CFP last date
22 April 2024
Reseach Article

Cloud based Cyber Physical Systems Security Issues: A Survey

by Yogita Borse, Mohammed Saleh Shaikh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 9
Year of Publication: 2019
Authors: Yogita Borse, Mohammed Saleh Shaikh
10.5120/ijca2019919474

Yogita Borse, Mohammed Saleh Shaikh . Cloud based Cyber Physical Systems Security Issues: A Survey. International Journal of Computer Applications. 177, 9 ( Oct 2019), 38-40. DOI=10.5120/ijca2019919474

@article{ 10.5120/ijca2019919474,
author = { Yogita Borse, Mohammed Saleh Shaikh },
title = { Cloud based Cyber Physical Systems Security Issues: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2019 },
volume = { 177 },
number = { 9 },
month = { Oct },
year = { 2019 },
issn = { 0975-8887 },
pages = { 38-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number9/30928-2019919474/ },
doi = { 10.5120/ijca2019919474 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:45:26.624139+05:30
%A Yogita Borse
%A Mohammed Saleh Shaikh
%T Cloud based Cyber Physical Systems Security Issues: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 9
%P 38-40
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data processing and physical interaction are combined by cyber physical systems (CPSs). CPSs have limited computation and storage capabilities due to their small size and resource constraints. With the emergence of cloud computing there are several new opportunities for these CPSs to extend their capabilities by taking advantage of the cloud resources in different ways. Cloud based cyber physical system (CCPS) is the integration of cloud computing technology with CPSs where complex computations can be transferred to the cloud platform. This paper presents a survey of research done on cloud based cyber physical systems security issues.

References
  1. F. F. Han et al., “Virtual resource monitoring in cloud computing,” J. Shanghai Univ., vol. 15, no. 5, pp. 381–385, 2011.
  2. A. Mohan and D. Mashima, “Towards secure demand-response systems on the cloud,” 2014 IEEE Int. Conf. Distrib. Comput. Sens. Syst., pp. 361–366, 2014.
  3. Amazon. (2019, 2) Amazon ec2 faqs. [Online]. Available:http://aws.amazon.com/ec2/faqs/
  4. J. Wan, D. Zhang, S. Zhao, L. Yang, and J. Lloret, “Context-aware vehicular cyber-physical systems with cloud support: Architecture, challenges, and solutions,” IEEE Commun. Mag., vol. 52, no. 8, pp. 106–113, 2014.
  5. M. Ficco and M. Rak, “Intrusion tolerance in cloud applications: The mOSAIC approach,” 2012 6th Int. Conf. Complex, Intelligent, Softw. Intensive Syst., pp. 170–176, 2012.
  6. A. Chonka and J. Abawajy, “Detecting and mitigating HX-DoS attacks against cloud web services,” 2012 15th Int. Conf. Network-Based Inf. Syst., pp. 429–434, 2012.
  7. B. P. Rimal, E. Choi, and I. Lumb, “A taxonomy and survey of cloud computing systems,” 2009 Fifth Int. Jt. Conf. INC, IMS IDC, pp. 44–51, 2009.
  8. M. Armbrust et al., “A view of Cloud Computing,” Commun. ACM 53, vol. 4, 2010.
  9. N. H. Ab Rahman, W. B. Glisson, Y. Yang, and K. K. R. Choo, “Forensic-by-Design Framework for Cyber-Physical Cloud Systems,” IEEE Cloud Comput., vol. 3, no. 1, pp. 50–59, 2016.
  10. S. Zhu, Y. Han, and Y. Wei, “Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption,” in 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015, pp. 257–261.
  11. Z. Xu and Q. Zhu, “Secure and practical output feedback control for cloud-enabled cyber-physical systems,” in 2017 IEEE Conference on Communications and Network Security (CNS), 2017, pp. 416–420.
  12. Y. B. Reddy, “Cloud-based cyber physical systems: Design challenges and security needs,” 2014 10th Int. Conf. Mob. Ad-Hoc Sens. Networks, pp. 315–322, 2014.
  13. L. Zhang, S. Shetty, P. Liu, and J. Jing, “RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment,” in Computer Security - ESORICS 2014, 2014, pp. 475–493.
  14. N. Wu and X. Li, “RFID Applications in Cyber-Physical System,” Deploying RFID - Challenges, Solut. Open Issues, pp. 291–302, 2011.
  15. Colombo et al., “Industrial cloud-based cyber-physical systems,” The IMC-AESOP Approach, 2014.
  16. A. Ara, M. Al-Rodhaan, Y. Tian, and A. Al-Dhelaan, “A Secure Service Provisioning Framework for Cyber Physical Cloud Computing Systems,” Int. J. Distrib. Parallel Syst., vol. 6, no. 1, pp. 1–11, 2015.
  17. J. Lopez and J. E. Rubio, “Access control for cyber-physical systems interconnected to the cloud,” Comput. Networks, vol. 134, pp. 46–54, 2018.
  18. K. An, S. Pradhan, F. Caglar, P. Patil, S. Shekhar, and A. Gokhale, “Cloud Computing for Cyber Physical Systems: Reliability and Security Challenges and Solutions,” Dre.Vanderbilt.Edu, no. 1, pp. 2–5.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud cyber physical system Cloud security Cyber physical system security.