Towards Preserving Privacy and Building Trust among the Users of Cyber-Physical Systems

dc.contributor.advisorJoshi, Anupam
dc.contributor.authorChukkapalli, Sai Sree Laya
dc.contributor.departmentComputer Science and Electrical Engineering
dc.contributor.programComputer Science
dc.date.accessioned2024-09-06T14:27:56Z
dc.date.available2024-09-06T14:27:56Z
dc.date.issued2024/01/01
dc.description.abstract“Smart” cyber-physical systems (CPS), from smart homes to smart grids to smart farms, are increasingly embedded in our lives. Each day, they generate large volumes of data through their smart sensors. These data support various artificial intelligence applications such as activity recognition, preventive and predictive maintenance, operational efficiency, and energy optimization, all of which are typically done in the cloud and outside the control of the person/system generating the data. This leads to concerns about the security of these systems, the privacy/confidentiality of the data they generate, and the risks of compliance violations due to the unauthorized use or exposure of personal information. In evolving CPS applications, multiple IoT-based smart systems must collaborate as a part of a distributed infrastructure. This leads to additional concerns about trusting the data/information in the presence of adversaries. We present an approach that solves these issues to support secure, compliant, and resilient operations in CPS environments using a policy-driven access control framework that combines dynamic access control with truth maintenance through context. First, we present the design and implementation of our PROTEGO framework that preserves the security of the system and the privacy of data collected by creating policies on data access grounded in Attribute-Based Access Control. These policies describe who can access the smart system and its data and in what context. When sharing data, the policy describes whether data can be shared based on the context that includes user preferences to infer if and how the data needs transformation for varying levels of privacy before sharing externally. While our framework is agnostic to how data is transformed, we show that transformed data, when run on downstream cloud-based applications such as anomaly detection, has minimal impact on accuracy. Second, we present our Bee-Thoven framework, which detects regulatory violations for sensitive data generated by smart sensors by tracing information flows using Extended Berkeley Packet Filters. This allows real-time monitoring and enforcement of data compliance policies like GDPR, CCPA, and HIPAA without modifying the application code in a transparent, application-agnostic manner with minimal overhead. Third, we design and implement ResilIoT to establish trust between agents by exploring and identifying false information sent across the ecosystems while incorporating context via user preferences. We build on existing truth maintenance systems to create policies that identify false information generated by sensors influenced by adversaries. Using two simulated real-world datasets, we show how this detects and resolves conflicts with minimal additional resources.
dc.formatapplication:pdf
dc.genredissertation
dc.identifierdoi:10.13016/m2wuig-dj77
dc.identifier.other12939
dc.identifier.urihttp://hdl.handle.net/11603/36068
dc.languageen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department Collection
dc.relation.ispartofUMBC Theses and Dissertations Collection
dc.relation.ispartofUMBC Graduate School Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item may be protected under Title 17 of the U.S. Copyright Law. It is made available by UMBC for non-commercial research and education. For permission to publish or reproduce, please see http://aok.lib.umbc.edu/specoll/repro.php or contact Special Collections at speccoll(at)umbc.edu
dc.sourceOriginal File Name: Chukkapalli_umbc_0434D_12939.pdf
dc.subjectCyber-Physical Systems
dc.subjectPrivacy
dc.subjectSecurity
dc.titleTowards Preserving Privacy and Building Trust among the Users of Cyber-Physical Systems
dc.typeText
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.
dcterms.accessRightsAccess limited to the UMBC community. Item may possibly be obtained via Interlibrary Loan thorugh a local library, pending author/copyright holder's permission.

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Chukkapalli_umbc_0434D_12939.pdf
Size:
9.23 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Chukkapalli-Sai_Lim.pdf
Size:
113 KB
Format:
Adobe Portable Document Format
Description: