An Analysis of Efficient Privacy Preservation Methodologies for Cyber-Physical Systems

Authors

  • Manas Kumar Yogi
  • A.S.N.Chakravarthy

Keywords:

Cyber Physical Systems (CPSs), Differential privacy, Health care systems, Industrial Internet of things (IIoT), Privacy preservation, Smart Grid (SG), Transportation systems

Abstract

The growing reliance on Cyber-Physical Systems (CPSs) in our daily lives, driven by advancements in ICT, has unfortunately increased associated security and privacy risks. Attackers are exploiting vulnerabilities to access sensitive data. While traditional privacy methods like encryption and k-anonymity exist, they struggle to keep pace with evolving CPS architectures. Differential Privacy (DP) has emerged as a robust solution to address these shortcomings. This paper comprehensively surveys DP techniques tailored for CPSs, focusing on their application in energy, transportation, healthcare, and Industrial IoT (IIoT) systems. Furthermore, we identify current challenges, open issues, and future research directions for DP within CPSs. This survey aims to serve as a foundation for developing advanced DP strategies to protect data privacy across diverse CPS applications and scenarios.

References

L. Wasserman and S. Zhou, “A Statistical Framework for Differential Privacy, ”Journal of the American Statistical Association, vol. 105, no. 489, pp. 375–389, 2010, Available: https://www.jstor.org/stable/29747034

N. Li, W. Qardaji, D. Su, Y. Wu, and W. Yang, “Membership privacy,” Computer and Communications Security, Nov. 2013, doi: https://doi.org/10.1145/2508859.2516686.

J. Lee and C. Clifton, “Differential identifiability,” KDD '12: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 1041-1049, Aug. 2012, doi: https://doi.org/10.1145/2339530.2339695.

T. Zhu, G. Li, W. Zhou, and P. S. Yu, “Preliminary of Differential Privacy,” Advances in Information Security, pp. 7–16, 2017, doi: https://doi.org/10.1007/978-3-319-62004-6_2.

H. Zhang, Y. Shu, P. Cheng and J. Chen, "Privacy and performance trade-off in cyber-physical systems," in IEEE Network, vol. 30, no. 2, pp. 62-66, March-April 2016, doi: https://doi.org/10.1109/MNET.2016.7437026.

E. Zheleva and L. Getoor, “Privacy in Social Networks: A Survey,” Social Network Data Analytics, pp. 277–306, 2011, doi: https://doi.org/10.1007/978-1-4419-8462-3_10.

C. Task and C. Clifton, “What Should We Protect? Defining Differential Privacy for Social Network Analysis,” Lecture notes in social networks, pp. 139–161, Jan. 2014, doi: https://doi.org/10.1007/978-3-319-05912-9_7.

I. Gazeau, D. Miller, and C. Palamidessi, “Preserving differential privacy under finite-precision semantics,” Theoretical Computer Science, vol. 655, pp. 92–108, Jan. 2016, doi: https://doi.org/10.1016/j.tcs.2016.01.015.

Z. Ji, Z. C. Lipton, and C. Elkan, “Differential Privacy and Machine Learning: a Survey and Review,” Machine Learning, Dec. 2014, doi: https://doi.org/10.48550/arxiv.1412.7584.

K. Xu and Z. Yan, “Privacy Protection in Mobile Recommender Systems: A Survey,” Security, Privacy, and Anonymity in Computation, Communication, and Storage, pp. 305–318, 2016, doi: https://doi.org/10.1007/978-3-319-49148-6_26.

C. Dwork, “Differential Privacy: A Survey of Results,” Lecture Notes in Computer Science, vol. 4978, pp. 1–19, 2008, doi: https://doi.org/10.1007/978-3-540-79228-4_1.

K. Ligett and A. Roth, “Take It or Leave It: Running a Survey When Privacy Comes at a Cost,” Lecture notes in computer science, pp. 378–391, Jan. 2012, doi: https://doi.org/10.1007/978-3-642-35311-6_28.

S. Vadhan, “The Complexity of Differential Privacy,” Tutorials on the Foundations of Cryptography, pp. 347–450, 2017, doi: https://doi.org/10.1007/978-3-319-57048-8_7.

X. Yao, X. Zhou and J. Ma, "Differential Privacy of Big Data: An Overview," 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 7-12, doi: https://doi.org/10.1109/BigDataSecurity-HPSC-IDS.2016.9.

S. Yu, "Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data," in IEEE Access, vol. 4, pp. 2751-2763, 2016, doi: https://doi.org/10.1109/ACCESS.2016.2577036.

T. Zhu, G. Li, W. Zhou and P. S. Yu, "Differentially Private Data Publishing and Analysis: A Survey," in IEEE Transactions on Knowledge and Data Engineering, vol. 29, no. 8, pp. 1619-1638, 1 Aug. 2017, doi: https://doi.org/10.1109/TKDE.2017.2697856.

Published

2025-03-28

How to Cite

Manas Kumar Yogi, & A.S.N.Chakravarthy. (2025). An Analysis of Efficient Privacy Preservation Methodologies for Cyber-Physical Systems. Journal of Network Security Computer Networks, 11(1), 9–22. Retrieved from https://matjournals.net/engineering/index.php/JONSCN/article/view/1588

Issue

Section

Articles