Towards encrypted cloud-based control-as-a-service

dc.contributor.advisorSchulze Darup, Moritz
dc.contributor.authorSchlüter, Nils
dc.contributor.refereeFerrari, Riccardo
dc.date.accepted2024-11-07
dc.date.accessioned2025-05-30T04:58:28Z
dc.date.available2025-05-30T04:58:28Z
dc.date.issued2024
dc.description.abstractThe increasing interconnectivity of control systems paves the way for exciting new opportunities, such as cloud-based control services. At the same time, connected control systems are susceptible to cyberattacks and data leakage. Therefore, this dissertation aims to enhance the security of cyberphysical systems by ensuring the confidentiality of control data during its evaluation. % on external platforms. To achieve this, advanced cryptographic techniques such as homomorphic encryption and secure multi-party computation are utilized, which enable computations on encrypted data. However, the development of novel encrypted controllers results in unique interdisciplinary challenges that necessitate a nuanced approach, blending elements of cryptography and control theory. The first section of this thesis is devoted to iterative control algorithms. First, cloud-based dynamic controllers are considered. These are based on a linear iteration, which can lead to a numerical overflow in an encrypted evaluation. Our system-theoretic analysis reveals that a specific subset of dynamic controllers, which can be efficiently encrypted, is not affected by this problem. Second, privacy in consensus problems of multi-agent systems is explored. In the related algorithms, we address iterations and a mechanism to control the data access. The subsequent section of this thesis focuses on controllers that use non-po\-ly\-no\-mi\-al functions, where model predictive control is a prominent example. Encrypted implementations of these functions are often inefficient. Our novel approach uses max-out neural networks, which form a versatile basis to approximate any continuous function. Moreover, they are well-aligned with primitives from secure multi-party computation, resulting in an efficient implementation. The final section conducts a security analysis of random affine transformations. Although these transformations have gained significant popularity, they currently do not offer a technically sound security guarantee. The aforementioned results are numerically validated and illustrated with relevant examples. Although significant progress has been made, further efficiency improvements are paramount for the practical application of encrypted control.en
dc.identifier.urihttp://hdl.handle.net/2003/43716
dc.identifier.urihttp://dx.doi.org/10.17877/DE290R-25490
dc.language.isoen
dc.subjectEncrypted controlen
dc.subjectControl-as-a-serviceen
dc.subjectHomomorphic encryptionen
dc.subjectSecure multi-party computationen
dc.subject.ddc620
dc.subject.rswkCyber-physisches Systemde
dc.subject.rswkKryptologiede
dc.subject.rswkComputersicherheitde
dc.subject.rswkMehrparteienprotokollde
dc.subject.rswkRegelungstechnikde
dc.subject.rswkNumerisches Verfahrende
dc.titleTowards encrypted cloud-based control-as-a-serviceen
dc.typeText
dc.type.publicationtypePhDThesis
dcterms.accessRightsopen access
eldorado.secondarypublicationfalse

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Dissertation_Schlueter.pdf
Size:
2.46 MB
Format:
Adobe Portable Document Format
Description:
DNB
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
4.82 KB
Format:
Item-specific license agreed upon to submission
Description: