TY - JOUR
T1 - Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
AU - Keshk, Marwa
AU - Turnbull, Benjamin
AU - Sitnikova, Elena
AU - Vatsalan, Dinusha
AU - Moustafa, Nour
PY - 2021/3/30
Y1 - 2021/3/30
N2 - Cyber-Physical Systems (CPS) underpin global critical infrastructure, including power, water, gas systems and smart grids. CPS, as a technology platform, is unique as a target for Advanced Persistent Threats (APTs), given the potentially high impact of a successful breach. Additionally, CPSs are targets as they produce significant amounts of heterogeneous data from the multitude of devices and networks included in their architecture. It is, therefore, essential to develop efficient privacy-preserving techniques for safeguarding system data from cyber attacks. This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks. Concepts of Privacy preservation and CPSs are discussed, demonstrating CPSs' components and the way these systems could be exploited by either cyber and physical hacking scenarios. Then, classification of privacy preservation according to the way they would be protected, including perturbation, authentication, machine learning (ML), cryptography and blockchain, are explained to illustrate how they would be employed for data privacy preservation. Finally, we show existing challenges, solutions and future research directions of privacy preservation in CPSs.
AB - Cyber-Physical Systems (CPS) underpin global critical infrastructure, including power, water, gas systems and smart grids. CPS, as a technology platform, is unique as a target for Advanced Persistent Threats (APTs), given the potentially high impact of a successful breach. Additionally, CPSs are targets as they produce significant amounts of heterogeneous data from the multitude of devices and networks included in their architecture. It is, therefore, essential to develop efficient privacy-preserving techniques for safeguarding system data from cyber attacks. This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks. Concepts of Privacy preservation and CPSs are discussed, demonstrating CPSs' components and the way these systems could be exploited by either cyber and physical hacking scenarios. Then, classification of privacy preservation according to the way they would be protected, including perturbation, authentication, machine learning (ML), cryptography and blockchain, are explained to illustrate how they would be employed for data privacy preservation. Finally, we show existing challenges, solutions and future research directions of privacy preservation in CPSs.
KW - authentication
KW - blockchain
KW - cryptography
KW - cyber-physical systems
KW - machine learning
KW - perturbation
KW - Privacy preservation
UR - http://www.scopus.com/inward/record.url?scp=85103772246&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2021.3069737
DO - 10.1109/ACCESS.2021.3069737
M3 - Article
AN - SCOPUS:85103772246
SN - 2169-3536
VL - 9
SP - 55077
EP - 55097
JO - IEEE Access
JF - IEEE Access
ER -