“…In Section 6 we evaluate the design principles by conducting theoretical If the Cloud architecture is properly engineered, the security of the cloud instance is adequately maintained and the connectivity from cloud to Thing can be assured, then cyber risks can be reduced with cloud technologies (Ribeiro, Barata and Ferreira, 2010) (Thramboulidis, 2015) (Giordano, Spezzano and Vinci, 2016) (Shafiq et al, 2015) (Wahlster et al, 2013). To ensure cyber risk is reduced, cloud technologies should be supported with: internet-based system, service platforms (La and Kim, 2010;Dillon et al, 2011;Wahlster et al, 2013;Wan, Cai and Zhou, 2015;Weyer et al, 2015), processes, services (Stock and Seliger, 2016;Hussain, 2017) (Brettel et al, 2016;Hermann, Pentek and Otto, 2016;Wang et al, 2016), for machine decision making (Evans and Annunziata, 2012; Wang, 2013) (Wahlster et al, 2013;Shafiq et al, 2015). Creating cyber service architecture (La and Kim, 2010;Wang, Törngren and Onori, 2015;Weyer et al, 2015) and cloud distributed manufacturing planning (Wang, 2013;Wan, Cai and Zhou, 2015) (Faller and Feldmüller, 2015;Posada et al, 2015).…”