Skip to main content
Top

2021 | OriginalPaper | Chapter

Generic Framework for Privacy Preservation in Cyber-Physical Systems

Authors : Rashmi Agarwal, Muzzammil Hussain

Published in: Progress in Advanced Computing and Intelligent Engineering

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyber-physical system (CPS) is an evolving technology, and as usual, security is a vital issue in its adaptation. Privacy is a primary security requirement in CPS and can cause havoc if unresolved. Much work is done in the area of privacy preservation in CPS, but they are domain-specific. There is no generic mechanism for privacy preservation in CPS. Here, we design a framework for privacy preservation in CPS. The proposed study aims to integrate separate privacy protection mechanisms in different levels of the CPS architecture, addressing different kinds of privacy as information contents, locations, identities, dates and times, addresses, etc., within a common structure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Al Faruque MA, Ahourai F (2014) A model-based design of cyber-physical energy systems. In: 19th Asia and South Pacific design automation conference (ASP-DAC), Singapore, pp 97–104 Al Faruque MA, Ahourai F (2014) A model-based design of cyber-physical energy systems. In: 19th Asia and South Pacific design automation conference (ASP-DAC), Singapore, pp 97–104
2.
go back to reference Zhang H, Shu YC, Cheng P, Chen JM (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30:62–66CrossRef Zhang H, Shu YC, Cheng P, Chen JM (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30:62–66CrossRef
3.
go back to reference Sztipanovits J, Ying S, Cohen I, Corman D, Davis J, Khurana H, Mosterman PJ, Prasad V, Stormo L (2012) Strategic R and D opportunities for 21st century cyber-physical systems. Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems Sztipanovits J, Ying S, Cohen I, Corman D, Davis J, Khurana H, Mosterman PJ, Prasad V, Stormo L (2012) Strategic R and D opportunities for 21st century cyber-physical systems. Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems
4.
go back to reference Lun YL, Cheng LL (2011) The research on the framework of cyber-physical systems for the reliable sensing and optimization scheduling. In: Applied mechanics and materials, vol 65. Trans Tech Publications, pp 451–454 Lun YL, Cheng LL (2011) The research on the framework of cyber-physical systems for the reliable sensing and optimization scheduling. In: Applied mechanics and materials, vol 65. Trans Tech Publications, pp 451–454
5.
go back to reference Hu L, Xie N, Kuang Z, Zhao K (2012) Review of cyber-physical system architecture. In: 2012 15th IEEE international symposium on object/component/service-oriented real-time distributed computing workshops (ISORCW). IEEE, New York, pp 25–30 Hu L, Xie N, Kuang Z, Zhao K (2012) Review of cyber-physical system architecture. In: 2012 15th IEEE international symposium on object/component/service-oriented real-time distributed computing workshops (ISORCW). IEEE, New York, pp 25–30
6.
go back to reference Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems, vol 1, Overview. Special Publication (NIST SP) - 1500-201; NIST Rockville, MD Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems, vol 1, Overview. Special Publication (NIST SP) - 1500-201; NIST Rockville, MD
7.
go back to reference Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (IECAC) scheme for internet of things. In: 2012 15th international symposium on wireless personal multimedia communications (WPMC). IEEE, New York, pp 187–191 Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (IECAC) scheme for internet of things. In: 2012 15th international symposium on wireless personal multimedia communications (WPMC). IEEE, New York, pp 187–191
8.
go back to reference Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, New York, pp 588–592 Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, New York, pp 588–592
9.
go back to reference Butkus P (2014) A user centric identity management for Internet of things. In: 2014 international conference on IT convergence and security (ICITCS). IEEE, New York, pp 1–4 Butkus P (2014) A user centric identity management for Internet of things. In: 2014 international conference on IT convergence and security (ICITCS). IEEE, New York, pp 1–4
10.
go back to reference Jan MA, Nanda P, He X, Tan Z, Liu RP (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), pp 205–211 Jan MA, Nanda P, He X, Tan Z, Liu RP (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), pp 205–211
11.
go back to reference Wang H, Li Q (2006) Distributed user access control in sensor networks. In: International conference on distributed computing in sensor systems. Springer, Berlin, pp 305–320 Wang H, Li Q (2006) Distributed user access control in sensor networks. In: International conference on distributed computing in sensor systems. Springer, Berlin, pp 305–320
12.
go back to reference Haque SA, Rahman M, Aziz SM (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786CrossRef Haque SA, Rahman M, Aziz SM (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786CrossRef
13.
go back to reference Kerschbaum F, Lim HW (2015) Privacy-preserving observation in public spaces. In: European symposium on research in computer security. Springer, Cham, pp 81–100 Kerschbaum F, Lim HW (2015) Privacy-preserving observation in public spaces. In: European symposium on research in computer security. Springer, Cham, pp 81–100
14.
go back to reference Zhang H, Shu Y, Cheng P, Chen J (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30(2):62–66CrossRef Zhang H, Shu Y, Cheng P, Chen J (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30(2):62–66CrossRef
15.
go back to reference Katewa V, Pasqualetti F, Gupta V (2017) On privacy versus cooperation in multi-agent systems. Int J Control, pp 1–15 Katewa V, Pasqualetti F, Gupta V (2017) On privacy versus cooperation in multi-agent systems. Int J Control, pp 1–15
17.
go back to reference Granjal J, Monteiro E, De Silva J (2013) Security issues and wireless M2M systems. In: Wireless networks and security. Springer, Heidelberg, pp 133–164 Granjal J, Monteiro E, De Silva J (2013) Security issues and wireless M2M systems. In: Wireless networks and security. Springer, Heidelberg, pp 133–164
19.
go back to reference Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the Internet of things. Comput Electr Eng 37(2):147–159CrossRef Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the Internet of things. Comput Electr Eng 37(2):147–159CrossRef
20.
go back to reference Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems.IEEE Trans Sustain Comput Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems.IEEE Trans Sustain Comput
21.
go back to reference Sangogboye FC, Jia R, Hong T, Spanos C, Kjærgaard MB (2018) A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems. ACM Trans Sens Networks (TOSN) 14(3–4):30 Sangogboye FC, Jia R, Hong T, Spanos C, Kjærgaard MB (2018) A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems. ACM Trans Sens Networks (TOSN) 14(3–4):30
22.
go back to reference Tawalbeh LA, Mowafi M, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7(2):67–74CrossRef Tawalbeh LA, Mowafi M, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7(2):67–74CrossRef
23.
go back to reference Kaliya N, Hussain M (2017) Framework for privacy preservation in IoT through classification and access control mechanisms. In: 2nd international conference for convergence in technology (I2CT), pp 430–434 Kaliya N, Hussain M (2017) Framework for privacy preservation in IoT through classification and access control mechanisms. In: 2nd international conference for convergence in technology (I2CT), pp 430–434
Metadata
Title
Generic Framework for Privacy Preservation in Cyber-Physical Systems
Authors
Rashmi Agarwal
Muzzammil Hussain
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-6584-7_25