Many Cyber Physical Systems (CPSs) and Internet of Things (IoT) devices are constrained in terms of computation speed, memory, power, area and bandwidth. As they interact with the physical world, various aspects such as safety, security, and privacy should be considered while processing personal data. Systems should continue operating even under harsh conditions and when the network connections (e.g., to the cloud) are lost. If that happens and the storage capacity is limited, sensor data may be overwritten irrevocably. This paper presents preliminary ideas and the planned research methodology to examine and define strategies to secure the data transfer from IoT devices which have limitations to edge devices and the cloud, and to overcome the situation when a device loses its connection, to mitigate data loss.
|Name||Communications in Computer and Information Science|
|Conference||6th International Workshop on Cyber-Security and Functional Safety in Cyber-Physical Systems, IWCFS 2022, 4th International Workshop on Machine Learning and Knowledge Graphs, MLKgraphs 2022, 2nd International Workshop on Time Ordered Data, ProTime2022, 2nd International Workshop on AI System Engineering: Math, Modelling and Software, AISys2022, 1st International Workshop on Distributed Ledgers and Related Technologies, DLRT2022 and 1st International Workshop on Applied Research, Technology Transfer and Knowledge Exchange in Software and Data Science, ARTE2022 held at 33rd International Conference on Database and Expert Systems Applications, DEXA 2022|
|Period||8/22/22 → 8/24/22|
ASJC Scopus subject areas
- Computer Science(all)