Securing Information Against Manipulation in the Production Systems Engineering Process

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Modern engineering projects often include extensive cooperation with partners as well as external experts, either due to specific knowledge required that cannot be acquired otherwise or even due to rules and regulations that have to be obeyed to enter a specific market. Still, Production Systems Engineering (PSE) processes contain significant intrinsic and explicit knowledge that is a key resource of a partner. Therefore, the partners in such a collaborative process need to protect their vital knowledge assets while still being forced to sharemuch of the information, thus rendering proactive solutions for information protection infeasible. Information fingerprinting has been used as a reactive measure in many data-based information processes. While fingerprinting does not hinder unsolicited information exchange, fingerprinting techniques can be used to prove ownership of information and to determine the leaking partner. In addition, expert information is integrated into the overall process, requiring means to hold single participants responsible for errors and/or other issues. Still, in current environments, manipulation of information is largely possible. This becomes especially problematic in cases where the expert information is used as input in intelligent algorithms, thus rendering any chance of simple detection impossible, even for the expert originally entering the information. In this chapter, we adopt an approach for providing information integrity in the so-called doctor in the loop Holzinger (Brain Inform 3(2):119-131, 2016) systems in order to fit the PSE process and its special requirements and combine it with fingerprinting methods for protecting the ownership of vital information assets. Furthermore, we extend this approach to not only control datamanipulation but also access to sensitive information. In order to furthermitigate attacks targeting data exfiltration, we provide two newapproaches for logging SELECT-queries in away that cannot bemanipulated even by attacks in the possession of administrator privileges.

Cite

CITATION STYLE

APA

Kieseberg, P., & Weippl, E. (2019). Securing Information Against Manipulation in the Production Systems Engineering Process. In Security and Quality in Cyber-Physical Systems Engineering (pp. 335–356). Springer International Publishing. https://doi.org/10.1007/978-3-030-25312-7_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free