According to the essential characteristic of industrial control system (ICS), the endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS), the basic principles and functional requirements as well as protection architecture (TEMt) of ESS are proposed, the successful experience of electric power control system is introduced.
{"title":"Protection Architecture of Endogenous Safety and Security for Industrial Control Systems","authors":"Yaozhong Xin","doi":"10.1051/sands/2023001","DOIUrl":"https://doi.org/10.1051/sands/2023001","url":null,"abstract":"According to the essential characteristic of industrial control system (ICS), the endogenous safety and security (ESS) can be achieved by merging cyber security (CS) into functional safety (FS), the basic principles and functional requirements as well as protection architecture (TEMt) of ESS are proposed, the successful experience of electric power control system is introduced.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"135 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79500138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nan Li, Minxian Xu, Qimeng Li, Jikui Liu, Shudi Bao, Ye Li, Jianzhong Li, Hairong Zheng
Precision medicine provides a holistic view of a person’s health that combines genes, environment and lifestyle, aiming at realizing the individualized therapy. With the developing of Internet of Things (IOT) devices, widespread emergence of Electronic Medical Records (EMR), booming of cloud computing and artificial intelligence, it provides an opportunity to collect the healthcare big data throughout the lifespan and analyze the disease risk at all stages of life. Thus, precision medicine is shifting to the focus from treatment to prediction and prevention, namely precision health. To achieve this goal, different types of data, such as omics, imaging, EMR, continuous physiological monitoring, lifestyle, and environmental information need to be collected, tracked, managed and shared. For this purpose, Internet-of-Medical Things (IoMT) is playing a vital role in bringing together the health systems, applications, services and devices, that can improve the speed and accuracy of diagnosis and treatments, and monitor and modify patient behaviour and health status in real time. However, due to the proliferation of IoMT devices, security has become a growing concern. The increasing interconnectivity of IoMT-enabled devices with the health data reception, transmission, and processing significantly increases the number of potential vulnerabilities within a system. To address the security issues for precision health in IoMT systems, in this article, we review the state-of-the-art techniques and schemes from the perspective of a hierarchical system architecture. We present an IoMT system model consisting of three layers: the sensing layer, the network layer and the cloud infrastructure layer. In each layer, we discuss the security vulnerabilities and threats, and review the existing security techniques and schemes corresponding to the system components and their functionalities. Due to the unique nature of biometric features in medical and health services, we highlight the biometrics-based technologies applied in IoMT systems, which makes a great difference from the security solutions in other existing IoT systems. Finally, we summarize the challenges and future research directions in IoMT systems for a better and more secure future of precision health.
{"title":"A Review on Security Issues and Solutions for Precision Health in Internet-of-Medical-Things Systems","authors":"Nan Li, Minxian Xu, Qimeng Li, Jikui Liu, Shudi Bao, Ye Li, Jianzhong Li, Hairong Zheng","doi":"10.1051/sands/2022010","DOIUrl":"https://doi.org/10.1051/sands/2022010","url":null,"abstract":"Precision medicine provides a holistic view of a person’s health that combines genes, environment and lifestyle, aiming at realizing the individualized therapy. With the developing of Internet of Things (IOT) devices, widespread emergence of Electronic Medical Records (EMR), booming of cloud computing and artificial intelligence, it provides an opportunity to collect the healthcare big data throughout the lifespan and analyze the disease risk at all stages of life. Thus, precision medicine is shifting to the focus from treatment to prediction and prevention, namely precision health. To achieve this goal, different types of data, such as omics, imaging, EMR, continuous physiological monitoring, lifestyle, and environmental information need to be collected, tracked, managed and shared. For this purpose, Internet-of-Medical Things (IoMT) is playing a vital role in bringing together the health systems, applications, services and devices, that can improve the speed and accuracy of diagnosis and treatments, and monitor and modify patient behaviour and health status in real time. However, due to the proliferation of IoMT devices, security has become a growing concern. The increasing interconnectivity of IoMT-enabled devices with the health data reception, transmission, and processing significantly increases the number of potential vulnerabilities within a system. \u0000To address the security issues for precision health in IoMT systems, in this article, we review the state-of-the-art techniques and schemes from the perspective of a hierarchical system architecture. We present an IoMT system model consisting of three layers: the sensing layer, the network layer and the cloud infrastructure layer. In each layer, we discuss the security vulnerabilities and threats, and review the existing security techniques and schemes corresponding to the system components and their functionalities. Due to the unique nature of biometric features in medical and health services, we highlight the biometrics-based technologies applied in IoMT systems, which makes a great difference from the security solutions in other existing IoT systems. Finally, we summarize the challenges and future research directions in IoMT systems for a better and more secure future of precision health.