Skip to main content

Generic Framework for Privacy Preservation in Cyber-Physical Systems

  • Conference paper
  • First Online:
Progress in Advanced Computing and Intelligent Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1198))

Abstract

Cyber-physical system (CPS) is an evolving technology, and as usual, security is a vital issue in its adaptation. Privacy is a primary security requirement in CPS and can cause havoc if unresolved. Much work is done in the area of privacy preservation in CPS, but they are domain-specific. There is no generic mechanism for privacy preservation in CPS. Here, we design a framework for privacy preservation in CPS. The proposed study aims to integrate separate privacy protection mechanisms in different levels of the CPS architecture, addressing different kinds of privacy as information contents, locations, identities, dates and times, addresses, etc., within a common structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Al Faruque MA, Ahourai F (2014) A model-based design of cyber-physical energy systems. In: 19th Asia and South Pacific design automation conference (ASP-DAC), Singapore, pp 97–104

    Google Scholar 

  2. Zhang H, Shu YC, Cheng P, Chen JM (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30:62–66

    Article  Google Scholar 

  3. Sztipanovits J, Ying S, Cohen I, Corman D, Davis J, Khurana H, Mosterman PJ, Prasad V, Stormo L (2012) Strategic R and D opportunities for 21st century cyber-physical systems. Technical Report for Steering Committee for Foundation in Innovation for Cyber-Physical Systems

    Google Scholar 

  4. Lun YL, Cheng LL (2011) The research on the framework of cyber-physical systems for the reliable sensing and optimization scheduling. In: Applied mechanics and materials, vol 65. Trans Tech Publications, pp 451–454

    Google Scholar 

  5. Hu L, Xie N, Kuang Z, Zhao K (2012) Review of cyber-physical system architecture. In: 2012 15th IEEE international symposium on object/component/service-oriented real-time distributed computing workshops (ISORCW). IEEE, New York, pp 25–30

    Google Scholar 

  6. Griffor ER, Greer C, Wollman DA, Burns MJ (2017) Framework for cyber-physical systems, vol 1, Overview. Special Publication (NIST SP) - 1500-201; NIST Rockville, MD

    Google Scholar 

  7. Mahalle PN, Anggorojati B, Prasad NR, Prasad R (2012) Identity establishment and capability based access control (IECAC) scheme for internet of things. In: 2012 15th international symposium on wireless personal multimedia communications (WPMC). IEEE, New York, pp 187–191

    Google Scholar 

  8. Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, New York, pp 588–592

    Google Scholar 

  9. Butkus P (2014) A user centric identity management for Internet of things. In: 2014 international conference on IT convergence and security (ICITCS). IEEE, New York, pp 1–4

    Google Scholar 

  10. Jan MA, Nanda P, He X, Tan Z, Liu RP (2014) A robust authentication scheme for observing resources in the internet of things environment. In: 2014 IEEE 13th international conference on trust, security and privacy in computing and communications (TrustCom), pp 205–211

    Google Scholar 

  11. Wang H, Li Q (2006) Distributed user access control in sensor networks. In: International conference on distributed computing in sensor systems. Springer, Berlin, pp 305–320

    Google Scholar 

  12. Haque SA, Rahman M, Aziz SM (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786

    Article  Google Scholar 

  13. Kerschbaum F, Lim HW (2015) Privacy-preserving observation in public spaces. In: European symposium on research in computer security. Springer, Cham, pp 81–100

    Google Scholar 

  14. Zhang H, Shu Y, Cheng P, Chen J (2016) Privacy and performance trade-off in cyber-physical systems. IEEE Network 30(2):62–66

    Article  Google Scholar 

  15. Katewa V, Pasqualetti F, Gupta V (2017) On privacy versus cooperation in multi-agent systems. Int J Control, pp 1–15

    Google Scholar 

  16. Thales Hardware based scheme (2015). https://www.thales-esecurity.com/products-and-services/products-and-services/hardware-security-modules

  17. Granjal J, Monteiro E, De Silva J (2013) Security issues and wireless M2M systems. In: Wireless networks and security. Springer, Heidelberg, pp 133–164

    Google Scholar 

  18. Mocana-NanoDTLS. https://mocana.com/products.html. Accessed Nov 2012

  19. Roman R, Alcaraz C, Lopez J, Sklavos N (2011) Key management systems for sensor networks in the context of the Internet of things. Comput Electr Eng 37(2):147–159

    Article  Google Scholar 

  20. Keshk M, Sitnikova E, Moustafa N, Hu J, Khalil I (2019) An integrated framework for privacy-preserving based anomaly detection for cyber-physical systems.IEEE Trans Sustain Comput

    Google Scholar 

  21. Sangogboye FC, Jia R, Hong T, Spanos C, Kjærgaard MB (2018) A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems. ACM Trans Sens Networks (TOSN) 14(3–4):30

    Google Scholar 

  22. Tawalbeh LA, Mowafi M, Aljoby W (2013) Use of elliptic curve cryptography for multimedia encryption. IET Inf Secur 7(2):67–74

    Article  Google Scholar 

  23. Kaliya N, Hussain M (2017) Framework for privacy preservation in IoT through classification and access control mechanisms. In: 2nd international conference for convergence in technology (I2CT), pp 430–434

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rashmi Agarwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Agarwal, R., Hussain, M. (2021). Generic Framework for Privacy Preservation in Cyber-Physical Systems. In: Panigrahi, C.R., Pati, B., Mohapatra, P., Buyya, R., Li, KC. (eds) Progress in Advanced Computing and Intelligent Engineering. Advances in Intelligent Systems and Computing, vol 1198. Springer, Singapore. https://doi.org/10.1007/978-981-15-6584-7_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-6584-7_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-6583-0

  • Online ISBN: 978-981-15-6584-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics