security, privacy, and trust for cyberphysical-social systems

3
Editorial Security, Privacy, and Trust for Cyberphysical-Social Systems Laurence T. Yang , 1 Wei Wang, 2 Gregorio Martinez Perez , 3 and Willy Susilo 4 1 Department of Computer Science, St. Francis Xavier University, Canada 2 School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074 Hubei, China 3 Department of Information and Communications Engineering, University of Murcia, Spain 4 School of Computing and Information Technology, University of Wollongong, Australia Correspondence should be addressed to Laurence T. Yang; [email protected] Received 24 December 2018; Accepted 24 December 2018; Published 3 February 2019 Copyright © Laurence T. Yang et al. isis an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A total of manuscripts were received in the final edition of this special issue, and only of these were accepted. is issue covers two frontier topics that are Cyber-Physical-Social Systems (CPSS) and security. is special issue started since we notice that Cyber-Physical-Social Systems (CPSS) include the cyber world, physical world, social world, and their integrations such as the CPS/IoT (the integration of the cyber world and physical world) and the social computing (the integration of the cyber world and the social world), while any of the three suffers tremendous of threats on security. e ultimate goal of CPSS is to provide proactive and personal services for humans. Accordingly, one of the most important concerns of CPSS is to protect sensitive or private data, guarantee user privacy, and ensure the system trustworthy. CPSS security, privacy, and trust as a new research and development field require further development and advances of the corresponding models and methodologies for effective connections among physical, cyber, and social worlds. e received manuscripts cover all involved worlds in CPSS and most challenging attacks that would meet in CPSS. We selected papers that are well structured, written, and contributive for CPSS security issue. As the fundamental of CPSS, sensors always act as hardware support that connects data of physical world to human being. However, both security guarantee and energy consumption constrain the developments of sensors in CPSS while privacy data may involve, for example, camera and e- health. C. A. Lara-Nino et al. explore the effects of authenti- cated encryption to hardware implementation in the physical world phase and accordingly present generic composition of authenticated encryption on FPGA chips, which brings lightweight cryptography with lowered power consumption. Additionally, W. Qiang et al. propose P-CFI, a fine-grained Control-Flow Integrity (CFI) method, to protect CPS against memory-related attacks. ey choose points-to analysis to construct the legitimate target set for every indirect call cite and check whether the target of the indirect call cite is in the legitimate target set at runtime. On an orthogonal direction, J. Hingant et al. introduce HYBINT, an enhanced intelligence system that provides the necessary decision-making support for an efficient critical infrastructures protection by combining the real-time situa- tion of the physical and cyber domains in a single visualiza- tion space. HYBINT is a real cross-platform solution which supplies, through Big Data analytical methods and advanced representation techniques, hybrid intelligence information from significant data of both physical and cyber data sources in order to bring an adequate hybrid situational awareness (HSA) of the cyber-physical environment. e HYBINT system consists of three main modules: Data Gathering Modules, Data Analysis Modules, and Data Visualization Module. In another article, Y. Zhu et al. propose an approx- imate Fast privacy-preserving equality Test Protocol (FTP), which can securely complete string equality test and achieve high running efficiency at the cost of little accuracy loss. ey strictly analyze the accuracy of our proposed scheme and formally prove its security. Additionally, they leverage extensive simulation experiments to evaluate the running cost, which confirms its high efficiency. Z. Ma et al. consider privacy issues related to the social world and construct a personalized and continuous location privacy-preserving framework called GLPP in account linked platforms with different LBSs (Location-Based Services). e framework GLPP obfuscates every location in local search Hindawi Security and Communication Networks Volume 2019, Article ID 2964673, 2 pages https://doi.org/10.1155/2019/2964673

Upload: others

Post on 18-Mar-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

EditorialSecurity, Privacy, and Trust for Cyberphysical-Social Systems

Laurence T. Yang ,1 Wei Wang,2 Gregorio Martinez Perez ,3 and Willy Susilo 4

1Department of Computer Science, St. Francis Xavier University, Canada2School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074 Hubei, China3Department of Information and Communications Engineering, University of Murcia, Spain4School of Computing and Information Technology, University of Wollongong, Australia

Correspondence should be addressed to Laurence T. Yang; [email protected]

Received 24 December 2018; Accepted 24 December 2018; Published 3 February 2019

Copyright © 2019 Laurence T. Yang et al.�isis an openaccess article distributed under theCreativeCommonsAttribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

A total of 19 manuscripts were received in the final editionof this special issue, and only 8 of these were accepted. �isissue covers two frontier topics that areCyber-Physical-SocialSystems (CPSS) and security. �is special issue started sincewe notice that Cyber-Physical-Social Systems (CPSS) includethe cyber world, physical world, social world, and theirintegrations such as the CPS/IoT (the integration of the cyberworld and physical world) and the social computing (theintegration of the cyber world and the social world), whileany of the three suffers tremendous of threats on security.�eultimate goal of CPSS is to provide proactive and personalservices for humans. Accordingly, one of the most importantconcerns of CPSS is to protect sensitive or private data,guarantee user privacy, and ensure the system trustworthy.CPSS security, privacy, and trust as a new research anddevelopment field require further development and advancesof the corresponding models and methodologies for effectiveconnections among physical, cyber, and social worlds.

