Abstract
In this chapter, we focus on encrypted model predictive control (MPC) implemented in a single cloud. In general, encrypted control enables confidential controller evaluations in networked control systems. Technically, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system states without intermediate decryptions. Encrypted control can, for example, be realized using homomorphic encryption that allows simple mathematical operations to be carried out on encrypted data. However, encrypting optimization-based control schemes such as MPC is non-trivial. Against this background, the contribution of the chapter is twofold. First, we summarize and unify two existing encrypted MPCs using the additively homomorphic Paillier cryptosystem. Second, we present a novel encrypted MPC based on real-time iterations of the alternating direction method of multipliers (ADMM). We theoretically and experimentally compare the three approaches and highlight unique features of the new scheme.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alexandru AB, Morari M, Pappas GJ (2018) Cloud-based MPC with encrypted data. In: Proceedings of the 57th conference on decision and control, pp 5014–5019
Alexandru AB, Pappas GJ (2019) Encrypted LQG using labeled homomorphic encryption. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, pp 129–140
Bemporad A, Morari M, Dua V, Pistikopoulos EN (2002) The explicit linear quadratic regulator for constrained systems. Automatica 38(1):3–20
Boccia A, Grüne L, Worthmann K (2014) Stability and feasibility of state constrained MPC without stabilizing terminal constraints. Syst Control Lett 72:14–21
Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122
Diehl M, Bock HG, Schlöder JP (2005) A real-time iteration scheme for nonlinear optimization in optimal feedback control. SIAM J Control Optim 43(5):1714–1736
ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472
Farokhi F, Shames I, Batterham N (2016) Secure and private cloud-based control using semi-homomorphic encryption. In: Proceedings of 6th IFAC workshop on distributed estimation and control in networked system
Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20
Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 22(11):612–613
Ghadimi E, Teixeira A, Shames I, Johansson M (2015) Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems. IEEE Trans Autom Control 60(3):644–658
Gilbert EG, Tan KT (1991) Linear systems with state and control constraints: the theory and application of maximal output admissible sets. IEEE Trans Autom Control 36(9):1008–1020
Jerez JL, Goulart PJ, Richter S, Constantinides GA, Kerrigan EC, Morari M (2014) Embedded online optimization for model predictive control at megahertz rates. IEEE Trans Autom Control 59(12):3238–3251
Katz J, Lindell Y (2014) Introduction to modern cryptography, 2nd edn. CRC Press
Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. In: Proceedings of the 6th IFAC workshop on distributed estimation and control in networked systems, pp 175–180
Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: Proceedings of the 54th conference on decision and control, pp 6836–6843
Mayne DQ, Rawlings JB, Rao C, Scokaert POM (2000) Constrained model predictive control: stability and optimality. Automatica 36:789–814
Barker E (2016) Recommendation for key management Part 1. NIST Spec Publ 800(57). National Institute of Standards and Technology
Nesterov Y (2004) Introductory lectures on convex optimization: a basic course, applied optimization, vol 87. Kluwer Academic Publishers
Nesterov Y (2013) Gradient methods for minimizing composite functions. Math Program 140(1):125–161
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology-eurocrypt ’99. Lecture notes in computer science, vol 1592. Springer, pp 223–238
van Parys R, Pipeleers G (2018) Real-time proximal gradient method for linear MPC. In: Proceedings of the 2018 European control conference, pp 1142–1147
Pinkas B, Schneider T, Smart N, Williams S (2009) Secure two-party computation is practical. In: Advances in cryptology-asiacrypt 2009. Lecture notes in computer science, vol 5912. Springer, pp 250–267
Rawlings JB, Mayne DQ, Diehl MM (2017) Model predictive control: theory, computation, and design, 2nd edn. Nob Hill Publishing
Richter S, Jones CN, Morari M (2009) Real-time input-constrained MPC using fast gradient methods. In: Proceedings of the 48th IEEE conference on decision and control, pp 7387–7392
Schulze Darup M (2019) Verschlüsselte Regelung in der Cloud - Stand der Technik und offene Probleme. at - Automatisierungstechnik 67(8): 668–681
Schulze Darup M, Book G (2019) arXiv:1911.02641 [math.OC]
Schulze Darup M, Book G (2019) Towards real-time ADMM for linear MPC. In: Proceedings of the 2019 European control conference, pp 4276–4282
Schulze Darup M, Cannon M (2016) Some observations on the activity of terminal constraints in linear MPC. In: Proceedings of the 2016 European control conference, pp 4977–4983
Schulze Darup M, Jager T (2019) Encrypted cloud-based control using secret sharing with one-time pads. In: Proceedings of the 58th conference on decision and control
Schulze Darup M, Redder A, Quevedo DE (2018) Encrypted cloud-based MPC for linear systems with input constraints. In: Proceedings of 6th IFAC nonlinear model predictive control conference, pp 635–642
Schulze Darup M, Redder A, Shames I, Farokhi F, Quevedo D (2018) Towards encrypted MPC for linear constrained systems. IEEE Control Syst Lett 2(2):195–200
Shamir A (1979) How to share a secret. Commun ACM 53(3):97–105
Tøndel P, Johansen TA, Bemporad A (2002) Computation and approximation of piecewise affine control laws via binary search trees. In: Proceedings of the 41st conference on decision and control, pp 3144–3149
Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82. IEEE Computer Society, pp 160–164
Acknowledgements
Support by the German Research Foundation (DFG) under the grant SCHU 2940/4-1 is gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Schulze Darup, M. (2020). Encrypted Model Predictive Control in the Cloud. In: Farokhi, F. (eds) Privacy in Dynamical Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0493-8_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-0493-8_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0492-1
Online ISBN: 978-981-15-0493-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)