SlideShare une entreprise Scribd logo
1  sur  17
Security in Cloud-based Cyber-physical
Systems
•Date: November, 2015
•Linked to: RTD at FAST
Contact information
Tampere University of Technology,
FAST Laboratory,
P.O. Box 600,
FIN-33101 Tampere,
Finland
Email: fast@tut.fi
www.tut.fi/fast
Conference:
3PGCIC 2015
10th International Conference on P2P,
Parallel, Grid, Cloud and Internet
Computing
Title of the paper:
Security in Cloud-based Cyber-physical
Systems
Authors:
Juha Puttonen, Dr.Sc.
Samuel Olaiya Afolaranmi
Luis Gonzalez Moctezuma
Andrei Lobov, Dr.Sc.
Prof. Jose L. Martinez Lastra, Dr.Sc.
If you would like to receive a reprint of
the original paper, please contact us
Security in Cloud-based Cyber-
physical Systems
3PGCIC 2015
10th International Conference on P2P, Parallel, Grid, Cloud and Internet
Computing
Juha Puttonen
Samuel Olaiya Afolaranmi
Luis Gonzalez Moctezuma
Andrei Lobov
Jose L. Martinez Lastra
www.tut.fi/fast
http://www.youtube.com/user/fastlaboratory
Outline
• Recent Research on Security in Cloud-Based
Cyber-Physical Systems
• Security Challenges in Cyber-physical
Systems
–Factory Automation
–Smart Mobility Services
• Recapitulation
• Conclusions
4.11.20153PGCIC 2015 3
Recent Research on
Security in Cloud-Based
Cyber-Physical Systems (1/2)
• Cloud-based systems are accessed over the
internet → DoS and DDoS
–Pattern-based request filtering
Mobile Phone Networks [1] Smartphones [2]
● Availability of
Public services;
DoS
● Privacy; sensor
access
Vehicular Clouds [3]
● Context-awareness
● CVSMs
4.11.20153PGCIC 2015 4
Recent Research on
Security in Cloud-Based
Cyber-Physical Systems (2/2)
• Risk and threat analysis
– attack tree models considering
both the cyber and the physical
aspects [4]
– calculation of risk of each attack
path as a function of vulnerability
and threat [4]
• Object-oriented security requirements
analysis, specification, prioritization,
and policy development framework
[5]
Ultimate Goal
Sub Goal A Sub Goal B
Sub Goal C Sub Goal D
AND
[4]
User
Activities
Malicious
Activities
Prevention
Options
[5]
4.11.20153PGCIC 2015 5
OR
Smart Factory Automation
Systems: Introduction
• Provide production
operations as services
– Conveyor
• Transfer
– Robot
• Attach
• Load/Unload
• FASTory Simulator is also
available at
http://escop.rd.tut.fi:3000
4.11.20153PGCIC 2015 6
Smart Factory Automation
Systems: Software
Framework
4.11.20153PGCIC 2015 7
Conveyor Service
TransferStart
TransferStop
StateChanged
Service Orchestrator
AchieveGoal
CancelGoal
GoalStateChanged
Ontology Service
OntologyUpdated
ExecuteUpdate
ExecuteQuery
Cloud
Smart Factory Automation
Systems: Security
Challenges
4.11.20153PGCIC 2015 8
• Denial of service
–Central orchestrator service coordinates activities
•Unauthorized service requests
–Loss of material
–Production interruptions
•Unauthorized data manipulation
–Decisions based on system status model
•Confidentiality
–Production activities visible through service requests
Smart Mobility Services:
Introduction
• Provide mobility services to
citizens
• Promote environment-
friendly mobility habits
– Energy labels for
performance monitoring
• Trees
• Euros
• Energy (kWh)
– Point-based system for
incentives
Smart Mobility
Services
● Retrieve nearby transportation
facilities
● Retrieve journey options
● Retrieve energy consumption
status
● Journey option details
● User energy consumption
performance
4.11.20153PGCIC 2015 9
Smart Mobility Services:
System Components
Journey Planner Consumption Estimator