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90094805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Safety and security are interrelated and both essential for connected automated vehicles (CAVs). They are usually investigated independently, followed in standards ISO 26262 and ISO/SAE 21434 respectively. However, more functional safety and security features of in-vehicle components making existing safety mechanisms weaken security mechanisms and vice versa. This results in a dilemma that the safety-critical and security-critical in-vehicle components can not be protected. In this paper, we propose a dynamic heterogeneous redundancy (DHR) architecture to enhance safety and security of CAVs simultaneously. We first investigate the current status of integrated safety and security analysis and explore the relationship between safety and security. Then, we propose a new taxonomy of in-vehicle components based on safety and security features. Finally, a dynamic heterogeneous redundancy (DHR) architecture is proposed to guarantee integrated functional safety and cyber security of connected vehicles for the first time. A case study on an automated bus shows that DHR architecture can not only detect unknown failures and ensure functional safety, but also detect unknown attacks to protect cyber security. Furthermore, we provide an in-depth analysis of quantification for CAVs performance using DHR architecture, and identify challenges and future research directions. Overall, the integrated safety and security enhancement is an emerging research.
{"title":"Integrated Safety and Security Enhancement of Connected Automated Vehicles Using DHR Architecture","authors":"Qi Liu, Yufeng Li, Xuehong Chen, Chenhong Cao","doi":"10.1051/sands/2022009","DOIUrl":"https://doi.org/10.1051/sands/2022009","url":null,"abstract":"Safety and security are interrelated and both essential for connected automated vehicles (CAVs). They are usually investigated independently, followed in standards ISO 26262 and ISO/SAE 21434 respectively. However, more functional safety and security features of in-vehicle components making existing safety mechanisms weaken security mechanisms and vice versa. This results in a dilemma that the safety-critical and security-critical in-vehicle components can not be protected. In this paper, we propose a dynamic heterogeneous redundancy (DHR) architecture to enhance safety and security of CAVs simultaneously. We first investigate the current status of integrated safety and security analysis and explore the relationship between safety and security. Then, we propose a new taxonomy of in-vehicle components based on safety and security features. Finally, a dynamic heterogeneous redundancy (DHR) architecture is proposed to guarantee integrated functional safety and cyber security of connected vehicles for the first time. A case study on an automated bus shows that DHR architecture can not only detect unknown failures and ensure functional safety, but also detect unknown attacks to protect cyber security. Furthermore, we provide an in-depth analysis of quantification for CAVs performance using DHR architecture, and identify challenges and future research directions. Overall, the integrated safety and security enhancement is an emerging research.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77499389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is strongly associated with privacy attributes. In other words, attackers could utilize it to infer privacy attributes with a certain probability, indirectly resulting in the disclosure of private information. To deal with the implicit privacy disclosure problem, we give a measurable definition of implicit privacy, and propose an ex-ante implicit privacy-preserving framework based on data generation, called IMPOSTER. The framework consists of an implicit privacy detection module and an implicit privacy protection module. The former uses normalized mutual information to detect implicit privacy attributes that are strongly related to traditional privacy attributes. Based on the idea of data generation, the latter equips the Generative Adversarial Network (GAN) framework with an additional discriminator, which is used to eliminate the association between traditional privacy attributes and implicit ones. We elaborate a theoretical analysis for the convergence of the framework. Experiments demonstrate that with the learned generator, IMPOSTER can alleviate the disclosure of implicit privacy while maintaining good data utility.
