Towards encrypted cloud-based control-as-a-service
Loading...
Date
2024
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Alternative Title(s)
Abstract
The increasing interconnectivity of control systems paves the way for exciting new opportunities, such as cloud-based control services. At the same time, connected control systems are susceptible to cyberattacks and data leakage.
Therefore, this dissertation aims to enhance the security of cyberphysical systems by ensuring the confidentiality of control data during its evaluation. % on external platforms.
To achieve this, advanced cryptographic techniques such as homomorphic encryption and secure multi-party computation are utilized, which enable computations on encrypted data. However, the development of novel encrypted controllers results in unique interdisciplinary challenges that necessitate a nuanced approach, blending elements of cryptography and control theory.
The first section of this thesis is devoted to iterative control algorithms. First, cloud-based dynamic controllers are considered. These are based on a linear iteration, which can lead to a numerical overflow in an encrypted evaluation. Our system-theoretic analysis reveals that a specific subset of dynamic controllers, which can be efficiently encrypted, is not affected by this problem.
Second, privacy in consensus problems of multi-agent systems is explored.
In the related algorithms, we address iterations and a mechanism to control the data access.
The subsequent section of this thesis focuses on controllers that use non-po\-ly\-no\-mi\-al functions, where model predictive control is a prominent example. Encrypted implementations of these functions are often inefficient.
Our novel approach uses max-out neural networks, which form a versatile basis to approximate any continuous function. Moreover, they are well-aligned with primitives from secure multi-party computation, resulting in an efficient implementation.
The final section conducts a security analysis of random affine transformations. Although these transformations have gained significant popularity, they currently do not offer a technically sound security guarantee.
The aforementioned results are numerically validated and illustrated with relevant examples. Although significant progress has been made, further efficiency improvements are paramount for the practical application of encrypted control.
Description
Table of contents
Keywords
Encrypted control, Control-as-a-service, Homomorphic encryption, Secure multi-party computation
Subjects based on RSWK
Cyber-physisches System, Kryptologie, Computersicherheit, Mehrparteienprotokoll, Regelungstechnik, Numerisches Verfahren