DetermineJourneyOptions CalculateJourneyProperties
Database Server
Weather ServiceTraffic ServiceDirection Service
Cloud 1
Cloud 2
GetBusDirections GetWeatherForecastGetTrafficStatus
● Provide journey plans for citizens
● Enable users to monitor their carbon footprint and physical exercise
● Users
● Journeys
4.11.20153PGCIC 2015 10
Smart Mobility Services:
Security Challenges (1/2)
Journey Planner Consumption Estimator
DetermineJourneyOptions CalculateJourneyProperties
Database
Server
Weather ServiceTraffic ServiceDirection Service
Cloud 1
Cloud 2
GetBusDirections GetWeatherForecastGetTrafficStatus
4.11.20153PGCIC 2015 11
Smart Mobility Services:
Security Challenges (2/2)
• Unauthorized database access
–personal user information
–user journey selections
• Capturing of network traffic
–database operations
–API passphrases
• Unauthorized use of credentials
–user authentication and authorization
• DoS attacks
4.11.20153PGCIC 2015 12
Recapitulation
• Cyber-physical production systems can be
orchestrated by web services deployed on
cloud resources
• Smart mobility systems may be composed of
several components and services deployed
over various computing clouds
• Multi-cloud deployments require meticulous
security considerations
4.11.20153PGCIC 2015 13
Conclusions
• Despite the security implications, cloud
resources are frequently necessary for cyber-
physical systems
• The selection of cloud service providers is
critical in multi-cloud deployments
–applications
–resources
• Systematic methods should be applied to
address security threats in cloud-based
systems
4.11.20153PGCIC 2015 14
Acknowledgements
This research was carried out in the context of the research projects MUlti-
cloud Secure Applications (MUSA) and ICT Cloud-based Platform and
Mobility Services: Available, Universal and Safe for all Users (MoveUs).
MUSA is under the EU Research and Innovation programme Horizon 2020
(H2020), grant agreement number 644429, and MoveUs is under the
European Commission’s 7th framework programme, grant agreement
number 608885.
http://www.musa-project.eu/
http://www.moveus-project.eu/
4.11.20153PGCIC 2015 15
References
[1] L. Liu, X. Zhang, G. Yan, and S. Chen, “Exploitation and Threat Analysis of Open Mobile Devices,” in Proceedings
of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ser. ANCS ’09. New
York, NY, USA: ACM, 2009, pp. 20–29.
[2] L. Lei, Y. Wang, J. Zhou, D. Zha, and Z. Zhang, “A Threat to Mobile Cyber-Physical Systems: Sensor-Based
Privacy Theft Attacks on Android Smartphones,” in 2013 12th IEEE International Conference on Trust, Security and
Privacy in Computing and Communications (TrustCom), Jul. 2013, pp. 126–133.
[3] J. Wan, D. Zhang, S. Zhao, L. Yang, and J. Lloret, “Context-aware vehicular cyber-physical systems with cloud
support: architecture, challenges, and solutions,” IEEE Communications Magazine, vol. 52, no. 8, pp. 106–113, Aug.
2014.
[4] F. Xie, T. Lu, X. Guo, J. Liu, Y. Peng, and Y. Gao, “Security Analysis on Cyber-physical System Using Attack Tree,”
in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 2013,
pp. 429–432.
[5] K. Fletcher and X. Liu, “Security Requirements Analysis, Specification, Prioritization and Policy Development in
Cyber-Physical Systems,” in 2011 5th International Conference on Secure Software Integration Reliability Improvement
Companion (SSIRI-C), Jun. 2011, pp. 106–113.
4.11.20153PGCIC 2015 16
Thank you!
FAST @ YouTube FAST @ Facebook FAST @ Slideshare

