Industry 4.0: The Oil and Gas Sector Security and Personal Data Protection

Full Text (PDF, 342KB), PP.1-14

Views: 0 Downloads: 0


Tahmasib Fataliyev 1 Shakir Mehdiyev 1

1. Institute of Information Technology of ANAS, B. Vahabzadeh street, 9A, Baku, AZ1143, Azerbaijan

* Corresponding author.


Received: 17 Feb. 2020 / Revised: 2 Mar. 2020 / Accepted: 17 Mar. 2020 / Published: 8 Apr. 2020

Index Terms

Industry 4.0, Internet of things, cyber-physical systems, oil and gas sector security, personal data, protection of personal information.


Industry 4.0 is directly connected to the Internet of things, cyber-physical systems, artificial intelligence, robotics and other advanced technologies. It is these technologies that made fully automated digital production, controlled by intelligent systems in real-time with constant interaction via the Internet, a reality. They turned the production system into a “smart network factory”, where all activities are digitally controlled, and the use of financial and material resources becomes more efficient. Along with this, in Industry 4.0, a significant increase in data volumes brought to the forefront data protection issues, including in such a sensitive area as personal data. Illegitimate methods of using personal data to obtain additional preferences have become the goal of some communities of people. Video surveillance data are an integral part of personal data, therefore protection of personal data processed in video surveillance systems has been given increased attention. The video surveillance system includes video cameras, information and communication channels for data transmission, processing devices, analytics and personal data storage. The proposed model is a subsystem of smart video surveillance in the oil and gas sector, that consisting of such subsystems as a smart field, smart grid, smart maintenance, smart transportation, smart security, etc. Conceptual tasks are considered and recommendations for their solution are given.

Cite This Paper

Tahmasib Fataliyev, Shakir Mehdiyev. “Industry 4.0: The Oil and Gas Sector Security and Personal Data Protection", International Journal of Engineering and Manufacturing(IJEM), Vol.10, No.1, pp.1-14, 2020. DOI: 10.5815/ijem.2020.02.01


[1]Kagermann H., et al. Recommendations for implementing the strategic initiative INDUSTRIE 4.0: Securing the future of German manufacturing industry; Final report of the Industrie 4.0 Working Group, p. 79, 2013. Available at: dations-for-implementing-industry4-0-data.pdf

[2]Fataliyev T. Kh., Mehdiyev Sh. A., Analysis and new approaches to the solution of problems of operation of oil and gas complex as a cyber-physical system, International Journal of Information Technology and Computer Science (IJITCS), vol. 10, no. 11, pp. 67-76, 2018.

[3]Martinotti S., Nolten J., and Steinsbo J. A., Digitizing oil and gas production, 08/2014. Available at:

[4]Lua H., Guo L., Azimi M., Huang K., Oil and Gas 4.0 era: A systematic review and outlook, Computers in Industry, vol. 111, pp. 68-90, 2019.

[5]White paper: Enterprise maintenance with augmented reality. Available at:

[6]Compliance in the Era of Globetrotting Data. Available at:

[7]Universal Declaration of Human Rights 217(3) International bill of human rights. 10 December 1948.

[8]Weimer P. K., A historical review of the development of television pickup devices (1930-1976), IEEE Transactions on electron devices, vol. Ed-23, no. 7, pp. 739-752, July 1976.

[9]Shiraishi Y., History of Home Videotape Recorder Development, SMPTE Journal, vol. 94, no. 12, pp. 1257-1263, dec. 1985.

[10]IP CCTV solutions. Available at -solutions.pdf

[11]Sharma G., How Industry 4.0 is Reshaping Oil and Gas Recruitment. Available at:

[12]Thermal Imaging Provides Early Leak Detection in Oil and Gas Pipelines. Available at:

[13]Gómez C., Green D.R., Small unmanned airborne systems to support oil and gas pipeline monitoring and mapping, Arab J-l Geosci, vol. 10, no. 9, pp. 202-219, 2017.

[14]Applications. Available at:

[15]Alguliev R. M., etc. Sensor Networks: the State, Decisions and Prospects, Telecommunications and Radio Engineering, vol. 68, is. 15, pp. 1317-1327, 2009.

[16]Li H., The research of intelligent image recognition technology based on the neural network, International Conference on Intelligent Systems Research and Mechatronics Engineering. Atlantis Press, 2015.

[17]Tsakanikas V., Dagiuklas T., Video surveillance systems– current status and future trends, Computers and Electrical Engineering, vol. 70, pp. 736-753, August 2018. 

[18]Krauss C., Cyberattack shows the vulnerability of gas pipeline network, 2018. Available at:

[19]Simon T., Critical Infrastructure and the Internet of Things, Global commission on internet governance, no. 46, p. 20., January 2017.

[20]Alguliyev R. M., Fataliyev T. Kh., Mehdiyev Sh. A., The industrial internet of things: the evolution of automation in the oil and gas complex, SOCAR Proceedings, no. 2, pp. 66-71, 2019.

[21]General Data Protection Regulation (GDPR). Official Journal of the European Union, 2016, pp. 1-88.

[22]Rothstein M. A., Tovino S. A., California Takes the Lead on Data Privacy Law, Hastings Center Report, Vol. 49, No. 5, pp. 4–5. doi:10.1002/hast.1042.

[23]Yang F., Xu J., Privacy concerns in China's smart city campaign: The deficit of China's Cybersecurity Law Asia Pac Policy Stud. vol. 5, no. 3, pp. 533-543, 2018. doi10.1002/app5.246.

[24]Henschke A., Ethics in an Age of Surveillance. Personal information and virtual identities, Cambridge University Press, Cambridge, p. 334, 2017.

[25]Zuckerman L., Montana health record hackers compromise 1.3 million people. 2014. Available at:

[26]Dentons Boekel. GDPR Update — EDPB video surveillance guidelines. Available at:

[27]Rajpoot Q. M., Jensen C. D., Video Surveillance: Privacy Issues and Legal Compliance, Promoting Social Change and Democracy through Information Technology. IGI Global, pp.69-93, 2015.

[28]Costin A., Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations, TrustED '16: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, Austria, pp. 45-54, October 2016.

[29]Kushner D., The Real Story of Stuxnet, IEEE Spectrum, February 2013.

[30]Fataliyev T. Kh., Mehdiyev Sh. A., Integration of cyber-physical systems in e-science environment: state-of-the-art, problems and effective solutions, International Journal of Modern Education and Computer Science (IJMECS), Vol.11, No. 9, pp. 35-43, 2019.