4.6 Article

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems

Journal

IEEE ACCESS
Volume 9, Issue -, Pages 55077-55097

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/ACCESS.2021.3069737

Keywords

Data privacy; Sensors; Cyberattack; Privacy; Security; SCADA systems; Monitoring; Privacy preservation; cyber-physical systems; perturbation; authentication; machine learning; cryptography; blockchain

Ask authors/readers for more resources

Cyber-Physical Systems (CPS) are crucial for global critical infrastructure and are vulnerable to Advanced Persistent Threats (APTs), necessitating the development of efficient privacy-preserving techniques. This paper provides a comprehensive review of current privacy-preserving techniques for protecting CPS systems and data from cyber attacks, discussing the importance of privacy preservation and CPS components.
Cyber-Physical Systems (CPS) underpin global critical infrastructure, including power, water, gas systems and smart grids. CPS, as a technology platform, is unique as a target for Advanced Persistent Threats (APTs), given the potentially high impact of a successful breach. Additionally, CPSs are targets as they produce significant amounts of heterogeneous data from the multitude of devices and networks included in their architecture. It is, therefore, essential to develop efficient privacy-preserving techniques for safeguarding system data from cyber attacks. This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks. Concepts of Privacy preservation and CPSs are discussed, demonstrating CPSs' components and the way these systems could be exploited by either cyber and physical hacking scenarios. Then, classification of privacy preservation according to the way they would be protected, including perturbation, authentication, machine learning (ML), cryptography and blockchain, are explained to illustrate how they would be employed for data privacy preservation. Finally, we show existing challenges, solutions and future research directions of privacy preservation in CPSs.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available