Contenu connexe

Tendances

Overview of OST Information Technology Programs March 2011
Overview of OST Information Technology Programs March 2011Overview of OST Information Technology Programs March 2011
Overview of OST Information Technology Programs March 2011
Rick Holgate
 

Tendances (10)

SmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine ComputationSmartSociety – A Platform for Collaborative People-Machine Computation
SmartSociety – A Platform for Collaborative People-Machine Computation
 
"Virtual" VREs - bringing research into the curriculum
"Virtual" VREs - bringing research into the curriculum"Virtual" VREs - bringing research into the curriculum
"Virtual" VREs - bringing research into the curriculum
 
Semantic Web Technologies for Intelligent Engineering Applications
Semantic Web Technologies for  Intelligent Engineering ApplicationsSemantic Web Technologies for  Intelligent Engineering Applications
Semantic Web Technologies for Intelligent Engineering Applications
 
Linked Data for Automation Systems Engineering
Linked Data for Automation Systems EngineeringLinked Data for Automation Systems Engineering
Linked Data for Automation Systems Engineering
 
Semantic Web for Advanced Engineering
Semantic Web for Advanced EngineeringSemantic Web for Advanced Engineering
Semantic Web for Advanced Engineering
 
Knowledge-based web service integration for industrial automation
Knowledge-based web service  integration for industrial automationKnowledge-based web service  integration for industrial automation
Knowledge-based web service integration for industrial automation
 
Umutcan Şimşek, Anna Fensel, Anastasios Zafeiropoulos, Eleni Fotopoulou, Pari...
Umutcan Şimşek, Anna Fensel, Anastasios Zafeiropoulos, Eleni Fotopoulou, Pari...Umutcan Şimşek, Anna Fensel, Anastasios Zafeiropoulos, Eleni Fotopoulou, Pari...
Umutcan Şimşek, Anna Fensel, Anastasios Zafeiropoulos, Eleni Fotopoulou, Pari...
 
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud SystemsICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
ICSOC 2015 Panel: Service Engineering Analytics in the IoT Cloud Systems
 
Overview of OST Information Technology Programs March 2011
Overview of OST Information Technology Programs March 2011Overview of OST Information Technology Programs March 2011
Overview of OST Information Technology Programs March 2011
 
TPAC2016 - From Linked Building Data to Building Data on the Web
TPAC2016 - From Linked Building Data to Building Data on the WebTPAC2016 - From Linked Building Data to Building Data on the Web
TPAC2016 - From Linked Building Data to Building Data on the Web
 

En vedette

ツイートするだけクライアント
ツイートするだけクライアントツイートするだけクライアント
ツイートするだけクライアント
森理 麟
 
Formulario general
Formulario generalFormulario general
Formulario general
kode99
 
Evaluation Question 2
Evaluation Question 2Evaluation Question 2
Evaluation Question 2
rturner93
 
Informe general
Informe generalInforme general
Informe general
kode99
 
Evaluation Activity 5
Evaluation Activity 5Evaluation Activity 5
Evaluation Activity 5
eoinb
 
How to look for specific news publications using the e journal portal_1011S
How to look for specific news publications using the e journal portal_1011SHow to look for specific news publications using the e journal portal_1011S
How to look for specific news publications using the e journal portal_1011S
mchiware
 
Q analysis
Q analysisQ analysis
Q analysis
Tyrrell
 
Clasificacion media maraton al paraiso 2011 esquel
Clasificacion media maraton al paraiso 2011  esquelClasificacion media maraton al paraiso 2011  esquel
Clasificacion media maraton al paraiso 2011 esquel
ACAM ATLETISMO
 
Data Warehouse Project-Report Analysis
Data Warehouse Project-Report AnalysisData Warehouse Project-Report Analysis
Data Warehouse Project-Report Analysis
Sunny U Okoro
 

En vedette (20)