{"title":"Implicit privacy preservation: a framework based on data generation","authors":"Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang","doi":"10.1051/sands/2022008","DOIUrl":"https://doi.org/10.1051/sands/2022008","url":null,"abstract":"This paper addresses a special and imperceptible class of privacy, called implicit privacy. In contrast to traditional (explicit) privacy, implicit privacy has two essential properties: (1) It is not initially defined as a privacy attribute; (2) it is strongly associated with privacy attributes. In other words, attackers could utilize it to infer privacy attributes with a certain probability, indirectly resulting in the disclosure of private information. To deal with the implicit privacy disclosure problem, we give a measurable definition of implicit privacy, and propose an ex-ante implicit privacy-preserving framework based on data generation, called IMPOSTER. The framework consists of an implicit privacy detection module and an implicit privacy protection module. The former uses normalized mutual information to detect implicit privacy attributes that are strongly related to traditional privacy attributes. Based on the idea of data generation, the latter equips the Generative Adversarial Network (GAN) framework with an additional discriminator, which is used to eliminate the association between traditional privacy attributes and implicit ones. We elaborate a theoretical analysis for the convergence of the framework. Experiments demonstrate that with the learned generator, IMPOSTER can alleviate the disclosure of implicit privacy while maintaining good data utility.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84796803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems. It calls for more research attention on three aspects: (i) application of control and detection unified framework to enhancing the diagnosis capability of feedback control systems, (ii) projection-based fault detection, and complementary and explainable applications of projection- and machine learning-based techniques, and (iii) system performance degradation detection that is of elemental importance for today’s automatic control systems. Some ideas and conceptual schemes are presented and illustrated by means of examples, serving as convincing arguments for research efforts in these aspects. They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.
{"title":"A note on diagnosis and performance degradation detection in automatic control systems towards functional safety and cyber security","authors":"S. Ding","doi":"10.1051/sands/2022004","DOIUrl":"https://doi.org/10.1051/sands/2022004","url":null,"abstract":"This note addresses diagnosis and performance degradation detection issues from an integrated viewpoint of functionality maintenance and cyber security of automatic control systems. It calls for more research attention on three aspects: (i) application of control and detection unified framework to enhancing the diagnosis capability of feedback control systems, (ii) projection-based fault detection, and complementary and explainable applications of projection- and machine learning-based techniques, and (iii) system performance degradation detection that is of elemental importance for today’s automatic control systems. Some ideas and conceptual schemes are presented and illustrated by means of examples, serving as convincing arguments for research efforts in these aspects. They would contribute to the future development of capable diagnosis systems for functionality safe and cyber secure automatic control systems.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77793419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weiping Shi, Xinyi Jiang, Jinsong Hu, A. M. Abdelgader, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, F. Shu, Jiangzhou Wang
The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference. Physical layer security technology can effectively protect the private information sent by the transmitter from being listened to by illegal eavesdroppers, thus ensuring the privacy and security of communication between the transmitter and legitimate users. Thus, the main design goal of physical layer security is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes. The development of mobile communication presents new challenges to physical layer security research. This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques, including secure key generation, directional modulation (DM), spatial modulation (SM), covert communication, and intelligent reflecting surface (IRS)-aided communication. Finally, the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications.
