Abstract
Cyber-physical system (CPS) is an evolving technology, and as usual, security is a vital issue in its adaptation. Privacy is a primary security requirement in CPS and can cause havoc if unresolved. Much work is done in the area of privacy preservation in CPS, but they are domain-specific. There is no generic mechanism for privacy preservation in CPS. Here, we design a framework for privacy preservation in CPS. The proposed study aims to integrate separate privacy protection mechanisms in different levels of the CPS architecture, addressing different kinds of privacy as information contents, locations, identities, dates and times, addresses, etc., within a common structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Al Faruque MA, Ahourai F (2014) A model-based design of cyber-physical energy systems. In: 19th Asia and South Pacific design automation conference (ASP-DAC), Singapore, pp 97–104
Zhang H, Shu YC, Cheng P, Chen JM (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30:62–66
Sztipanovits J, Ying S, Cohen I, Corman D, Davis J, Khurana H, Mosterman PJ, Prasad V, Stormo L (2012) Strategic R and D opportunities for 21st century cyber-physical systems. Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems
Lun YL, Cheng LL (2011) The research on the framework of cyber-physical systems for the reliable sensing and optimization scheduling. In: Applied mechanics and materials, vol 65. Trans Tech Publications, pp 451–454
Hu L, Xie N, Kuang Z, Zhao K (2012) Review of cyber-physical system architecture. In: 2012 15th IEEE international symposium on object/component/service-oriented real-time distributed computing workshops (ISORCW). IEEE, New York, pp 25–30
Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems, vol 1, Overview. Special Publication (NIST SP) - 1500-201; NIST Rockville, MD
Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (IECAC) scheme for internet of things. In: 2012 15th international symposium on wireless personal multimedia communications (WPMC). IEEE, New York, pp 187–191
Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, New York, pp 588–592
Butkus P (2014) A user centric identity management for Internet of things. In: 2014 international conference on IT convergence and security (ICITCS). IEEE, New York, pp 1–4
Jan MA, Nanda P, He X, Tan Z, Liu RP (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), pp 205–211
Wang H, Li Q (2006) Distributed user access control in sensor networks. In: International conference on distributed computing in sensor systems. Springer, Berlin, pp 305–320
Haque SA, Rahman M, Aziz SM (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786
Kerschbaum F, Lim HW (2015) Privacy-preserving observation in public spaces. In: European symposium on research in computer security. Springer, Cham, pp 81–100
Zhang H, Shu Y, Cheng P, Chen J (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30(2):62–66
Katewa V, Pasqualetti F, Gupta V (2017) On privacy versus cooperation in multi-agent systems. Int J Control, pp 1–15
Thales Hardware based scheme (2015). https://www.thales-esecurity.com/products-and-services/products-and-services/hardware-security-modules
Granjal J, Monteiro E, De Silva J (2013) Security issues and wireless M2M systems. In: Wireless networks and security. Springer, Heidelberg, pp 133–164
Mocana-NanoDTLS. https://mocana.com/products.html. Accessed Nov 2012
Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the Internet of things. Comput Electr Eng 37(2):147–159
Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems.IEEE Trans Sustain Comput
Sangogboye FC, Jia R, Hong T, Spanos C, Kjærgaard MB (2018) A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems. ACM Trans Sens Networks (TOSN) 14(3–4):30
Tawalbeh LA, Mowafi M, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7(2):67–74
Kaliya N, Hussain M (2017) Framework for privacy preservation in IoT through classification and access control mechanisms. In: 2nd international conference for convergence in technology (I2CT), pp 430–434
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Agarwal, R., Hussain, M. (2021). Generic Framework for Privacy Preservation in Cyber-Physical Systems. In: Panigrahi, C.R., Pati, B., Mohapatra, P., Buyya, R., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1198. Springer, Singapore. https://doi.org/10.1007/978-981-15-6584-7_25
Download citation
DOI: https://doi.org/10.1007/978-981-15-6584-7_25
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-6583-0
Online ISBN: 978-981-15-6584-7
eBook Packages: EngineeringEngineering (R0)