MSC Temporary Passwords reset tool
MSC Temporary Passwords reset toolMSC Temporary Passwords reset tool
MSC Temporary Passwords reset tool
 
Qc runtime parameters_for_qtp_tests
Qc runtime parameters_for_qtp_testsQc runtime parameters_for_qtp_tests
Qc runtime parameters_for_qtp_tests
 
Pimec Recursos Humans i Formació
Pimec Recursos Humans i FormacióPimec Recursos Humans i Formació
Pimec Recursos Humans i Formació
 
ツイートするだけクライアント
ツイートするだけクライアントツイートするだけクライアント
ツイートするだけクライアント
 
Formulario general
Formulario generalFormulario general
Formulario general
 
Angel Meetup 2012
Angel Meetup 2012Angel Meetup 2012
Angel Meetup 2012
 
Evaluation Question 2
Evaluation Question 2Evaluation Question 2
Evaluation Question 2
 
Informe general
Informe generalInforme general
Informe general
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Evaluation Activity 5
Evaluation Activity 5Evaluation Activity 5
Evaluation Activity 5
 
spacelab_Vienna's Vocational Training Guarantee
spacelab_Vienna's Vocational Training Guaranteespacelab_Vienna's Vocational Training Guarantee
spacelab_Vienna's Vocational Training Guarantee
 
Speciation
SpeciationSpeciation
Speciation
 
How to look for specific news publications using the e journal portal_1011S
How to look for specific news publications using the e journal portal_1011SHow to look for specific news publications using the e journal portal_1011S
How to look for specific news publications using the e journal portal_1011S
 
Tolerant stud
Tolerant studTolerant stud
Tolerant stud
 
Q analysis
Q analysisQ analysis
Q analysis
 
Clasificacion media maraton al paraiso 2011 esquel
Clasificacion media maraton al paraiso 2011  esquelClasificacion media maraton al paraiso 2011  esquel
Clasificacion media maraton al paraiso 2011 esquel
 
theQuiz(3);
theQuiz(3);theQuiz(3);
theQuiz(3);
 
Drug
DrugDrug
Drug
 
Scientific Paper writing
Scientific Paper writingScientific Paper writing
Scientific Paper writing
 
Data Warehouse Project-Report Analysis
Data Warehouse Project-Report AnalysisData Warehouse Project-Report Analysis
Data Warehouse Project-Report Analysis
 

Similaire à Security in Cloud-based Cyber-physical Systems

ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networking
Rute C. Sofia
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
Karlos Svoboda
 

Similaire à Security in Cloud-based Cyber-physical Systems (20)

Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016
 
Activating 5G Research in Indonesia
Activating 5G Research in IndonesiaActivating 5G Research in Indonesia
Activating 5G Research in Indonesia
 
ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networking
 
Introduction to data interoperability
Introduction to data interoperabilityIntroduction to data interoperability
Introduction to data interoperability
 
Priorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network TechnologiesPriorities for Research on Current and Emerging Network Technologies
Priorities for Research on Current and Emerging Network Technologies
 
procent
procentprocent
procent
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
GAIA and Alternative Networks
GAIA and Alternative NetworksGAIA and Alternative Networks
GAIA and Alternative Networks
 
FIRE and FI-PPP
FIRE and FI-PPPFIRE and FI-PPP
FIRE and FI-PPP
 
IRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AIIRJET -Securing Data in Distributed System using Blockchain and AI
IRJET -Securing Data in Distributed System using Blockchain and AI
 
4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final4 w mobility-wpmc2008-final
4 w mobility-wpmc2008-final
 
ICT Innovation @UM
ICT Innovation @UMICT Innovation @UM
ICT Innovation @UM
 
Ms3422732277
Ms3422732277Ms3422732277
Ms3422732277
 
Jarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 CallsJarrar: Future Internet in Horizon 2020 Calls
Jarrar: Future Internet in Horizon 2020 Calls
 
