A Survey on Cryptographic Algorithms and Access Control Mechanisms to Develop Security to Cyber Physical Systems

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-50 Number-4
Year of Publication : 2017
Authors : M.Sharada Varalakshmi


M.Sharada Varalakshmi "A Survey on Cryptographic Algorithms and Access Control Mechanisms to Develop Security to Cyber Physical Systems". International Journal of Computer Trends and Technology (IJCTT) V50(4):167-171, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cyber Physical Systems (CPS) are sensing, communication and processing platforms, that are deeply embedded in physical processes and provide real time monitoring and actuation services. Securing a Cyber Physical System is of primary concern, as CPS is an automated unit that manages the information and physical process of an environment. Cyber Physical systems interact with the physical world wherein each system require different levels of security based on their sensitivity of information they carry. A high level of elevation is required on security for Cyber Physical System to counter the violations of security and preserve the privacy of the integrated systems. It is highly important to provide security to CPS. Confidentiality and Access Control are two important factors that need to be handled to provide protection to the information of CPS.

[1] Bardram, Jakob E., Rasmus E. Kjær, and Michael Ø. Pedersen. "Context-aware user authentication–supporting proximity-based login in pervasive computing." International Conference on Ubiquitous Computing. Springer Berlin Heidelberg, 2003.
[2] Bell, David Elliott. "Looking back at the bell-la padula model." Computer Security Applications Conference, 21st Annual. IEEE, 2005.
[3] Bell, D. Elliott, and Leonard J. La Padula. Secure computer system: Unified exposition and multics interpretation. No. MTR-2997-REV-1. MITRE CORP BEDFORD MA, 1976.
[4] Covington, Michael J., et al. "Securing context-aware applications using environment roles." Proceedings of the sixth ACM symposium on Access control models and technologies. ACM, 2001.
[5] Esposito, Floriana, Donate Malerba, and Giovanni Semeraro. "Decision tree pruning as a search in the state space." European Conference on Machine Learning. Springer Berlin Heidelberg, 1993.
[6] Harrison, Michael A., Walter L. Ruzzo, and Jeffrey D. Ullman. "Protection in operating systems." Communications of the ACM 19.8 (1976): 461-471.
[7] Lunt, Teresa F., et al. "The SeaView security model." IEEE Transactions on software engineering 16.6 (1990): 593-607.
[8] S. Mehrotra, Kalashnikov, Dmitri V., et al. "Index for fast retrieval of uncertain spatial point data." Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems. ACM, 2006.
[9] Lewis, David, and William Gale. "Training text classifiers by uncertainty sampling." (1994).
[10] Ngai, Eric WT, Li Xiu, and Dorothy CK Chau. "Application of data mining techniques in customer relationship management: A literature review and classification." Expert systems with applications 36.2 (2009): 2592-2602.

CPS, DES Algorithm, Cryptographic