On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control

被引:0
|
作者
Binfet, Philipp [1 ]
Schluter, Nils [1 ]
Darup, Moritz Schulze [1 ]
机构
[1] TU Dortmund Univ, Control & Cyber Phys Syst Grp, Dept Mech Engn, Dortmund, Germany
关键词
Control Systems Privacy; Cyber-Physical Security; Quadratic Programming; Model Predictive Control;
D O I
10.1109/CDC49753.2023.10383758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, which is supposed to enable privacy-preserving evaluations of quadratic programs (QPs) with little computational overhead compared to other methods. This paper deals with the security of such randomly transformed QPs in the context of model predictive control (MPC). In particular, we show how to construct attacks against this cipher and thereby underpin concerns regarding its security in a practical setting. To this end, we exploit invariants under the transformations and common specifications of MPC-related QPs. Our numerical examples then illustrate that these two ingredients suffice to extract information from ciphertexts.
引用
收藏
页码:3872 / 3877
页数:6
相关论文
共 50 条
  • [1] A Privacy-Preserving Framework for Cloud-Based HVAC Control
    Feng, Zhenan
    Nekouei, Ehsan
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2025, 33 (02) : 643 - 657
  • [2] Privacy preserving Cloud-based Quadratic Optimization
    Alexandru, Andreea B.
    Gatsis, Konstantinos
    Pappas, George J.
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 1168 - 1175
  • [3] PRIVACY-PRESERVING CLOUD-BASED DNN INFERENCE
    Xie, Shangyu
    Liu, Bingyu
    Hong, Yuan
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2675 - 2679
  • [4] Cloud-based Biometrics Processing for Privacy-Preserving Identification
    Hahn, Changhee
    Shin, Hyungjune
    Hur, Junbeom
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 595 - 600
  • [5] PriMal: Cloud-Based Privacy-Preserving Malware Detection
    Sun, Hao
    Su, Jinshu
    Wang, Xiaofeng
    Chen, Rongmao
    Liu, Yujing
    Hu, Qiaolin
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 153 - 172
  • [6] An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
    Becher, Kilian
    Beck, Martin
    Strufe, Thorsten
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON NETWORKED SYSTEMS (NETSYS 2019), 2019, : 117 - 124
  • [7] A privacy-preserving approach for cloud-based protein fold recognition
    Unal, Ali Burak
    Pfeifer, Nico
    Akgun, Mete
    PATTERNS, 2024, 5 (09):
  • [8] Cloud-Based Privacy-Preserving Collaborative Consumption for Sharing Economy
    Lyu, Lingjuan
    Chau, Sid Chi-Kin
    Wang, Nan
    Zheng, Yifeng
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1647 - 1660
  • [9] CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing
    Hoerandner, Felix
    Krenn, Stephan
    Migliavacca, Andrea
    Thiemer, Florian
    Zwattendorfer, Bernd
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 742 - 749
  • [10] A cloud-based framework for verifiable privacy-preserving spectrum auction
    Li, Ruinian
    Song, Tianyi
    Mei, Bo
    Hu, Chunqiang
    Li, Wei
    Larson, Maya
    Cheng, Xiuzhen
    Bie, Rongfang
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (01):