Private outsourced model predictive control via secure multi-party computation

被引:0
|
作者
Adelipour, Saeed [1 ]
Haeri, Mohammad [1 ]
机构
[1] Sharif Univ Technol, Elect Engn Dept, Adv Control Syst Lab, Tehran, Iran
基金
美国国家科学基金会;
关键词
Model predictive control; Cloud computing; Secure multi-party computation; Privacy-preserving; Secret sharing; CLOUD-BASED MPC; SYSTEMS;
D O I
10.1016/j.compeleceng.2024.109208
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting data privacy is essential in developing practical cloud -based control systems to benefit from remote and distributed computation while avoiding the risks of disclosing sensitive information to potentially untrusted parties. This paper proposes a privacy -preserving framework to outsource the computation of model predictive control law to several untrusted cloud -based servers. A secret sharing scheme is employed to maintain the privacy of the system's data in all the stages of the control loop in a secure multi -party computation environment. In this regard, a privacy -preserving algorithm is derived to securely implement a projected gradient method to solve the underlying optimization problem, without revealing private data to external eavesdroppers and curious cloud -based servers. The proposed method is solely based on secret sharing, and all computations can be performed securely by cloud servers without the need to designate target nodes or engage the system's actuator in computing the intermediate steps. Therefore, the proposed method is less computationally demanding than the existing results based on homomorphic encryption and is applicable to systems with limited computing resources. Information -theoretic privacy assessments based on mutual information measures are provided. The efficacy of the proposed method is investigated on the cruise control problem of a freight train system.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [2] Privacy-preserving SVM on Outsourced Genomic Data via Secure Multi-party Computation
    Chen, Huajie
    Uenal, Ali Burak
    Akguen, Mete
    Pfeifer, Nico
    [J]. PROCEEDINGS OF THE SIXTH INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA'20), 2020, : 61 - 69
  • [3] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [4] Elliptic Curve Based Secure Outsourced Computation in Multi-party Cloud Environment
    Thangam, V.
    Chandrasekaran, K.
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, SSCC 2016, 2016, 625 : 199 - 212
  • [5] Elliptic curve based secure outsourced computation in multi-party cloud environment
    [J]. Thangam, V. (vedhathangam@gmail.com), 1600, Springer Verlag (625):
  • [6] Secure Multi-party Computation of Differentially Private Heavy Hitters
    Boehler, Jonas
    Kerschbaum, Florian
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2361 - 2377
  • [7] Private-preserving language model inference based on secure multi-party computation
    Song, Chen
    Huang, Ruwei
    Hu, Sai
    [J]. NEUROCOMPUTING, 2024, 592
  • [8] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [9] Differentially Private Multi-party Computation
    Kairouz, Peter
    Oh, Sewoong
    Viswanath, Pramod
    [J]. 2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [10] From Input Private to Universally Composable Secure Multi-party Computation Primitives
    Bogdanov, Dan
    Laud, Peeter
    Laur, Sven
    Pullonen, Pille
    [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 184 - 198