Encrypted control for networked systems – An illustrative introduction and current challenges

10/01/2020
by   M. Schulze Darup, et al.
0

Cloud computing and distributed computing are becoming ubiquitous in many modern control systems such as smart grids, building automation, robot swarms or intelligent transportation systems. Compared to "isolated" control systems, the advantages of cloud-based and distributed control systems are, in particular, resource pooling and outsourcing, rapid scalability, and high performance. However, these capabilities do not come without risks. In fact, the involved communication and processing of sensitive data via public networks and on third-party platforms promote, among other cyberthreats, eavesdropping and manipulation of data. Encrypted control addresses this security gap and provides confidentiality of the processed data in the entire control loop. This paper presents a tutorial-style introduction to this young but emerging field in the framework of secure control for networked dynamical systems.

READ FULL TEXT

page 1

page 3

page 4

page 6

page 7

page 9

12/03/2018

Secure outsourced calculations with homomorphic encryption

With the rapid development of cloud computing, the privacy security inci...
01/28/2021

Cloud Computing Concept and Roots

Cloud computing is a particular implementation of distributed computing....
05/11/2022

Trusted Container Extensions for Container-based Confidential Computing

Cloud computing has emerged as a corner stone of today's computing lands...
06/23/2019

Secure Multi-party Computation for Cloud-based Control

In this chapter, we will explore the cloud-outsourced privacy-preserving...
12/04/2018

Exploiting Data Sensitivity on Partitioned Data

Several researchers have proposed solutions for secure data outsourcing ...
12/23/2020

State of the Art of Adaptive Cruise Control and Stop and Go Systems

This paper presents the state of the art of Adaptive Cruise Control (ACC...
10/13/2020

CryptMPI: A Fast Encrypted MPI Library

The cloud infrastructure must provide security for High-Performance Comp...