Diagnostics of Processes - Cloud Concept Study

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1196)


This paper is principally aimed at presenting and discussing the plausibility of implementation of an idea of transferring diagnostics tasks to computational cloud. Particular attention was paid to diagnostics of industrial processes. Some crucial aspects, such as: broadcasting of diagnostic services, revolution in diagnostic management, technical support and cybersecurity issues are discussed, however on academic level.


Cloud computing Diagnostics of processes Model based diagnostics Cybersecurity 


  1. 1.
    Notarstefano, G., Notarnicola, S., Camisa, A.: Distributed optimization for smart cyber-physical networks. Found. Trends® Syst. Control 7(3), 253–383 (2019).
  2. 2.
    Korbicz, J., Kościelny, J.M. (eds.): Modeling, Diagnostics and Process Control: Implementation in the DiaSter System. Springer, Heidelberg (2010)Google Scholar
  3. 3.
    Kościelny, J.M.: Diagnostyka on-line procesów przemysłowych dużej skali. In: Kulczycki, P., Korbicz, J., Kacprzyk, J. (eds.) Automatyka, robotyka i przetwarzanie (2020)Google Scholar
  4. 4.
    Kościelny, J.M., Bartyś, M.: The requirements for a new layer in the industrial safety systems. In: 9th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, SafeProcess 2015, Paris, France, 2–4 September, pp. 1333–1338 (2015)Google Scholar
  5. 5.
    Kościelny, J.M., Syfert, M., Wnuk, P.: The idea of on-line diagnostics as a method of cyberattack recognition. In: International Conference on Diagnostics of Processes and Systems. Advanced Solutions in Diagnostics and Fault Tolerant Control, pp. 449–457. Springer (2017)Google Scholar
  6. 6.
    Van Long, D.: Sequential detection and isolation of cyber-physical attacks on SCADA systems. Theèse de doctorat de l”Universite de Technologie de Troyes (2015)Google Scholar
  7. 7.
    Kosmowski, K.T., Śliwiński, M., Barnert, T.: Functional safety and security assessment of the control and protection systems. In: Soares, G., Zio, E. (eds.) Safety and Reliability for Managing Risk. Taylor & Francis Group, London (2006)Google Scholar
  8. 8.
    Śliwiński, M.: Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej, vol. 171. Politechnika Gdańska, seria - monographs, Gdańsk (2018)Google Scholar
  9. 9.
    Kościelny, J.M., Bartyś, M.: The idea of smart diagnozers for decentralized diagnostics in industry 4.0. IEEE Xplore Digital Library (2019).
  10. 10.
    Kościelny, J.M., Syfert, M.: Application properties of methods for fault detection and isolation in the diagnosis of complex large-scale processes. Bull. Pol. Acad. Sci. Tech. Sci. 62(3), 571–582 (2014)Google Scholar
  11. 11.
    Isermann, R.: Fault Diagnosis Systems: An Introduction from Fault Detection to Fault Tolerance. Springer-Verlag, New York (2006)CrossRefGoogle Scholar
  12. 12.
    Wyczółkowski, R.: Metodyka detekcji i lokalizacji uszkodzeń sieci wodocia̧gowych z wykorzystaniem modeli przybliżonych, vol. 493. Politechnika Śla̧ska, Wydawnictwo Politechniki Śla̧skiej (2013)Google Scholar
  13. 13.
  14. 14.
  15. 15.
  16. 16.
  17. 17.
    Quevedo, J., Sánchez, H., Rotondo, D., Escobet, T., Puig, V.: A two-tank benchmark for detection and isolation of cyber attacks. IFAC-PapersOnLine 51(24), 770–775 (2018)CrossRefGoogle Scholar
  18. 18.
    Rebaï, S.B., Voos, H., Amin, S., Alamdari, S.: A contribution to cyber-physical systems security: an event-based attack-tolerant control approach. IFAC-PapersOnLine 51(24), 957–962 (2018)CrossRefGoogle Scholar
  19. 19.
    Stouffer, K.A., Falco, J.A., Scarfone, K.A.: SP 800-82. Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States (2011)Google Scholar
  20. 20.
    Almorsy, M., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of the APSEC 2010 Cloud Workshop, Sydney, Australia (2010)Google Scholar
  21. 21.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Warsaw University of TechnologyWarszawaPoland

Personalised recommendations