On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control

被引:0
|
作者
Binfet, Philipp [1 ]
Schluter, Nils [1 ]
Darup, Moritz Schulze [1 ]
机构
[1] TU Dortmund Univ, Control & Cyber Phys Syst Grp, Dept Mech Engn, Dortmund, Germany
关键词
Control Systems Privacy; Cyber-Physical Security; Quadratic Programming; Model Predictive Control;
D O I
10.1109/CDC49753.2023.10383758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, which is supposed to enable privacy-preserving evaluations of quadratic programs (QPs) with little computational overhead compared to other methods. This paper deals with the security of such randomly transformed QPs in the context of model predictive control (MPC). In particular, we show how to construct attacks against this cipher and thereby underpin concerns regarding its security in a practical setting. To this end, we exploit invariants under the transformations and common specifications of MPC-related QPs. Our numerical examples then illustrate that these two ingredients suffice to extract information from ciphertexts.
引用
收藏
页码:3872 / 3877
页数:6
相关论文
共 50 条
  • [31] Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update
    Fan, Haoyuan
    Li, Qi
    Xiong, Jinbo
    Li, Rui
    Chen, Wei
    Huang, Haiping
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (09): : 16887 - 16901
  • [32] Efficient Security Solution for Privacy-Preserving Cloud Services
    Malina, Lukas
    Hajny, Jan
    2013 36TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2013, : 23 - 27
  • [33] Privacy-Preserving Access Control in Cloud Federations
    Alansari, Shorouq
    Paci, Federica
    Margheri, Andrea
    Sassone, Vladimiro
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 757 - 760
  • [34] First step towards preserving the privacy of cloud-based IDS security policies
    Kurek, Tytus
    Lason, Artur
    Niemiec, Marcin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3481 - 3491
  • [35] Privacy-preserving cloud-based secure digital locker with differential privacy-based deep learning technique
    Shanthi, P.
    Vidivelli, S.
    Padmakumari, P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (34) : 81299 - 81324
  • [36] Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data
    Song, Yu
    Yu, Jia
    Ge, Xinrui
    Hao, Rong
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (23): : 38262 - 38272
  • [37] Privacy-preserving clustering of unstructured big data for cloud-based enterprise search solutions
    Zobaed, Sm
    Salehi, Mohsen Amini
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (22):
  • [38] Cloud-based privacy-preserving aggregation architecture in multi-domain wireless networks
    Jia, Weiwei
    Zhu, Haojin
    Du, Suguo
    Dong, Xiaolei
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (13) : 1905 - 1915
  • [39] An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System
    Li, Xiong
    Liu, Shanpeng
    Lu, Rongxing
    Khan, Muhammad Khurram
    Gu, Ke
    Zhang, Xiaosong
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 2020 - 2031
  • [40] A Cloud-based Model to Facilitate Mobility of Privacy-preserving Attribute-based Credential Users
    Sabouri, Ahmad
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 958 - 965