�e received manuscripts cover all involved worlds inCPSS and most challenging attacks that would meet in CPSS.We selected 8 papers that are well structured, written, andcontributive for CPSS security issue.

As the fundamental of CPSS, sensors always act ashardware support that connects data of physical world tohuman being. However, both security guarantee and energyconsumption constrain the developments of sensors in CPSSwhile privacy data may involve, for example, camera and e-health. C. A. Lara-Nino et al. explore the effects of authenti-cated encryption to hardware implementation in the physicalworld phase and accordingly present generic compositionof authenticated encryption on FPGA chips, which bringslightweight cryptography with lowered power consumption.

Additionally, W. Qiang et al. propose P-CFI, a fine-grainedControl-Flow Integrity (CFI) method, to protect CPS againstmemory-related attacks. �ey choose points-to analysis toconstruct the legitimate target set for every indirect call citeand check whether the target of the indirect call cite is in thelegitimate target set at runtime.

On an orthogonal direction, J. Hingant et al. introduceHYBINT, an enhanced intelligence system that provides thenecessary decision-making support for an efficient criticalinfrastructures protection by combining the real-time situa-tion of the physical and cyber domains in a single visualiza-tion space. HYBINT is a real cross-platform solution whichsupplies, through Big Data analytical methods and advancedrepresentation techniques, hybrid intelligence informationfrom significant data of both physical and cyber data sourcesin order to bring an adequate hybrid situational awareness(HSA) of the cyber-physical environment. �e HYBINTsystem consists of three main modules: Data GatheringModules, Data Analysis Modules, and Data VisualizationModule. In another article, Y. Zhu et al. propose an approx-imate Fast privacy-preserving equality Test Protocol (FTP),which can securely complete string equality test and achievehigh running efficiency at the cost of little accuracy loss.�ey strictly analyze the accuracy of our proposed schemeand formally prove its security. Additionally, they leverageextensive simulation experiments to evaluate the runningcost, which confirms its high efficiency.

Z. Ma et al. consider privacy issues related to the socialworld and construct a personalized and continuous locationprivacy-preserving framework calledGLPP in account linkedplatforms with different LBSs (Location-Based Services). �eframework GLPP obfuscates every location in local search

HindawiSecurity and Communication NetworksVolume 2019, Article ID 2964673, 2 pageshttps://doi.org/10.1155/2019/2964673

2 Security and Communication Networks

before submission and performs better than initial protectionin accuracy, certainty, and correctness. Meanwhile it can alsoprovide a good user experience without much loss in locationutility.

�e remaining articles show more interests on crypto-graphic techniques.

In application layer, data security and privacy are themostserious issues that would raise great concerns from userswhen they adopt cloud systems to handle data collaboration.However, different cryptographic techniques are deployed indifferent cloud service providers, which make cross-clouddata collaboration to be a deeper challenge. Q. Huang etal. discuss the challenge and the possible solution basedon conditional proxy reencryption and then realize thesolution through an adaptive secure cross-cloud data col-laboration scheme with identity-based cryptography (IBC)and proxy reencryption (PRE) techniques. �e leverage ofthose cryptographic technologies brings the cyber world inCPSS with data confidentiality and flexible data migrationamong ciphertexts encrypted in identity-based encryptionmanner and ciphertexts encrypted in identity-based broad-cast encryptionmanner. Another article concentrates on real-time encrypted transmission for devices in IoT. C.Wang et al.introduce an instant encrypted transmission based securityscheme for devices in IoTwhich guarantees both security andinstant responses for IoT data with bilinear pairing and ID-based signature.

�ere are also researches on Blockchain, a popular topicin security area.

When a popular technology, for instance, Blockchain,involves in CPSS, we definitely wonder sparkles wouldappear. Will it conquer challenges of security and privacy toIoT entities? Blockchain (BC) technology, which underpinsthe cryptocurrency Bitcoin, has played an important rolein the development of decentralized and data intensiveapplications running on millions of devices. In this paper,C. Qu et al. propose a framework with layers, intersect, andself-organization Blockchain Structures (BCS) to establishthe relationship between IoT and BC for device credibilityverification. �is new framework demonstrates the validityof the proposed credibility verification method, as well asenhancement in storage expenses and response time.

�erefore, in our opinion, this special issue brings noveland comprehensive insights into the essential techniquesfor Security, Privacy, and Trust for Cyber-Physical-SocialSystems. We hope that this information will contribute todevelop CPSS more secure and reliable.

Conflicts of Interest

�e editors declare that they have no conflicts of interestregarding the publication of this special issue.

Laurence T. YangWei Wang

Gregorio Martinez PerezWilly Susilo

International Journal of

AerospaceEngineeringHindawiwww.hindawi.com Volume 2018

RoboticsJournal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Shock and Vibration

Hindawiwww.hindawi.com Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwww.hindawi.com

Volume 2018

Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwww.hindawi.com Volume 2018

International Journal of

RotatingMachinery

Hindawiwww.hindawi.com Volume 2018

Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Navigation and Observation

International Journal of

Hindawi

www.hindawi.com Volume 2018

Advances in

Multimedia

Submit your manuscripts atwww.hindawi.com