Mastercourse Hortibusiness
Mastercourse HortibusinessMastercourse Hortibusiness
Mastercourse Hortibusiness
 
Data Science for IoT
Data Science for IoTData Science for IoT
Data Science for IoT
 
Cloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To MulticloudCloud Computing Security From Single To Multicloud
Cloud Computing Security From Single To Multicloud
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 

Dernier

Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Dernier (20)

The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptxMohammad_Alnahdi_Oral_Presentation_Assignment.pptx
Mohammad_Alnahdi_Oral_Presentation_Assignment.pptx
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Causes of poverty in France presentation.pptx
Causes of poverty in France presentation.pptxCauses of poverty in France presentation.pptx
Causes of poverty in France presentation.pptx
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 

Security in Cloud-based Cyber-physical Systems

  • 1. Security in Cloud-based Cyber-physical Systems •Date: November, 2015 •Linked to: RTD at FAST Contact information Tampere University of Technology, FAST Laboratory, P.O. Box 600, FIN-33101 Tampere, Finland Email: fast@tut.fi www.tut.fi/fast Conference: 3PGCIC 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing Title of the paper: Security in Cloud-based Cyber-physical Systems Authors: Juha Puttonen, Dr.Sc. Samuel Olaiya Afolaranmi Luis Gonzalez Moctezuma Andrei Lobov, Dr.Sc. Prof. Jose L. Martinez Lastra, Dr.Sc. If you would like to receive a reprint of the original paper, please contact us
  • 2. Security in Cloud-based Cyber- physical Systems 3PGCIC 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing Juha Puttonen Samuel Olaiya Afolaranmi Luis Gonzalez Moctezuma Andrei Lobov Jose L. Martinez Lastra www.tut.fi/fast http://www.youtube.com/user/fastlaboratory
  • 3. Outline • Recent Research on Security in Cloud-Based Cyber-Physical Systems • Security Challenges in Cyber-physical Systems –Factory Automation –Smart Mobility Services • Recapitulation • Conclusions 4.11.20153PGCIC 2015 3
  • 4. Recent Research on Security in Cloud-Based Cyber-Physical Systems (1/2) • Cloud-based systems are accessed over the internet → DoS and DDoS –Pattern-based request filtering Mobile Phone Networks [1] Smartphones [2] ● Availability of Public services; DoS ● Privacy; sensor access Vehicular Clouds [3] ● Context-awareness ● CVSMs 4.11.20153PGCIC 2015 4
  • 5. Recent Research on Security in Cloud-Based Cyber-Physical Systems (2/2) • Risk and threat analysis – attack tree models considering both the cyber and the physical aspects [4] – calculation of risk of each attack path as a function of vulnerability and threat [4] • Object-oriented security requirements analysis, specification, prioritization, and policy development framework [5] Ultimate Goal Sub Goal A Sub Goal B Sub Goal C Sub Goal D AND [4] User Activities Malicious Activities Prevention Options [5] 4.11.20153PGCIC 2015 5 OR
  • 6. Smart Factory Automation Systems: Introduction • Provide production operations as services – Conveyor • Transfer – Robot • Attach • Load/Unload • FASTory Simulator is also available at http://escop.rd.tut.fi:3000 4.11.20153PGCIC 2015 6
  • 7. Smart Factory Automation Systems: Software Framework 4.11.20153PGCIC 2015 7 Conveyor Service TransferStart TransferStop StateChanged Service Orchestrator AchieveGoal CancelGoal GoalStateChanged Ontology Service OntologyUpdated ExecuteUpdate ExecuteQuery Cloud
  • 8. Smart Factory Automation Systems: Security Challenges 4.11.20153PGCIC 2015 8 • Denial of service –Central orchestrator service coordinates activities •Unauthorized service requests –Loss of material –Production interruptions •Unauthorized data manipulation –Decisions based on system status model •Confidentiality –Production activities visible through service requests
