Symmetries and isomorphisms for privacy in control over the cloud

06/18/2019
by   Alimzhan Sultangazin, et al.
0

Cloud computing platforms are being increasingly used for closing feedback control loops, especially when computationally expensive algorithms, such as model-predictive control, are used to optimize performance. Outsourcing of control algorithms entails an exchange of data between the control system and the cloud, and, naturally, raises concerns about the privacy of the control system's data (e.g., state trajectory, control objective). Moreover, any attempt at enforcing privacy needs to add minimal computational overhead to avoid degrading control performance. In this paper, we propose several transformation-based methods for enforcing data privacy. We also quantify the amount of provided privacy and discuss how much privacy is lost when the adversary has access to side knowledge. We address three different scenarios: a) the cloud has no knowledge about the system being controlled; b) the cloud knows what sensors and actuators the system employs but not the system dynamics; c) the cloud knows the system dynamics, its sensors, and actuators. In all of these three scenarios, the proposed methods allow for the control over the cloud without compromising private information (which information is considered private depends on the considered scenario).

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/22/2017

S4: A New Secure Scheme for Enforcing Privacy in Cloud Data Warehouses

Outsourcing data into the cloud becomes popular thanks to the pay-as-you...
research
08/31/2020

CenterYou: A cloud-based Approach to Simplify Android Privacy Management

With mobile applications and associated services becoming increasingly p...
research
08/30/2017

Enforcing Privacy in Cloud Databases

Outsourcing databases, i.e., resorting to Database-as-a-Service (DBaaS),...
research
05/17/2019

Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control

We consider a cloud-based control architecture for a linear plant with G...
research
09/07/2018

Cloud-based Quadratic Optimization with Partially Homomorphic Encryption

The development of large-scale distributed control systems has led to th...
research
08/26/2022

Selective manipulation of disentangled representations for privacy-aware facial image processing

Camera sensors are increasingly being combined with machine learning to ...
research
11/08/2021

Privacy Guarantees for Cloud-based State Estimation using Partially Homomorphic Encryption

The privacy aspect of state estimation algorithms has been drawing high ...

Please sign up or login with your details

Forgot password? Click here to reset