On the security of randomly transformed quadratic programs for privacy-preserving cloud-based control

被引:0
|
作者
Binfet, Philipp [1 ]
Schluter, Nils [1 ]
Darup, Moritz Schulze [1 ]
机构
[1] TU Dortmund Univ, Control & Cyber Phys Syst Grp, Dept Mech Engn, Dortmund, Germany
关键词
Control Systems Privacy; Cyber-Physical Security; Quadratic Programming; Model Predictive Control;
D O I
10.1109/CDC49753.2023.10383758
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Control related data, such as system states and inputs or controller specifications, is often sensitive. Meanwhile, the increasing connectivity of cloud-based or networked control results in vast amounts of such data, which poses a privacy threat, especially when evaluation on external platforms is considered. In this context, a cipher based on a random affine transformation gained attention, which is supposed to enable privacy-preserving evaluations of quadratic programs (QPs) with little computational overhead compared to other methods. This paper deals with the security of such randomly transformed QPs in the context of model predictive control (MPC). In particular, we show how to construct attacks against this cipher and thereby underpin concerns regarding its security in a practical setting. To this end, we exploit invariants under the transformations and common specifications of MPC-related QPs. Our numerical examples then illustrate that these two ingredients suffice to extract information from ciphertexts.
引用
收藏
页码:3872 / 3877
页数:6
相关论文
共 50 条
  • [41] Cloud-Based Privacy-Preserving Medical Imaging System Using Machine Learning Tools
    Alves, Joao
    Soares, Beatriz
    Brito, Claudia
    Sousa, Antonio
    PROGRESS IN ARTIFICIAL INTELLIGENCE, EPIA 2022, 2022, 13566 : 195 - 206
  • [42] Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing
    Gupta, Reetu
    Kanungo, Priyesh
    Dagdee, Nirmal
    Madhu, Golla
    Sahoo, Kshira Sagar
    Jhanjhi, N. Z.
    Masud, Mehedi
    Almalki, Nabil Sharaf
    AlZain, Mohammed A.
    SENSORS, 2023, 23 (05)
  • [43] Overview of the data security and privacy-preserving of mobile cloud services
    Gu, X.-W. (guxiwu@hust.edu.cn), 1600, Editorial Board of Journal on Communications (34):
  • [44] Privacy-Preserving Loyalty Programs
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    DATA PRIVACY MANAGEMENT, AUTONOMOUS SPONTANEOUS SECURITY, AND SECURITY ASSURANCE, 2015, 8872 : 133 - 146
  • [45] On Privacy-preserving Cloud Auction
    Chen, Zhili
    Chen, Lin
    Huang, Liusheng
    Zhong, Hong
    PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 279 - 288
  • [46] A survey of privacy-preserving access control in cloud computing
    Li, Hongjiao, 1600, Binary Information Press (10):
  • [47] On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain
    Son, Seunghwan
    Kwon, Deokkyu
    Lee, Joonyoung
    Yu, Sungjin
    Jho, Nam-Su
    Park, Youngho
    IEEE ACCESS, 2022, 10 : 75365 - 75375
  • [48] A privacy-preserving and energy efficient authentication protocol for the cloud-based e-healthcare system
    Alzahrani, Abdulrahman
    Alzahrani, Hamdan A.
    ALEXANDRIA ENGINEERING JOURNAL, 2025, 118 : 59 - 90
  • [49] Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [50] A PRIVACY-PRESERVING STORAGE SECURITY FOR SPATIAL DATA IN DYNAMICS CLOUD ENVIRONMENT
    Sakthivel, S.
    Dhiyanesh, B.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,