{"title":"Physical layer security techniques for data transmission for future wireless networks","authors":"Weiping Shi, Xinyi Jiang, Jinsong Hu, A. M. Abdelgader, Yin Teng, Yang Wang, Hangjia He, Rongen Dong, F. Shu, Jiangzhou Wang","doi":"10.1051/sands/2022007","DOIUrl":"https://doi.org/10.1051/sands/2022007","url":null,"abstract":"The broadcast nature of wireless communication systems makes wireless transmission extremely susceptible to eavesdropping and even malicious interference. Physical layer security technology can effectively protect the private information sent by the transmitter from being listened to by illegal eavesdroppers, thus ensuring the privacy and security of communication between the transmitter and legitimate users. Thus, the main design goal of physical layer security is to increase the performance difference between the link of the legitimate receiver and that of the eavesdropper using well-designed transmission schemes. The development of mobile communication presents new challenges to physical layer security research. This paper provides a survey of the physical layer security research on various promising mobile technologies from secure key generation and keyless techniques, including secure key generation, directional modulation (DM), spatial modulation (SM), covert communication, and intelligent reflecting surface (IRS)-aided communication. Finally, the future topics and the unresolved technical challenges are presented in physical layer security for mobile communications.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"108 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75826652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the ubiquitous application of digital, intelligent, and network technologies, the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with functional or system failures caused by random ineffectiveness in the mechanical and electric age. In order to guarantee the functional safety for cyber physical systems (CPS) in cyberspace in the information age, it is impossible to avoid challenges of cyber security, especially “unknown unknown” network threats and attack events aimed at CPS systems, software/hardware facility vulnerabilities or loopholes and backdoors. Such challenges have a terrible ghost-haunted nature and attributes that cannot be expressed through mathematical models. They have gone beyond the random hypothetical premises of classical functional safety theories and mathematical nature to be expressed through probability, as well as shaken the foundations of conventional reliability theories, technological methodologies, and practice norms. Now the cyber security and functional safety in the key infrastructure of digital society are inter-twined or intermingled and are becoming more and more difficult to separate. There exist “double-skin” functional safety and cyber security governance modes, the functional failures of which are of completely different nature. They cannot be expected to acquire quantitative-design and verifiable “generalized functional safety” [1] features through “divide-and-rule” governance structures and mechanisms due to the incompatible logical problems and paradoxes in prerequisites and hypothetical premises. Therefore, it is urgent to develop integrated scientific theories, technological methodologies, and practice norms to deal with generalized functional safety problems. The scientific and technological community needs a high-level academic exchange platform focusing on theoretical research and technological developments in the interdisciplinary fields of cyber security and functional safety. We
{"title":"On integrated security and safety","authors":"Jiangxing Wu","doi":"10.1051/sands/2022002","DOIUrl":"https://doi.org/10.1051/sands/2022002","url":null,"abstract":"With the ubiquitous application of digital, intelligent, and network technologies, the connotation and denotation of functional safety have gone beyond the conventional reliability scope of dealing with functional or system failures caused by random ineffectiveness in the mechanical and electric age. In order to guarantee the functional safety for cyber physical systems (CPS) in cyberspace in the information age, it is impossible to avoid challenges of cyber security, especially “unknown unknown” network threats and attack events aimed at CPS systems, software/hardware facility vulnerabilities or loopholes and backdoors. Such challenges have a terrible ghost-haunted nature and attributes that cannot be expressed through mathematical models. They have gone beyond the random hypothetical premises of classical functional safety theories and mathematical nature to be expressed through probability, as well as shaken the foundations of conventional reliability theories, technological methodologies, and practice norms. Now the cyber security and functional safety in the key infrastructure of digital society are inter-twined or intermingled and are becoming more and more difficult to separate. There exist “double-skin” functional safety and cyber security governance modes, the functional failures of which are of completely different nature. They cannot be expected to acquire quantitative-design and verifiable “generalized functional safety” [1] features through “divide-and-rule” governance structures and mechanisms due to the incompatible logical problems and paradoxes in prerequisites and hypothetical premises. Therefore, it is urgent to develop integrated scientific theories, technological methodologies, and practice norms to deal with generalized functional safety problems. The scientific and technological community needs a high-level academic exchange platform focusing on theoretical research and technological developments in the interdisciplinary fields of cyber security and functional safety. We","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85738806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed. The method first estimates channel characteristics using the preamble in the communication frame, and then embeds channel characteristics into the I/Q modulator. After that, the modulated constellation diagram undergoes random hopping of the constellation position compared with the original constellation diagram, thus achieving the effect of secure transmission. Due to the reciprocity of the uplink and downlink channels, channel characteristics estimated by the downlink receiver are almost the same as those estimated by the uplink receiver, and the correct plaintext data can be recovered by performing corresponding demodulation with them. Compared with the existing scheme of quantizing channel characteristics and then encrypting data, the method reduces the performance loss caused by quantization. In addition, its bit error rate is lower than that of the quantization method. In general, it has higher security and convenience.
