Risk Inference-Based Privacy Preservation Model for Cyber-Physical Systems
Keywords:
Risk, Privacy, Sensitivity, Cyber-Physical systemAbstract
The Risk Inference-Based Privacy Preservation Model for Cyber-Physical Systems (CPS) addresses the critical need for safeguarding privacy in the evolving landscape of interconnected physical and digital environments. This model, aptly named RIP2 (Risk Inference for Privacy-Preserving CPS), integrates advanced risk assessment techniques with robust privacy-preserving mechanisms to create a dynamic and adaptive framework. The model begins with a comprehensive risk assessment module that identifies potential threats, values privacy-sensitive assets, and assesses vulnerabilities within the CPS architecture. A privacy risk inference engine dynamically analyses contextual data, user behavior, and continuously evolving risk factors to assess the current privacy risk level. Privacy-preserving mechanisms, including differential privacy, encryption, and anonymization, are adaptively applied based on the inferred risk level, ensuring a tailored and effective approach to privacy preservation. Users are empowered to define their privacy preferences, and the model incorporates dynamic privacy policies that automatically adjust based on the risk assessment. Furthermore, the model incorporates incident response and continuous learning mechanisms to respond promptly to privacy incidents and improve the overall resilience of the system. The RIP2 Model aims to strike a balance between the seamless functionality of CPS and the paramount importance of preserving individual privacy in an interconnected and data-driven world.
Downloads
References
Davis, John S., and Osonde Osoba. "Improving privacy preservation policy in the modern information age." Health and Technology 9 (2019): 65-75.
Wang, Shengling, et al. "Privacy preservation in location-based services." IEEE Communications Magazine 56.3 (2018): 134-140.
Ara, Anees. "Privacy preservation in cloud based cyber physical systems." Journal of Computational and Theoretical Nanoscience 16.10 (2019): 4320-4327.
Pan, Miao, et al. Big data privacy preservation for cyber-physical systems. Springer International Publishing, 2019.
Chong, Michelle S., Henrik Sandberg, and André MH Teixeira. "A tutorial introduction to security and privacy for cyber-physical systems." 2019 18th European Control Conference (ECC). IEEE, 2019.
Keshk, Marwa, et al. "Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems." IEEE Access 9 (2021): 55077-55097.
Liang, Xueping, et al. "A reliable data provenance and privacy preservation architecture for business-driven cyber-physical systems using blockchain." International Journal of Information Security and Privacy (IJISP) 12.4 (2018): 68-81.
Feng, Jun, et al. "Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives." Information Sciences 527 (2020): 341-355.
Sharma, Tanusree, John C. Bambenek, and Masooda Bashir. "Preserving privacy in cyber-physical-social systems: An anonymity and access control approach." ISSN 1613-0073 (2020).
Sangogboye, Fisayo Caleb, et al. "A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems." ACM Transactions on Sensor Networks (TOSN) 14.3-4 (2018): 1-22.
Hassan, Muneeb Ul, Mubashir Husain Rehmani, and Jinjun Chen. "Differential privacy techniques for cyber physical systems: a survey." IEEE Communications Surveys & Tutorials 22.1 (2019): 746-789.
Fink, Glenn A., et al. "Security and privacy in cyber-physical systems." Cyber-physical systems. Academic Press, 2017. 129-141.
Zhao, Yaliang, et al. "Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectives." Information Sciences 515 (2020): 132-155.
Gifty, R., R. Bharathi, and P. Krishnakumar. "Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection." Neural Computing and Applications 31.Suppl 1 (2019): 23-34.
Basak, Santanu, Kakali Chatterjee, and Ashish Singh. "DPPT: A differential privacy preservation technique for cyber–physical system." Computers and Electrical Engineering 109 (2023): 108661.
Bhattacharjee, Arpan. Integrity and privacy protection for cyber-physical systems (cps). Diss. University of Nevada, Reno, 2021.
17.Usha, L. Josephine, and J. Jesu Vedha Nayahi. "Security and Privacy in Big Data Cyber-Physical Systems." Cybersecurity and Privacy in Cyber Physical Systems. CRC Press, 2019. 217-249.
Bhattacharjee, Arpan, et al. "Vulnerability characterization and privacy quantification for cyber-physical systems." 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics). IEEE, 2021.
Lu, Yang, and Minghui Zhu. "A control-theoretic perspective on cyber-physical privacy: Where data privacy meets dynamic systems." Annual Reviews in Control 47 (2019): 423-440.
Kaushik, Keshav. "Exposing Security and Privacy Issues on Cyber‐Physical Systems." Cyber‐Physical Systems: Foundations and Techniques (2022): 273-288.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.