TY - CHAP
T1 - Secure and Resilient Design of Could-Enabled CPS
AU - Zhu, Quanyan
AU - Xu, Zhiheng
N1 - Publisher Copyright:
© 2020, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Cloud computing enables resource-constrained CPSs to outsource heavy computations to a cloud server with massive computational resources. However, Cloud-Enabled CPSs introduce new challenges arising from the trustworthiness of the cloud and the cyber-physical connections between the control system and the cloud. To address these concerns, this chapter presents a secure and resilient mechanism, which employs customized cryptographic tools to encrypt the data of a control problem and develops verification methods to guarantee the integrity of the computational results from the cloud. In addition, our design enables a Switching Mode Mechanism (SMM) to provide resiliency to the CPSs when the system successively fails to receive correct control inputs from the cloud. We demonstrate that the mechanism can achieve data confidentiality and integrity, guarantee the stability, and enhance the resiliency. Finally, an Unmanned Aerial Vehicle (UAV) example is used to corroborate these properties.
AB - Cloud computing enables resource-constrained CPSs to outsource heavy computations to a cloud server with massive computational resources. However, Cloud-Enabled CPSs introduce new challenges arising from the trustworthiness of the cloud and the cyber-physical connections between the control system and the cloud. To address these concerns, this chapter presents a secure and resilient mechanism, which employs customized cryptographic tools to encrypt the data of a control problem and develops verification methods to guarantee the integrity of the computational results from the cloud. In addition, our design enables a Switching Mode Mechanism (SMM) to provide resiliency to the CPSs when the system successively fails to receive correct control inputs from the cloud. We demonstrate that the mechanism can achieve data confidentiality and integrity, guarantee the stability, and enhance the resiliency. Finally, an Unmanned Aerial Vehicle (UAV) example is used to corroborate these properties.
UR - http://www.scopus.com/inward/record.url?scp=85096379517&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85096379517&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-60251-2_4
DO - 10.1007/978-3-030-60251-2_4
M3 - Chapter
AN - SCOPUS:85096379517
T3 - Advances in Information Security
SP - 25
EP - 41
BT - Advances in Information Security
PB - Springer
ER -