  • 9. Smart Mobility Services: Introduction • Provide mobility services to citizens • Promote environment- friendly mobility habits – Energy labels for performance monitoring • Trees • Euros • Energy (kWh) – Point-based system for incentives Smart Mobility Services ● Retrieve nearby transportation facilities ● Retrieve journey options ● Retrieve energy consumption status ● Journey option details ● User energy consumption performance 4.11.20153PGCIC 2015 9
  • 10. Smart Mobility Services: System Components Journey Planner Consumption Estimator DetermineJourneyOptions CalculateJourneyProperties Database Server Weather ServiceTraffic ServiceDirection Service Cloud 1 Cloud 2 GetBusDirections GetWeatherForecastGetTrafficStatus ● Provide journey plans for citizens ● Enable users to monitor their carbon footprint and physical exercise ● Users ● Journeys 4.11.20153PGCIC 2015 10
  • 11. Smart Mobility Services: Security Challenges (1/2) Journey Planner Consumption Estimator DetermineJourneyOptions CalculateJourneyProperties Database Server Weather ServiceTraffic ServiceDirection Service Cloud 1 Cloud 2 GetBusDirections GetWeatherForecastGetTrafficStatus 4.11.20153PGCIC 2015 11
  • 12. Smart Mobility Services: Security Challenges (2/2) • Unauthorized database access –personal user information –user journey selections • Capturing of network traffic –database operations –API passphrases • Unauthorized use of credentials –user authentication and authorization • DoS attacks 4.11.20153PGCIC 2015 12
  • 13. Recapitulation • Cyber-physical production systems can be orchestrated by web services deployed on cloud resources • Smart mobility systems may be composed of several components and services deployed over various computing clouds • Multi-cloud deployments require meticulous security considerations 4.11.20153PGCIC 2015 13
  • 14. Conclusions • Despite the security implications, cloud resources are frequently necessary for cyber- physical systems • The selection of cloud service providers is critical in multi-cloud deployments –applications –resources • Systematic methods should be applied to address security threats in cloud-based systems 4.11.20153PGCIC 2015 14
  • 15. Acknowledgements This research was carried out in the context of the research projects MUlti- cloud Secure Applications (MUSA) and ICT Cloud-based Platform and Mobility Services: Available, Universal and Safe for all Users (MoveUs). MUSA is under the EU Research and Innovation programme Horizon 2020 (H2020), grant agreement number 644429, and MoveUs is under the European Commission’s 7th framework programme, grant agreement number 608885. http://www.musa-project.eu/ http://www.moveus-project.eu/ 4.11.20153PGCIC 2015 15
  • 16. References [1] L. Liu, X. Zhang, G. Yan, and S. Chen, “Exploitation and Threat Analysis of Open Mobile Devices,” in Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ser. ANCS ’09. New York, NY, USA: ACM, 2009, pp. 20–29. [2] L. Lei, Y. Wang, J. Zhou, D. Zha, and Z. Zhang, “A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones,” in 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Jul. 2013, pp. 126–133. [3] J. Wan, D. Zhang, S. Zhao, L. Yang, and J. Lloret, “Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions,” IEEE Communications Magazine, vol. 52, no. 8, pp. 106–113, Aug. 2014. [4] F. Xie, T. Lu, X. Guo, J. Liu, Y. Peng, and Y. Gao, “Security Analysis on Cyber-physical System Using Attack Tree,” in 2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Oct. 2013, pp. 429–432. [5] K. Fletcher and X. Liu, “Security Requirements Analysis, Specification, Prioritization and Policy Development in Cyber-Physical Systems,” in 2011 5th International Conference on Secure Software Integration Reliability Improvement Companion (SSIRI-C), Jun. 2011, pp. 106–113. 4.11.20153PGCIC 2015 16
  • 17. Thank you! FAST @ YouTube FAST @ Facebook FAST @ Slideshare