Skip to main content
Log in

Privacy-preserving big data analytics for cyber-physical systems

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Cyber-physical systems (CPS) generate big data collected from combining physical and digital entities, but the challenge of CPS privacy-preservation demands further research to protect CPS sensitive information from unauthorized access. Data mining, perturbation, transformation and encryption are techniques extensively used to preserve private information from disclosure whilst still providing insight, but these are limited in their effectiveness in still allowing high-level analysis. This paper studies the role of big data component analysis for protecting sensitive information from illegal access. The independent component analysis (ICA) technique is applied to transform raw CPS information into a new shape whilst preserving its data utility. The mechanism is evaluated using the power CPS dataset, and the results reveal that the technique is more effective than four other privacy-preservation techniques, obtaining a higher level of privacy protection. In addition, the data utility is tested using three machine learning algorithms to estimate their capability of identifying normal and attack patterns before and after transformation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Fahad, A., Tari, Z., Almalawi, A., Goscinski, A., Khalil, I., & Mahmood, A. (2014). PPFSCADA: Privacy preserving framework for scada data publishing. Future Generation Computer Systems, 37, 496–511.

    Article  Google Scholar 

  2. Sun, C.-C., Liu, C.-C., & Xie, J. (2016). Cyber-physical system security of a power grid: State-of-the-art. Electronics, 5(3), 40.

    Article  Google Scholar 

  3. Zakerzadeh, H., Aggarwal, C. C., & Barker, K. (2015). Privacy-preserving big data publishing. In Proceedings of the 27th international conference on scientific and statistical database management (p. 26). ACM.

  4. Song, H., Fink, G. A., & Jeschke, S. (2017). Security and privacy in cyber-physical systems: Foundations, principles, and applications. New York: Wiley.

    Book  Google Scholar 

  5. Keshk, M., Moustafa, N., Sitnikova, E., & Creech, G. (2017). Privacy preservation intrusion detection technique for scada systems. arXiv preprint arXiv:1711.02828.

  6. Chim, T. W., Yiu, S.-M., Li, V. O., Hui, L. C., & Zhong, J. (2015). PRGA: Privacy-preserving recording & gateway-assisted authentication of power usage information for smart grid. IEEE Transactions on Dependable and Secure Computing, 12(1), 85–97.

    Article  Google Scholar 

  7. Baby, V., & Chandra, N. S. (2016). Privacy-preserving distributed data mining techniques: A survey. International Journal of Computer Applications, 143(10), 1–50.

    Article  Google Scholar 

  8. Power systems datasets. 2017. Available: https://sites.google.com/a/uah.edu/tommy-morris-uah/ics-data-sets. Accessed 10 Mar 2017.

  9. Erez, N., & Wool, A. (2015). Control variable classification, modeling and anomaly detection in modbus/TCP SCADA systems. International Journal of Critical Infrastructure Protection, 10, 59–70.

    Article  Google Scholar 

  10. Aggarwal, C. C., & Philip, S. Y. (2008). A general survey of privacy-preserving data mining models and algorithms. In Privacy-preserving data mining (pp. 11–52). Springer.

  11. He, D., Kumar, N., Zeadally, S., Vinel, A., & Yang, L. T. (2017). Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries. IEEE Transactions on Smart Grid, 8(5), 2411–2419.

    Article  Google Scholar 

  12. Fang, W., Zamani, M., & Chen, Z. (2018). Secure and privacy preserving consensus for second-order systems based on paillier encryption. arXiv preprint arXiv:1805.01065.

  13. Hajian, S., Domingo-Ferrer, J., & Farràs, O. (2014). Generalization-based privacy preservation and discrimination prevention in data publishing and mining. Data Mining and Knowledge Discovery, 28(5–6), 1158–1188.

    Article  MathSciNet  Google Scholar 

  14. Femandes, M., & Gomes, J. (2017). Heuristic approach for association rule hiding using ECLAT. In 2017 2nd International conference on communication systems, computing and IT applications (CSCITA) (pp. 218–223). IEEE.

  15. Zamani Boroujeni, F., & Hossein Afshari, D. (2018). An efficient rule-hiding method for privacy preserving in transactional databases. Journal of Computing and Information Technology, 25(4), 279–290.

    Article  Google Scholar 

  16. Sohani, A., & Sawant, K. (2016). PSDS: Privacy preserving system for data security implementation and countermeasures. International Journal of Computer Applications, 156(4), 21–25.

    Article  Google Scholar 

  17. Yu, C.-M., Chen, C.-Y., Kuo, S.-Y., & Chao, H.-C. (2014). Privacy-preserving power request in smart grid networks. IEEE Systems Journal, 8(2), 441–449.

    Article  Google Scholar 

  18. Iqbal, K., Yin, X.-C., Hao, H.-W., Ilyas, Q. M., & Yin, X. (2014). A central tendency-based privacy preserving model for sensitive xml association rules using bayesian networks. Intelligent Data Analysis, 18(2), 281–303.

    Article  Google Scholar 

  19. Ferrag, M. A., Maglaras, L. A., Janicke, H., & Jiang, J. (2016). A survey on privacy-preserving schemes for smart grid communications. arXiv preprint arXiv:1611.07722.

  20. Cheung, J. C., Chim, T. W., Yiu, S.-M., Li, V. O., & Hui, L. C. (2011). Credential-based privacy-preserving power request scheme for smart grid network. In 2011 IEEE global telecommunications conference (GLOBECOM 2011) (pp. 1–5). IEEE.

  21. Moustafa, N., Creech, G., & Slay, J. (2017). Big data analytics for intrusion detection system: Statistical decision-making using finite dirichlet mixture models. In Data analytics and decision support for cybersecurity (pp. 127–156). Springer.

  22. Chandrashekar, G., & Sahin, F. (2014). A survey on feature selection methods. Computers & Electrical Engineering, 40(1), 16–28.

    Article  Google Scholar 

  23. Pan, S., Morris, T., & Adhikari, U. (2015). Developing a hybrid intrusion detection system using data mining for power systems. IEEE Transactions on Smart Grid, 6(6), 3104–3113.

    Article  Google Scholar 

  24. Hink, R. C. B., Beaver, J. M., Buckner, M. A., Morris, T., Adhikari, U., & Pan, S. (2014). Machine learning for power system disturbance and cyber-attack discrimination. In 2014 7th international symposium on resilient control systems (ISRCS) (pp. 1–8). IEEE.

  25. Wu, X., Kumar, V., Quinlan, J. R., Ghosh, J., Yang, Q., Motoda, H., et al. (2008). Top 10 algorithms in data mining. Knowledge and Information Systems, 14(1), 1–37.

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank the School of Engineering and Information Technology (SEIT) at UNSW@ADFA for sponsoring this work under the Cyber Physical Security project-PS47084.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marwa Keshk.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Keshk, M., Moustafa, N., Sitnikova, E. et al. Privacy-preserving big data analytics for cyber-physical systems. Wireless Netw 28, 1241–1249 (2022). https://doi.org/10.1007/s11276-018-01912-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-018-01912-5

Keywords

Navigation