Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems

Marwa Keshk, Benjamin Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

18 Citations (Scopus)
25 Downloads (Pure)

Abstract

Cyber-Physical Systems (CPS) underpin global critical infrastructure, including power, water, gas systems and smart grids. CPS, as a technology platform, is unique as a target for Advanced Persistent Threats (APTs), given the potentially high impact of a successful breach. Additionally, CPSs are targets as they produce significant amounts of heterogeneous data from the multitude of devices and networks included in their architecture. It is, therefore, essential to develop efficient privacy-preserving techniques for safeguarding system data from cyber attacks. This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks. Concepts of Privacy preservation and CPSs are discussed, demonstrating CPSs' components and the way these systems could be exploited by either cyber and physical hacking scenarios. Then, classification of privacy preservation according to the way they would be protected, including perturbation, authentication, machine learning (ML), cryptography and blockchain, are explained to illustrate how they would be employed for data privacy preservation. Finally, we show existing challenges, solutions and future research directions of privacy preservation in CPSs.
Original languageEnglish
Pages (from-to)55077-55097
Number of pages21
JournalIEEE Access
Volume9
Early online date30 Mar 2021
DOIs
Publication statusPublished - 2021
Externally publishedYes

Bibliographical note

Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.

Keywords

  • Privacy preservation
  • cyber-physical systems
  • perturbation
  • authentication
  • machine learning
  • cryptography
  • blockchain

Fingerprint

Dive into the research topics of 'Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems'. Together they form a unique fingerprint.

Cite this