Securing Unified Data Models in Cyber Physical Systems: STRIDE–Based Approach

Authors

  • Eddie Musana Busitema University
  • Dr. Davis Matovu Busitema University
  • Dr. Richard Angole Okello Busitema University
  • Dr. Andrew Lukyamuzi Busitema University

DOI:

https://doi.org/10.47941/ijce.3419

Keywords:

Cyber Physical Systems, Data Security, Unified Data Models

Abstract

Purpose: This paper proposes a Secure Unified Data Model (UDM) Approach that enhances data security, trust, and reliability in Cyber-Physical Systems (CPS) by addressing data security risks such as breaches and unauthorized access.

Methodology: The methodology involved several steps. Reviewing existing literature to understand the current state of data modeling in Cyber-Physical Systems (CPS) and identify potential vulnerabilities. Supported by threat modeling and risk assessment frameworks, it analyzed data security risks for the Unified Data Model (UDM) in CPS. The focus was on protecting the UDM through strong encryption, access controls, security training, and regular assessments, safeguarding data at rest and in transit.

Findings: The findings show that a Secure Unified Data Model (UDM) approach improves data security in Cyber-Physical Systems (CPS) by strengthening access controls, encryption, and anomaly detection, thereby increasing CPS resilience against cyber threats. This promotes adoption in healthcare, smart cities, and governance. The secure UDM in CPS lowers breach risks, protects vendors and organizations, and offers scalable solutions that enhance productivity and reduce analytics costs. It supports safe data visualization, Business Intelligence (BI), and Artificial Intelligence (AI) tools, with potential applications in law enforcement for secure information sharing. The Secure UDM boosts trust, reliability, and compliance with data protection laws, encouraging adoption and innovation in critical sectors.

Unique Contribution to Theory, Practice and Policy: involves developing a conceptual Secure UDM framework that combines access controls, encryption, and anomaly detection for CPS. It also enhances understanding of UDM security in CPS contexts. Practically, this study provides actionable strategies for implementing secure UDMs across sectors such as healthcare, smart cities, and governance, thereby improving data security and trust in CPS through practical mitigation measures. Policy-wise, the study informs data protection regulations and standards for CPS and UDMs and encourages the adoption of secure UDM practices in critical sectors.

Downloads

Download data is not yet available.

Author Biographies

Eddie Musana, Busitema University

PhD Candidate: Faculty of Engineering and Technology

Dr. Davis Matovu, Busitema University

Senior Lecturer, Faculty of Engineering and Technology

Dr. Richard Angole Okello, Busitema University

Senior Lecturer, Faculty of Science and Education

Dr. Andrew Lukyamuzi, Busitema University

Senior Lecturer, Faculty of Science and Education

References

Alexandre Diard. (2025, May 25). How to Advance Your Organization with Unified Data Models. Https://Peoplespheres.Com/How-to-Advance-Your-Organization-with-Unified-Data-Models/.

Barigye, C. (2024). Strengthening Cyber Safety and Ransomware Response | Financial Intelligence Authority. Press Release July 19, 2024. ICT Systems and Security Director at Finance Intelligence Authority (FIA). https://www.fia.go.ug/strengthening-cyber-safety-and-ransomware-response

Busari, W. A., & Bello, A. A. (2024). Security, Trust, and Privacy in Cyber-physical Systems (CPS). Proceedings of the 2024 2nd International Conference on Cyber Physical Systems, Power Electronics and Electric Vehicles, ICPEEV 2024. https://doi.org/10.1109/ICPEEV63032.2024.10932087

Goyal, P., Sharma, P., & Sharma, M. (2022). The importance of data encryption in data security. Jnao-Nu.ComP Goyal, P Sharma, M Sharma, A PareekJournal of Nonlinear Analysis and Optimization, 2022•jnao-Nu.Com, 13(1). https://doi.org/10.36893/JNAO.2022.V13I02.001-011

Li, F., Wu, X., & Han, H. (2025). Data-Driven Cyber Physical Systems. Data-Driven Cyber Physical Systems. https://doi.org/10.1007/978-981-96-8709-1

Madnick, S. E. (2023). The continued threat to personal data: Key factors behind the 2023 increase. https://www.apple.com.cn/newsroom/pdfs/The-Continued-Threat-to-Personal-Data-Key-Factors-Behind-the-2023-Increase.pdf

Makasiranondh, W., & … S. A. (2024). A Data Spoofing Encryption Algorithm for Data Security and Data Privacy. Ieeexplore.Ieee.OrgW Makasiranondh, S Angsirikul, A Aribarg2024 8th International Conference on Information Technology (InCIT), 2024•ieeexplore.Ieee.Org. https://ieeexplore.ieee.org/abstract/document/10810622/

Mubeen, M., Arslan, M., & Communication, G. A. (2022). Strategies to Avoid Illegal Data Access. Academia.EduM Mubeen, M Arslan, G AnandhiJournal of Communication Engineering & Systems, 2022•academia.Edu. https://www.academia.edu/download/111172139/29_40StrategiesToAvoidIllegalDataAccess.pdf

Nahla Davies. (2023, May 29). Should You Consider a Unified Data Model? https://www.dataversity.net/should-you-consider-a-unified-data-model/

Naik, N., Jenkins, P., Grace, P., Naik, D., Prajapat, S., & Song, J. (2024). A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN. Lecture Notes in Networks and Systems, 884 LNNS, 271–280. https://doi.org/10.1007/978-3-031-74443-3_16

Zubin et al. (2025, May 22). Unified or Siloed? Exploring the Best Strategies for Effectively Managing Your Data Resources. https://www.datadynamicsinc.com/blog-unified-or-siloed-whats-the-best-way-to-manage-your-data/

Downloads

Published

2026-01-05

How to Cite

Musana, E., Matovu, D., Okello, R. A., & Lukyamuzi, A. (2026). Securing Unified Data Models in Cyber Physical Systems: STRIDE–Based Approach. International Journal of Computing and Engineering, 8(1), 1–12. https://doi.org/10.47941/ijce.3419

Issue

Section

Articles