based computer numerical control system. Proc. Inst Mech Eng, Part B: J Eng Manufac, 224(7):1133–1143CrossRefGoogle Scholar
  29. 29.
    J. Wan and D. Li. Fuzzy feedback scheduling algorithm based on output jitter in resource-constrained embedded systems. Proc. of Int. Conf. on Challenges in Environmental Science and Computer Engineering, Wuhan, China, pp. 457–460, Mar. 2010.Google Scholar
  30. 30.
    CIWA (Chinese Industrial Wireless Alliance). WIA-PA. [Online]. Available:
  31. 31.
    J. Liu, Q. Wang, J. Wan and J. Xiong. Towards Real-time Indoor Localization in Wireless Sensor Networks. In Proc. of the 12th IEEE Int. Conf. on Computer and Information Technology, Chengdu, China, October, 2012, pp. 877-884.Google Scholar
  32. 32.
    Liu J, Wan J, Wang Q, Deng P, Zhou K, Qiao Y (2015) A survey on position-based routing for vehicular Ad hoc networks. Telecommun Syst. doi: 10.1007/s11235-015-9979-7 Google Scholar
  33. 33.
    Tian W, Zhao Y (Oct. 2014) Optimized cloud resource management and scheduling: theories and practices. Elsevier/Morgan Kaufmann, PublisherGoogle Scholar
  34. 34.
    Chen M, Hao Y, Li Y, Lai C, Wu D (2015) On the computation offloading at Ad Hoc cloudlet: architecture and service models. IEEE Commun Mag 53(6):18–24CrossRefGoogle Scholar
  35. 35.
    H. Suo, Z. Liu, J. Wan and K. Zhou. Security and Privacy in Mobile Cloud Computing. Proc. of the 9th IEEE Int. Wireless Communications and Mobile Computing Conf., Cagliari, Italy, Jul. 2013.Google Scholar
  36. 36.
    Chen M, Mao S, Liu Y (2014) Big data: a survey. Mobile Networks and Applications 19(2):171–209MathSciNetCrossRefGoogle Scholar
  37. 37.
    Yuan W, Deng P, Taleb T, Wan J, Bi C (2015) An Unlicensed Taxi Identification Model based on Big Data Analysis. IEEE Trans Intell Transp Syst. doi: 10.1109/TITS.2015.2498180
  38. 38.
    I. King, J. Li and K. T. Chan. A brief survey of computational approaches in social computing. Neural networks, IEEE-INNS-ENNS International Joint Conference on, pp. 1625–1632, Jun. 2009.Google Scholar
  39. 39.
    FaceBook, [Online]. Available:
  40. 40.
    Shen W, Hao Q, Mak H, Neelamkavil J, Xie H, Dickinson J, Thomas R, Pardasani A, Xue H (2010) Systems integration and collaboration in architecture, engineering, construction, and facilities management: A review. Adv Eng Inform 24(2):196–207CrossRefGoogle Scholar
  41. 41.
    H. Yan, J. Wan, D. Li, Y. Tu and P. Zhang. Code sign of Networked Control Systems: A Review from Different Perspectives. Proc. of IEEE Intl Conf. on Cyber Technology in Automation, Control, and Intelligent Systems, Kunming, China, pp. 84–90, Mar. 2011.Google Scholar
  42. 42.
    Giunta G, Montella R, Agrillo G, Coviello GA (2010) GPGPU transparent virtualization component for high performance computing clouds. In: In Euro-Par 2010-Parallel Processing. Springer Berlin Heidelberg, pp. 379–391Google Scholar
  43. 43.
    Liu S (2006) and Y. Li. Grey Information, Theory and Practical Applications. Springer Science & Business MediaGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  1. 1.Fujian Agriculture and Forestry UniversityFuzhouChina
  2. 2.South China University of TechnologyGuangzhouChina
  3. 3.Tongji UniversityShanghaiChina

Personalised recommendations