Secure multi-party computation for cloud-based control

14Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this chapter, we will explore the cloud-outsourced privacy-preserving computation of a controller on encrypted measurements from a (possibly distributed) system, taking into account the challenges introduced by the dynamical nature of the data. The privacy notion used in this work is that of cryptographic multi-party privacy, i.e., the computation of a functionality should not reveal anything more than what can be inferred only from the inputs and outputs of the functionality. The main theoretical concept used towards this goal is Homomorphic Encryption, which allows the evaluation of sums and products on encrypted data, and, when combined with other cryptographic techniques, such as Secret Sharing, results in a powerful tool for solving a wide range of secure multi-party problems.We will rigorously define these concepts and discuss how multi-party privacy can be enforced in the implementation of a Model Predictive Controller, which encompasses computing stabilizing control actions by solving an optimization problem on encrypted data.

Cite

CITATION STYLE

APA

Alexandru, A. B., & Pappas, G. J. (2019). Secure multi-party computation for cloud-based control. In Privacy in Dynamical Systems (pp. 179–207). Springer Singapore. https://doi.org/10.1007/978-981-15-0493-8_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free