Skip to main content

2017 | OriginalPaper | Buchkapitel

Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems

verfasst von : Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens

Erschienen in: Computer Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber-physical systems are increasingly automated and interconnected. Strategies like predictive maintenance are on the rise and as a result new streams of data will flow through these systems. This data is often confidential, which can be a problem in these low-security systems. In addition, more stakeholders are now involved and various cloud-based service providers are utilised. Companies often no longer know who gets to see their data.
This paper presents a methodology that aims to analyse these data flows. The methodology takes as input a set of data asset preferences and service policies, as well as the asset flow of the system. It then returns feedback in the form of an asset profile showing which stakeholders have access to what data assets, and conflicts between the preferences and the modeled situation. Several possible actors with different preferences are modeled for each stakeholder role in the system, the scenarios with the fewest conflicts are returned. The methodology is validated on a case study and has been added to the FAST-CPS framework.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Becker, M.Y., Malkis, A., Bussard, L.: S4p: a generic language for specifying privacy preferences and policies. Microsoft Research (2010) Becker, M.Y., Malkis, A., Bussard, L.: S4p: a generic language for specifying privacy preferences and policies. Microsoft Research (2010)
2.
Zurück zum Zitat Bogaerts, B., De Cat, B., De Pooter, S., Denecker, M.: The IDP framework reference manual (2012) Bogaerts, B., De Cat, B., De Pooter, S., Denecker, M.: The IDP framework reference manual (2012)
3.
Zurück zum Zitat Cranor, L.: Web privacy with P3P. O’Reilly Media, Inc., Sebastopol (2002) Cranor, L.: Web privacy with P3P. O’Reilly Media, Inc., Sebastopol (2002)
4.
Zurück zum Zitat Cranor, L., Langheinrich, M., Marchiori,M.: A P3P preference exchange language 1.0 (APPEL1. 0). W3C working draft (2002) Cranor, L., Langheinrich, M., Marchiori,M.: A P3P preference exchange language 1.0 (APPEL1. 0). W3C working draft (2002)
5.
Zurück zum Zitat Decroix, K.: Inspecting privacy in electronic services (2015) Decroix, K.: Inspecting privacy in electronic services (2015)
6.
Zurück zum Zitat ENISA. Protecting industrial control systems: recommendations for EUROPE and member states (2011) ENISA. Protecting industrial control systems: recommendations for EUROPE and member states (2011)
7.
Zurück zum Zitat Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014) Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014)
8.
Zurück zum Zitat Homeland Security, H.C.C.: Cset: cyber security evaluation tool (2014) Homeland Security, H.C.C.: Cset: cyber security evaluation tool (2014)
9.
Zurück zum Zitat Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369. IEEE (2008) Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369. IEEE (2008)
10.
Zurück zum Zitat Lemaire, L., Vossaert, J., Jansen, J., Naessens, V.: Extracting vulnerabilities in industrial control systems using a knowledge-based system. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, p. 1 (2015) Lemaire, L., Vossaert, J., Jansen, J., Naessens, V.: Extracting vulnerabilities in industrial control systems using a knowledge-based system. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, p. 1 (2015)
11.
Zurück zum Zitat LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST), pp. 191–200 IEEE (2011) LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST), pp. 191–200 IEEE (2011)
12.
Zurück zum Zitat Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5), 339 (2006) Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5), 339 (2006)
13.
Zurück zum Zitat Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef
14.
Zurück zum Zitat Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363–373 (2013)CrossRef Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363–373 (2013)CrossRef
15.
Zurück zum Zitat Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384–387. Springer, Cham (2014). doi:10.1007/978-3-319-10696-0_29 Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384–387. Springer, Cham (2014). doi:10.​1007/​978-3-319-10696-0_​29
16.
Zurück zum Zitat Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010) Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)
Metadaten
Titel
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems
verfasst von
Laurens Lemaire
Jan Vossaert
Bart De Decker
Vincent Naessens
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-65127-9_4