{"title":"Secure transmission technology based on direct modulation with random channel characteristics","authors":"Ronggeng Yang, A. Hu","doi":"10.1051/sands/2022006","DOIUrl":"https://doi.org/10.1051/sands/2022006","url":null,"abstract":"Aiming at the problem of insufficient security in the existing wireless data transmission, a security transmission technology based on direct modulation with random channel characteristics is proposed. The method first estimates channel characteristics using the preamble in the communication frame, and then embeds channel characteristics into the I/Q modulator. After that, the modulated constellation diagram undergoes random hopping of the constellation position compared with the original constellation diagram, thus achieving the effect of secure transmission. Due to the reciprocity of the uplink and downlink channels, channel characteristics estimated by the downlink receiver are almost the same as those estimated by the uplink receiver, and the correct plaintext data can be recovered by performing corresponding demodulation with them. Compared with the existing scheme of quantizing channel characteristics and then encrypting data, the method reduces the performance loss caused by quantization. In addition, its bit error rate is lower than that of the quantization method. In general, it has higher security and convenience.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74509080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety. In the current design of the cyber physical system (CPS), functional safety and cyber security are increasingly intertwined and inseparable, which evolve into the generalized functional safety (S&S) problem. The conventional reliability and cybersecurity technologies are unable to provide security assurance with quantifiable design and verification metrics in response to the cyberattacks in hardware and software with common endogenous security problems, and the functional safety of CPS facilities or device has become a frightening ghost. The dynamic heterogeneity redundancy (DHR) architecture and coding channel theory (CCT) proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner, and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation. As a generalized functional safety enabling structure, DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary fields of cyberspace.
{"title":"Problems and solutions regarding generalized functional safety in cyberspace","authors":"Jiangxing Wu","doi":"10.1051/sands/2022001","DOIUrl":"https://doi.org/10.1051/sands/2022001","url":null,"abstract":"The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety. In the current design of the cyber physical system (CPS), functional safety and cyber security are increasingly intertwined and inseparable, which evolve into the generalized functional safety (S&S) problem. The conventional reliability and cybersecurity technologies are unable to provide security assurance with quantifiable design and verification metrics in response to the cyberattacks in hardware and software with common endogenous security problems, and the functional safety of CPS facilities or device has become a frightening ghost. The dynamic heterogeneity redundancy (DHR) architecture and coding channel theory (CCT) proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner, and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation. As a generalized functional safety enabling structure, DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary fields of cyberspace.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86961391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.
{"title":"Concretely efficient secure multi-party computation protocols: survey and more","authors":"D. Feng, Kang Yang","doi":"10.1051/sands/2021001","DOIUrl":"https://doi.org/10.1051/sands/2021001","url":null,"abstract":"Secure multi-party computation (MPC) allows a set of parties to jointly compute a function on their private inputs, and reveals nothing but the output of the function. In the last decade, MPC has rapidly moved from a purely theoretical study to an object of practical interest, with a growing interest in practical applications such as privacy-preserving machine learning (PPML). In this paper, we comprehensively survey existing work on concretely efficient MPC protocols with both semi-honest and malicious security, in both dishonest-majority and honest-majority settings. We focus on considering the notion of security with abort, meaning that corrupted parties could prevent honest parties from receiving output after they receive output. We present high-level ideas of the basic and key approaches for designing different styles of MPC protocols and the crucial building blocks of MPC. For MPC applications, we compare the known PPML protocols built on MPC, and describe the efficiency of private inference and training for the state-of-the-art PPML protocols. Furthermore, we summarize several challenges and open problems to break though the efficiency of MPC protocols as well as some interesting future work that is worth being addressed. This survey aims to provide the recent development and key approaches of MPC to researchers, who are interested in knowing, improving, and applying concretely efficient MPC protocols.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80814972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}