Privacy Protection for Data-Driven Smart Manufacturing Systems

The Industrial Internet of Things IIoT is a new industrial ecosystem that combines intelligent and autonomous machines, advanced predictive analytics, and machine-human collaboration to improve productivity, efficiency and reliability. The integration of industry and IoT creates various attack surfaces and new opportunities for data breaches. In the IIoT context, it will often be the case that data is considered sensitive. This is because data will encapsulate various aspects of industrial operation, including highly sensitive information about products, business strategies, and companies. The transition to more open network architectures and data sharing of IoT poses challenges in manufacturing and industrial markets. The loss of sensitive information can lead to significant business loss and cause reputational damage. In this paper, the authors discuss emerging issues that are related to IIoT data sharing, investigate possible technological solutions to hide sensitive information and discuss some privacy management techniques in smart manufacturing systems.

[1]  Elgar Fleisch,et al.  Business Models and the Internet of Things (Extended Abstract) , 2014, OpenIoT@SoftCOM.

[2]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[3]  Ashutosh Saxena,et al.  A neural network approach for data masking , 2011, Neurocomputing.

[4]  Peter Priller,et al.  Securing smart maintenance services: Hardware-security and TLS for MQTT , 2015, 2015 IEEE 13th International Conference on Industrial Informatics (INDIN).

[5]  Rainer Drath,et al.  Industrie 4.0: Hit or Hype? [Industry Forum] , 2014, IEEE Industrial Electronics Magazine.

[6]  H. Nachtmann,et al.  SUPPLY CHAIN INFORMATION SHARING IN A VENDOR MANAGED INVENTORY PARTNERSHIP , 2004 .

[7]  Peter Friess,et al.  Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .

[8]  Ching-Hsien Hsu,et al.  Offloading mobile data traffic for QoS-aware service provision in vehicular cyber-physical systems , 2016, Future Gener. Comput. Syst..

[9]  Rupa Parameswaran A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering , 2006 .

[10]  Jeong-A Lee,et al.  An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks , 2015, Sensors.

[11]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[12]  Dan Lin,et al.  Data protection models for service provisioning in the cloud , 2010, SACMAT '10.

[13]  L. Men,et al.  Corporate Reputation Measurement and Evaluation , 2013 .

[14]  Roberta Bragg Cissp Training Guide [With CDROM] , 2002 .

[15]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[16]  Boris Otto,et al.  Design Principles for Industrie 4.0 Scenarios , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[17]  J. D. Osborn,et al.  Trusted Platform Module Evolution , 2015 .

[18]  Ching-Hsien Hsu,et al.  A Vertical Handoff Method via Self-Selection Decision Tree for Internet of Vehicles , 2016, IEEE Systems Journal.

[19]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[20]  Satish Narayana Srirama,et al.  ADAPTIVE MOBILE CLOUD WORKFLOW MANAGEMENT SYSTEM FOR SERVICE DISCOVERY IN PROXIMITY-BASED INTERNET OF THINGS , 2015 .

[21]  Ching-Hsien Hsu,et al.  Collaboration reputation for trustworthy Web service selection in social networks , 2016, J. Comput. Syst. Sci..

[22]  Cong Wang,et al.  Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[23]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[24]  Ravindra S. Hegadi,et al.  A Survey on Recent Trends, Process and Development in Data Masking for Testing , 2011 .

[25]  Douglas M. Blough,et al.  A robust data obfuscation approach for privacy preserving collaborative filtering , 2006 .

[26]  Myung Ho Kim,et al.  Towards a respondent-preferred ki-anonymity model , 2015, Frontiers of Information Technology & Electronic Engineering.

[27]  Myung Ho Kim,et al.  Towards Self-Awareness Privacy Protection for Internet of Things Data Collection , 2014, J. Appl. Math..

[28]  Min Chen,et al.  A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.

[29]  Zibin Zheng,et al.  Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems , 2015, IEEE Transactions on Services Computing.

[30]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[31]  Michael R Brule,et al.  Big Data in Exploration and Production: Real-Time Adaptive Analytics and Data-Flow Architecture , 2013 .

[32]  Felix Wortmann,et al.  Business Models and the Internet of Things , 2014 .

[33]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[34]  Incheon Paik,et al.  Intelligent Big Data Analysis Architecture Based on Automatic Service Composition , 2015, 2015 IEEE International Congress on Big Data.

[35]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[36]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[37]  Myung Ho Kim,et al.  Data protection in the industrial internet of things , 2016, IoT 2016.

[38]  R. Cagliano,et al.  A Journey through Manufacturing and Supply Chain Strategy Research : A Tribute to Professor Gianluca Spina , 2016 .

[39]  Terje Gjøsæter,et al.  Secure Information Sharing in an Industrial Internet of Things , 2016, ArXiv.

[40]  Thomas F. Edgar,et al.  Smart manufacturing, manufacturing intelligence and demand-dynamic performance , 2012, Comput. Chem. Eng..

[41]  Steven L. Kinney Trusted Platform Module Basics: Using TPM in Embedded Systems (Embedded Technology) , 2006 .

[42]  David G. Stork,et al.  Pattern Classification , 1973 .

[43]  David Hyman Gordon,et al.  Renewable Energy Resources , 1986 .

[44]  Saman A. Zonouz,et al.  Detecting Industrial Control Malware Using Automated PLC Code Analytics , 2014, IEEE Security & Privacy.

[45]  Idit Keidar,et al.  Distributed data classification in sensor networks , 2010, PODC.

[46]  K. Schwab The Fourth Industrial Revolution , 2013 .