Privacy and security of big data in cyber physical systems using Weibull distribution-based intrusion detection

被引:26
作者
Gifty, R. [1 ]
Bharathi, R. [2 ]
Krishnakumar, P. [3 ]
机构
[1] Univ Coll Engn, Informat & Commun Engn, Nagercoil 629004, Tamilnadu, India
[2] Univ Coll Engn, Elect & Commun Engn, Nagercoil 629004, Tamilnadu, India
[3] VV Coll Engn, Comp Sci & Engn, Thisayanvilai, Tirunelveli, India
关键词
Big data; Cyber physical systems (CPS); Security; Privacy; Intrusion detection; Reliability; Failure rate;
D O I
10.1007/s00521-018-3635-6
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The volume of data collected from cyber physical systems (CPS) is huge, and we use big data techniques to manage and store the data. Big data in CPS is concerned with the massive heterogeneous data streams, which are acquired from autonomous sources and computed in distributed data storage system. In order to handle the size, complexity and rate of availability of data, it requires new techniques that can inspect and interpret useful knowledge from large streams of information, which impose challenges on the design and management of CPS in multiple aspects such as performance, energy efficiency, security, privacy, reliability, sustainability, fault tolerance, scalability and flexibility. This paper focuses on the security and privacy aspects in managing big data for CPS and reviews recent challenges in data privacy. We also present a protection framework for intrusion detection and analyze the performance parameters, reliability and failure rate in a malicious big data context.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 36 条
[11]   Security and Privacy in Cyber-Physical Systems: A Survey of Surveys [J].
Giraldo, Jairo ;
Sarkar, Esha ;
Cardenas, Alvaro A. ;
Maniatakos, Michail ;
Kantarcioglu, Murat .
IEEE DESIGN & TEST, 2017, 34 (04) :7-17
[12]  
He HM, 2016, IEEE C EVOL COMPUTAT, P1015, DOI 10.1109/CEC.2016.7743900
[13]   Using Information-Flow Methods to Analyze the Security of Cyber-Physical Systems [J].
Howser, Gerry ;
McMillin, Bruce .
COMPUTER, 2017, 50 (04) :17-26
[14]  
Humayed A, 2017, IEEE INTERNET THINGS, V1, p99
[15]  
Jain P., 2016, J BIG DATA
[16]   Big Data for Cyber Physical Systems An Analysis of Challenges, Solutions and Opportunities [J].
Jara, Antonio J. ;
Genoud, Dominique ;
Bocchi, Yann .
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, :376-380
[17]   Resilient Authenticated Execution of Critical Applications in Untrusted Environments [J].
Kirkpatrick, Michael S. ;
Ghinita, Gabriel ;
Bertino, Elisa .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) :597-609
[18]   Emerging Security Mechanisms for Medical Cyber Physical Systems [J].
Kocabas, Ovunc ;
Soyata, Tolga ;
Aktas, Mehmet K. .
IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, 2016, 13 (03) :401-416
[19]  
Kumar S.A.P., 2017, IEEE 4 INT C CYB SEC, P145, DOI [10.1109/CSCloud.2017.17, DOI 10.1109/CSCLOUD.2017.17]
[20]   Effects-based feature identification for network intrusion detection [J].
Louvieris, Panos ;
Clewley, Natalie ;
Liu, Xiaohui .
NEUROCOMPUTING, 2013, 121 :265-273