security, privacy, and trust for cyberphysical-social systems
TRANSCRIPT
EditorialSecurity, Privacy, and Trust for Cyberphysical-Social Systems
Laurence T. Yang ,1 Wei Wang,2 Gregorio Martinez Perez ,3 and Willy Susilo 4
1Department of Computer Science, St. Francis Xavier University, Canada2School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, 430074 Hubei, China3Department of Information and Communications Engineering, University of Murcia, Spain4School of Computing and Information Technology, University of Wollongong, Australia
Correspondence should be addressed to Laurence T. Yang; [email protected]
Received 24 December 2018; Accepted 24 December 2018; Published 3 February 2019
Copyright © 2019 Laurence T. Yang et al.�isis an openaccess article distributed under theCreativeCommonsAttribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
A total of 19 manuscripts were received in the final editionof this special issue, and only 8 of these were accepted. �isissue covers two frontier topics that areCyber-Physical-SocialSystems (CPSS) and security. �is special issue started sincewe notice that Cyber-Physical-Social Systems (CPSS) includethe cyber world, physical world, social world, and theirintegrations such as the CPS/IoT (the integration of the cyberworld and physical world) and the social computing (theintegration of the cyber world and the social world), whileany of the three suffers tremendous of threats on security.�eultimate goal of CPSS is to provide proactive and personalservices for humans. Accordingly, one of the most importantconcerns of CPSS is to protect sensitive or private data,guarantee user privacy, and ensure the system trustworthy.CPSS security, privacy, and trust as a new research anddevelopment field require further development and advancesof the corresponding models and methodologies for effectiveconnections among physical, cyber, and social worlds.
�e received manuscripts cover all involved worlds inCPSS and most challenging attacks that would meet in CPSS.We selected 8 papers that are well structured, written, andcontributive for CPSS security issue.
As the fundamental of CPSS, sensors always act ashardware support that connects data of physical world tohuman being. However, both security guarantee and energyconsumption constrain the developments of sensors in CPSSwhile privacy data may involve, for example, camera and e-health. C. A. Lara-Nino et al. explore the effects of authenti-cated encryption to hardware implementation in the physicalworld phase and accordingly present generic compositionof authenticated encryption on FPGA chips, which bringslightweight cryptography with lowered power consumption.
Additionally, W. Qiang et al. propose P-CFI, a fine-grainedControl-Flow Integrity (CFI) method, to protect CPS againstmemory-related attacks. �ey choose points-to analysis toconstruct the legitimate target set for every indirect call citeand check whether the target of the indirect call cite is in thelegitimate target set at runtime.
On an orthogonal direction, J. Hingant et al. introduceHYBINT, an enhanced intelligence system that provides thenecessary decision-making support for an efficient criticalinfrastructures protection by combining the real-time situa-tion of the physical and cyber domains in a single visualiza-tion space. HYBINT is a real cross-platform solution whichsupplies, through Big Data analytical methods and advancedrepresentation techniques, hybrid intelligence informationfrom significant data of both physical and cyber data sourcesin order to bring an adequate hybrid situational awareness(HSA) of the cyber-physical environment. �e HYBINTsystem consists of three main modules: Data GatheringModules, Data Analysis Modules, and Data VisualizationModule. In another article, Y. Zhu et al. propose an approx-imate Fast privacy-preserving equality Test Protocol (FTP),which can securely complete string equality test and achievehigh running efficiency at the cost of little accuracy loss.�ey strictly analyze the accuracy of our proposed schemeand formally prove its security. Additionally, they leverageextensive simulation experiments to evaluate the runningcost, which confirms its high efficiency.
Z. Ma et al. consider privacy issues related to the socialworld and construct a personalized and continuous locationprivacy-preserving framework calledGLPP in account linkedplatforms with different LBSs (Location-Based Services). �eframework GLPP obfuscates every location in local search
HindawiSecurity and Communication NetworksVolume 2019, Article ID 2964673, 2 pageshttps://doi.org/10.1155/2019/2964673
2 Security and Communication Networks
before submission and performs better than initial protectionin accuracy, certainty, and correctness. Meanwhile it can alsoprovide a good user experience without much loss in locationutility.
�e remaining articles show more interests on crypto-graphic techniques.
In application layer, data security and privacy are themostserious issues that would raise great concerns from userswhen they adopt cloud systems to handle data collaboration.However, different cryptographic techniques are deployed indifferent cloud service providers, which make cross-clouddata collaboration to be a deeper challenge. Q. Huang etal. discuss the challenge and the possible solution basedon conditional proxy reencryption and then realize thesolution through an adaptive secure cross-cloud data col-laboration scheme with identity-based cryptography (IBC)and proxy reencryption (PRE) techniques. �e leverage ofthose cryptographic technologies brings the cyber world inCPSS with data confidentiality and flexible data migrationamong ciphertexts encrypted in identity-based encryptionmanner and ciphertexts encrypted in identity-based broad-cast encryptionmanner. Another article concentrates on real-time encrypted transmission for devices in IoT. C.Wang et al.introduce an instant encrypted transmission based securityscheme for devices in IoTwhich guarantees both security andinstant responses for IoT data with bilinear pairing and ID-based signature.
�ere are also researches on Blockchain, a popular topicin security area.
When a popular technology, for instance, Blockchain,involves in CPSS, we definitely wonder sparkles wouldappear. Will it conquer challenges of security and privacy toIoT entities? Blockchain (BC) technology, which underpinsthe cryptocurrency Bitcoin, has played an important rolein the development of decentralized and data intensiveapplications running on millions of devices. In this paper,C. Qu et al. propose a framework with layers, intersect, andself-organization Blockchain Structures (BCS) to establishthe relationship between IoT and BC for device credibilityverification. �is new framework demonstrates the validityof the proposed credibility verification method, as well asenhancement in storage expenses and response time.
�erefore, in our opinion, this special issue brings noveland comprehensive insights into the essential techniquesfor Security, Privacy, and Trust for Cyber-Physical-SocialSystems. We hope that this information will contribute todevelop CPSS more secure and reliable.
Conflicts of Interest
�e editors declare that they have no conflicts of interestregarding the publication of this special issue.
Laurence T. YangWei Wang
Gregorio Martinez PerezWilly Susilo
International Journal of
AerospaceEngineeringHindawiwww.hindawi.com Volume 2018
RoboticsJournal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Active and Passive Electronic Components
VLSI Design
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Shock and Vibration
Hindawiwww.hindawi.com Volume 2018
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawiwww.hindawi.com
Volume 2018
Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com
The Scientific World Journal
Volume 2018
Control Scienceand Engineering
Journal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com
Journal ofEngineeringVolume 2018
SensorsJournal of
Hindawiwww.hindawi.com Volume 2018
International Journal of
RotatingMachinery
Hindawiwww.hindawi.com Volume 2018
Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawiwww.hindawi.com Volume 2018
Hindawiwww.hindawi.com Volume 2018
Navigation and Observation
International Journal of
Hindawi
www.hindawi.com Volume 2018
Advances in
Multimedia
Submit your manuscripts atwww.hindawi.com