On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control

被引:0
|
作者
Binfet, Philipp [1 ]
Schluter, Nils [1 ]
Darup, Moritz Schulze [1 ]
机构
[1] TU Dortmund Univ, Control & Cyber Phys Syst Grp, Dept Mech Engn, Dortmund, Germany
关键词
Control Systems Privacy; Cyber-Physical Security; Quadratic Programming; Model Predictive Control;
D O I
10.1109/CDC49753.2023.10383758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, which is supposed to enable privacy-preserving evaluations of quadratic programs (QPs) with little computational overhead compared to other methods. This paper deals with the security of such randomly transformed QPs in the context of model predictive control (MPC). In particular, we show how to construct attacks against this cipher and thereby underpin concerns regarding its security in a practical setting. To this end, we exploit invariants under the transformations and common specifications of MPC-related QPs. Our numerical examples then illustrate that these two ingredients suffice to extract information from ciphertexts.
引用
收藏
页码:3872 / 3877
页数:6
相关论文
共 50 条
  • [21] A Cloud-based Secure and Privacy-Preserving Clustering Analysis of Infectious Disease
    Liu, Jianqing
    Hu, Yaodan
    Yue, Hao
    Gong, Yanmin
    Fang, Yuguang
    2018 IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2018, : 107 - 116
  • [22] Cloud Data Security Access with Privacy-Preserving
    Wang, Jingyu
    Gu, Ruichun
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 268 - 271
  • [23] An Effective Privacy-Preserving Blockchain-Assisted Security Protocol for Cloud-Based Digital Twin Environment
    Thakur, Garima
    Kumar, Pankaj
    Jangirala, Srinivas
    Das, Ashok Kumar
    Park, Youngho
    IEEE ACCESS, 2023, 11 : 26877 - 26892
  • [24] An Efficient and Privacy-Preserving Multiuser Cloud-Based LBS Query Scheme
    Ou, Lu
    Yin, Hui
    Qin, Zheng
    Xiao, Sheng
    Yang, Guangyi
    Hu, Yupeng
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [25] Privacy-Preserving Data Analytics in Cloud-Based Smart Home with Community Hierarchy
    Lee, Ying-Tsung
    Hsiao, Wei-Hsuan
    Lin, Yan-Shao
    Chou, Seng-Cho T.
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (02) : 200 - 207
  • [26] Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems
    Sharma, Sagar
    Chen, Keke
    Sheth, Amit
    IEEE INTERNET COMPUTING, 2018, 22 (02) : 42 - 51
  • [27] Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs
    Wang, Yujue
    Ding, Yong
    Wu, Qianhong
    Wei, Yongzhuang
    Qin, Bo
    Wang, Huiyong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1779 - 1790
  • [28] Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems
    Sharma S.
    Chen K.
    Sheth A.
    Sharma, Sagar (sharma.74@wright.edu), 2018, Institute of Electrical and Electronics Engineers Inc., United States (22) : 42 - 51
  • [29] A privacy-preserving cloud-based data management system with efficient revocation scheme
    Chang, Shih-Chien
    Wu, Ja-Ling
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (02) : 190 - 199
  • [30] Privacy-preserving verifiable fuzzy phrase search over cloud-based data
    Zhang, Yunfeng
    Hao, Rong
    Ge, Xinrui
    Yu, Jia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87