Secure Multi-party Computation for Cloud-based Control

by   Andreea B. Alexandru, et al.

In this chapter, we will explore the cloud-outsourced privacy-preserving computation of a controller on encrypted measurements from a (possibly distributed) system, taking into account the challenges introduced by the dynamical nature of the data. The privacy notion used in this work is that of cryptographic multi-party privacy, i.e., the computation of a functionality should not reveal anything more than what can be inferred only from the inputs and outputs of the functionality. The main theoretical concept used towards this goal is Homomorphic Encryption, which allows the evaluation of sums and products on encrypted data, and, when combined with other cryptographic techniques, such as Secret Sharing, results in a powerful tool for solving a wide range of secure multi-party problems. We will rigorously define these concepts and discuss how multi-party privacy can be enforced in the implementation of a Model Predictive Controller, which encompasses computing stabilizing control actions by solving an optimization problem on encrypted data.



There are no comments yet.


page 1

page 2

page 3

page 4


Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

The development of large-scale distributed control systems has led to th...

Efficient Cloud-based Secret Shuffling via Homomorphic Encryption

When working with joint collections of confidential data from multiple s...

Encrypted Distributed Lasso for Sparse Data Predictive Control

The least squares problem with L1-regularized regressors, called Lasso, ...

SoK: Fully Homomorphic Encryption Compilers

Fully Homomorphic Encryption (FHE) allows a third party to perform arbit...

Encrypted control for networked systems – An illustrative introduction and current challenges

Cloud computing and distributed computing are becoming ubiquitous in man...

Homomorphic-Encrypted Volume Rendering

Computationally demanding tasks are typically calculated in dedicated da...

Comprehensive Introduction to Fully Homomorphic Encryption for Dynamic Feedback Controller via LWE-based Cryptosystem

The cryptosystem based on the Learning-with-Errors (LWE) problem is cons...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.