Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh

Cybersecurity and Privacy in Cyber Physical Systems by Yassine Maleh

Author:Yassine Maleh
Language: eng
Format: epub
Publisher: CRC Press


8.1 Introduction

Today, knowingly or unknowingly, people get connected with each other in one virtual world known as cyber society (Mueller 2006). The interaction of people with cyber society components, such as social media, search engines, blogs, and websites with their services causes generation of the enormous amount of data (Alguliyev et al. 2018). Generally, the size of the data is from exabyte to zettabyte. Similarly, a cyber-physical system, which is the connection between physical devices and the cyber system, generates a large volume of continuous flowing data that are required to be processed in a secured manner. Almost every industry is trying to explore this huge amount of data for making critical decisions and planned business moves. This will add more challenges while storing and processing data (Cardenas et al. 2008). Traditional methods of analysis are not suitable for analyzing big data because of its size and complexity. Therefore, new techniques ensuring privacy and security are to be developed to store and analyze data in the real-time cyber-physical system.

The personal information collected from individuals is governed by the privacy law of that country and hence ensuring big data privacy is a vital need. Privacy-preserving data publishing (PPDP) is a concept used in cyber-physical systems (Mitchell and Chen 2014; Sanislav et al. 2014; Mourtzis and Vlachou 2016; Song et al. 2017) that provides various tools and techniques for preserving data privacy while publishing the data over the Internet. In this chapter, we discuss various approaches to PPDP, evaluate their differences in a systematic way, and clarify the differences and requirements that distinguish PPDP from other related problems. We have identified the challenges of the existing techniques and propose future scope for the researchers.

The chapter is organized as follows: Section 8.2 discusses the overview of big data and privacy and security concerns in big data. Section 8.3 discusses the various approaches for ensuring the privacy of big data. Section 8.4 discusses various privacy-preservation methods and their comparisons. Section 8.5 discusses limitations and challenges in big data security. Finally, Section 8.6 provides the concluding remarks.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.