Skip to main content

Encrypted Model Predictive Control in the Cloud

  • Chapter
  • First Online:

Abstract

In this chapter, we focus on encrypted model predictive control (MPC) implemented in a single cloud. In general, encrypted control enables confidential controller evaluations in networked control systems. Technically, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system states without intermediate decryptions. Encrypted control can, for example, be realized using homomorphic encryption that allows simple mathematical operations to be carried out on encrypted data. However, encrypting optimization-based control schemes such as MPC is non-trivial. Against this background, the contribution of the chapter is twofold. First, we summarize and unify two existing encrypted MPCs using the additively homomorphic Paillier cryptosystem. Second, we present a novel encrypted MPC based on real-time iterations of the alternating direction method of multipliers (ADMM). We theoretically and experimentally compare the three approaches and highlight unique features of the new scheme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alexandru AB, Morari M, Pappas GJ (2018) Cloud-based MPC with encrypted data. In: Proceedings of the 57th conference on decision and control, pp 5014–5019

    Google Scholar 

  2. Alexandru AB, Pappas GJ (2019) Encrypted LQG using labeled homomorphic encryption. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, pp 129–140

    Google Scholar 

  3. Bemporad A, Morari M, Dua V, Pistikopoulos EN (2002) The explicit linear quadratic regulator for constrained systems. Automatica 38(1):3–20

    Article  MathSciNet  Google Scholar 

  4. Boccia A, Grüne L, Worthmann K (2014) Stability and feasibility of state constrained MPC without stabilizing terminal constraints. Syst Control Lett 72:14–21

    Article  MathSciNet  Google Scholar 

  5. Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122

    Article  Google Scholar 

  6. Diehl M, Bock HG, Schlöder JP (2005) A real-time iteration scheme for nonlinear optimization in optimal feedback control. SIAM J Control Optim 43(5):1714–1736

    Article  MathSciNet  Google Scholar 

  7. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472

    Article  MathSciNet  Google Scholar 

  8. Farokhi F, Shames I, Batterham N (2016) Secure and private cloud-based control using semi-homomorphic encryption. In: Proceedings of 6th IFAC workshop on distributed estimation and control in networked system

    Google Scholar 

  9. Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20

    Article  Google Scholar 

  10. Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 22(11):612–613

    MATH  Google Scholar 

  11. Ghadimi E, Teixeira A, Shames I, Johansson M (2015) Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems. IEEE Trans Autom Control 60(3):644–658

    Article  MathSciNet  Google Scholar 

  12. Gilbert EG, Tan KT (1991) Linear systems with state and control constraints: the theory and application of maximal output admissible sets. IEEE Trans Autom Control 36(9):1008–1020

    Article  MathSciNet  Google Scholar 

  13. Jerez JL, Goulart PJ, Richter S, Constantinides GA, Kerrigan EC, Morari M (2014) Embedded online optimization for model predictive control at megahertz rates. IEEE Trans Autom Control 59(12):3238–3251

    Article  MathSciNet  Google Scholar 

  14. Katz J, Lindell Y (2014) Introduction to modern cryptography, 2nd edn. CRC Press

    Google Scholar 

  15. Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. In: Proceedings of the 6th IFAC workshop on distributed estimation and control in networked systems, pp 175–180

    Google Scholar 

  16. Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: Proceedings of the 54th conference on decision and control, pp 6836–6843

    Google Scholar 

  17. Mayne DQ, Rawlings JB, Rao C, Scokaert POM (2000) Constrained model predictive control: stability and optimality. Automatica 36:789–814

    Article  MathSciNet  Google Scholar 

  18. Barker E (2016) Recommendation for key management Part 1. NIST Spec Publ 800(57). National Institute of Standards and Technology

    Google Scholar 

  19. Nesterov Y (2004) Introductory lectures on convex optimization: a basic course, applied optimization, vol 87. Kluwer Academic Publishers

    Google Scholar 

  20. Nesterov Y (2013) Gradient methods for minimizing composite functions. Math Program 140(1):125–161

    Article  MathSciNet  Google Scholar 

  21. Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology-eurocrypt ’99. Lecture notes in computer science, vol 1592. Springer, pp 223–238

    Google Scholar 

  22. van Parys R, Pipeleers G (2018) Real-time proximal gradient method for linear MPC. In: Proceedings of the 2018 European control conference, pp 1142–1147

    Google Scholar 

  23. Pinkas B, Schneider T, Smart N, Williams S (2009) Secure two-party computation is practical. In: Advances in cryptology-asiacrypt 2009. Lecture notes in computer science, vol 5912. Springer, pp 250–267

    Google Scholar 

  24. Rawlings JB, Mayne DQ, Diehl MM (2017) Model predictive control: theory, computation, and design, 2nd edn. Nob Hill Publishing

    Google Scholar 

  25. Richter S, Jones CN, Morari M (2009) Real-time input-constrained MPC using fast gradient methods. In: Proceedings of the 48th IEEE conference on decision and control, pp 7387–7392

    Google Scholar 

  26. Schulze Darup M (2019) Verschlüsselte Regelung in der Cloud - Stand der Technik und offene Probleme. at - Automatisierungstechnik 67(8): 668–681

    Google Scholar 

  27. Schulze Darup M, Book G (2019) arXiv:1911.02641 [math.OC]

  28. Schulze Darup M, Book G (2019) Towards real-time ADMM for linear MPC. In: Proceedings of the 2019 European control conference, pp 4276–4282

    Google Scholar 

  29. Schulze Darup M, Cannon M (2016) Some observations on the activity of terminal constraints in linear MPC. In: Proceedings of the 2016 European control conference, pp 4977–4983

    Google Scholar 

  30. Schulze Darup M, Jager T (2019) Encrypted cloud-based control using secret sharing with one-time pads. In: Proceedings of the 58th conference on decision and control

    Google Scholar 

  31. Schulze Darup M, Redder A, Quevedo DE (2018) Encrypted cloud-based MPC for linear systems with input constraints. In: Proceedings of 6th IFAC nonlinear model predictive control conference, pp 635–642

    Google Scholar 

  32. Schulze Darup M, Redder A, Shames I, Farokhi F, Quevedo D (2018) Towards encrypted MPC for linear constrained systems. IEEE Control Syst Lett 2(2):195–200

    Article  Google Scholar 

  33. Shamir A (1979) How to share a secret. Commun ACM 53(3):97–105

    MathSciNet  MATH  Google Scholar 

  34. Tøndel P, Johansen TA, Bemporad A (2002) Computation and approximation of piecewise affine control laws via binary search trees. In: Proceedings of the 41st conference on decision and control, pp 3144–3149

    Google Scholar 

  35. Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82. IEEE Computer Society, pp 160–164

    Google Scholar 

Download references

Acknowledgements

Support by the German Research Foundation (DFG) under the grant SCHU 2940/4-1 is gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Moritz Schulze Darup .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Schulze Darup, M. (2020). Encrypted Model Predictive Control in the Cloud. In: Farokhi, F. (eds) Privacy in Dynamical Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0493-8_11

Download citation

Publish with us

Policies and ethics