Skip to main content

Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems

  • Conference paper
  • First Online:
Computer Network Security (MMM-ACNS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10446))

  • 1363 Accesses

Abstract

Cyber-physical systems are increasingly automated and interconnected. Strategies like predictive maintenance are on the rise and as a result new streams of data will flow through these systems. This data is often confidential, which can be a problem in these low-security systems. In addition, more stakeholders are now involved and various cloud-based service providers are utilised. Companies often no longer know who gets to see their data.

This paper presents a methodology that aims to analyse these data flows. The methodology takes as input a set of data asset preferences and service policies, as well as the asset flow of the system. It then returns feedback in the form of an asset profile showing which stakeholders have access to what data assets, and conflicts between the preferences and the modeled situation. Several possible actors with different preferences are modeled for each stakeholder role in the system, the scenarios with the fewest conflicts are returned. The methodology is validated on a case study and has been added to the FAST-CPS framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Becker, M.Y., Malkis, A., Bussard, L.: S4p: a generic language for specifying privacy preferences and policies. Microsoft Research (2010)

    Google Scholar 

  2. Bogaerts, B., De Cat, B., De Pooter, S., Denecker, M.: The IDP framework reference manual (2012)

    Google Scholar 

  3. Cranor, L.: Web privacy with P3P. O’Reilly Media, Inc., Sebastopol (2002)

    Google Scholar 

  4. Cranor, L., Langheinrich, M., Marchiori,M.: A P3P preference exchange language 1.0 (APPEL1. 0). W3C working draft (2002)

    Google Scholar 

  5. Decroix, K.: Inspecting privacy in electronic services (2015)

    Google Scholar 

  6. ENISA. Protecting industrial control systems: recommendations for EUROPE and member states (2011)

    Google Scholar 

  7. Friedenthal, S., Moore, A., Steiner, R.: A practical guide to SysML: the systems modeling language. Morgan Kaufmann (2014)

    Google Scholar 

  8. Homeland Security, H.C.C.: Cset: cyber security evaluation tool (2014)

    Google Scholar 

  9. Lee, E.A.: Cyber physical systems: design challenges. In: 2008 11th IEEE International Symposium on Object Oriented Real-Time Distributed Computing (ISORC), pp. 363–369. IEEE (2008)

    Google Scholar 

  10. Lemaire, L., Vossaert, J., Jansen, J., Naessens, V.: Extracting vulnerabilities in industrial control systems using a knowledge-based system. In: Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research, p. 1 (2015)

    Google Scholar 

  11. LeMay, E., Ford, M.D., Keefe, K., Sanders, W.H., Muehrcke, C.: Model-based security metrics using adversary view security evaluation (advise). In: 2011 Eighth International Conference on Quantitative Evaluation of Systems (QEST), pp. 191–200 IEEE (2011)

    Google Scholar 

  12. Li, N., Yu, T., Anton, A.: A semantics based approach to privacy languages. Comput. Syst. Sci. Eng. 21(5), 339 (2006)

    Google Scholar 

  13. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  14. Sommestad, T., Ekstedt, M., Holm, H.: The cyber security modeling language: a tool for assessing the vulnerability of enterprise system architectures. IEEE Syst. J. 7(3), 363–373 (2013)

    Article  Google Scholar 

  15. Vu, A.H., Tippenhauer, N.O., Chen, B., Nicol, D.M., Kalbarczyk, Z.: CyberSAGE: a tool for automatic security assessment of cyber-physical systems. In: Norman, G., Sanders, W. (eds.) QEST 2014. LNCS, vol. 8657, pp. 384–387. Springer, Cham (2014). doi:10.1007/978-3-319-10696-0_29

    Google Scholar 

  16. Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, pp. 1–9. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laurens Lemaire .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lemaire, L., Vossaert, J., De Decker, B., Naessens, V. (2017). Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds) Computer Network Security. MMM-ACNS 2017. Lecture Notes in Computer Science(), vol 10446. Springer, Cham. https://doi.org/10.1007/978-3-319-65127-9_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-65127-9_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-65126-2

  • Online ISBN: 978-3-319-65127-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics