Secure Multi-party Computation for Cloud-based Control

06/23/2019
by   Andreea B. Alexandru, et al.
0

In this chapter, we will explore the cloud-outsourced privacy-preserving computation of a controller on encrypted measurements from a (possibly distributed) system, taking into account the challenges introduced by the dynamical nature of the data. The privacy notion used in this work is that of cryptographic multi-party privacy, i.e., the computation of a functionality should not reveal anything more than what can be inferred only from the inputs and outputs of the functionality. The main theoretical concept used towards this goal is Homomorphic Encryption, which allows the evaluation of sums and products on encrypted data, and, when combined with other cryptographic techniques, such as Secret Sharing, results in a powerful tool for solving a wide range of secure multi-party problems. We will rigorously define these concepts and discuss how multi-party privacy can be enforced in the implementation of a Model Predictive Controller, which encompasses computing stabilizing control actions by solving an optimization problem on encrypted data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/01/2023

Encrypted Data-driven Predictive Cloud Control with Disturbance Observer

In data-driven predictive cloud control tasks, the privacy of data store...
research
02/12/2020

Efficient Cloud-based Secret Shuffling via Homomorphic Encryption

When working with joint collections of confidential data from multiple s...
research
04/23/2021

Encrypted Distributed Lasso for Sparse Data Predictive Control

The least squares problem with L1-regularized regressors, called Lasso, ...
research
09/07/2018

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

The development of large-scale distributed control systems has led to th...
research
01/18/2021

SoK: Fully Homomorphic Encryption Compilers

Fully Homomorphic Encryption (FHE) allows a third party to perform arbit...
research
01/22/2023

A Framework to Allow a Third Party to Watermark Numerical Data in an Encrypted Domain while Preserving its Statistical Properties

Watermarking data for source tracking applications by its owner can be u...
research
05/24/2023

Confidential Truth Finding with Multi-Party Computation (Extended Version)

Federated knowledge discovery and data mining are challenged to assess t...

Please sign up or login with your details

Forgot password? Click here to reset