Privacy in Dynamical Systems pp 231-265 | Cite as
Encrypted Model Predictive Control in the Cloud
Abstract
In this chapter, we focus on encrypted model predictive control (MPC) implemented in a single cloud. In general, encrypted control enables confidential controller evaluations in networked control systems. Technically, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system states without intermediate decryptions. Encrypted control can, for example, be realized using homomorphic encryption that allows simple mathematical operations to be carried out on encrypted data. However, encrypting optimization-based control schemes such as MPC is non-trivial. Against this background, the contribution of the chapter is twofold. First, we summarize and unify two existing encrypted MPCs using the additively homomorphic Paillier cryptosystem. Second, we present a novel encrypted MPC based on real-time iterations of the alternating direction method of multipliers (ADMM). We theoretically and experimentally compare the three approaches and highlight unique features of the new scheme.
Notes
Acknowledgements
Support by the German Research Foundation (DFG) under the grant SCHU 2940/4-1 is gratefully acknowledged.
References
- 1.Alexandru AB, Morari M, Pappas GJ (2018) Cloud-based MPC with encrypted data. In: Proceedings of the 57th conference on decision and control, pp 5014–5019Google Scholar
- 2.Alexandru AB, Pappas GJ (2019) Encrypted LQG using labeled homomorphic encryption. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, pp 129–140Google Scholar
- 3.Bemporad A, Morari M, Dua V, Pistikopoulos EN (2002) The explicit linear quadratic regulator for constrained systems. Automatica 38(1):3–20MathSciNetCrossRefGoogle Scholar
- 4.Boccia A, Grüne L, Worthmann K (2014) Stability and feasibility of state constrained MPC without stabilizing terminal constraints. Syst Control Lett 72:14–21MathSciNetCrossRefGoogle Scholar
- 5.Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122CrossRefGoogle Scholar
- 6.Diehl M, Bock HG, Schlöder JP (2005) A real-time iteration scheme for nonlinear optimization in optimal feedback control. SIAM J Control Optim 43(5):1714–1736MathSciNetCrossRefGoogle Scholar
- 7.ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefGoogle Scholar
- 8.Farokhi F, Shames I, Batterham N (2016) Secure and private cloud-based control using semi-homomorphic encryption. In: Proceedings of 6th IFAC workshop on distributed estimation and control in networked systemGoogle Scholar
- 9.Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20CrossRefGoogle Scholar
- 10.Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 22(11):612–613zbMATHGoogle Scholar
- 11.Ghadimi E, Teixeira A, Shames I, Johansson M (2015) Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems. IEEE Trans Autom Control 60(3):644–658MathSciNetCrossRefGoogle Scholar
- 12.Gilbert EG, Tan KT (1991) Linear systems with state and control constraints: the theory and application of maximal output admissible sets. IEEE Trans Autom Control 36(9):1008–1020MathSciNetCrossRefGoogle Scholar
- 13.Jerez JL, Goulart PJ, Richter S, Constantinides GA, Kerrigan EC, Morari M (2014) Embedded online optimization for model predictive control at megahertz rates. IEEE Trans Autom Control 59(12):3238–3251MathSciNetCrossRefGoogle Scholar
- 14.Katz J, Lindell Y (2014) Introduction to modern cryptography, 2nd edn. CRC PressGoogle Scholar
- 15.Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. In: Proceedings of the 6th IFAC workshop on distributed estimation and control in networked systems, pp 175–180Google Scholar
- 16.Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: Proceedings of the 54th conference on decision and control, pp 6836–6843Google Scholar
- 17.Mayne DQ, Rawlings JB, Rao C, Scokaert POM (2000) Constrained model predictive control: stability and optimality. Automatica 36:789–814MathSciNetCrossRefGoogle Scholar
- 18.Barker E (2016) Recommendation for key management Part 1. NIST Spec Publ 800(57). National Institute of Standards and TechnologyGoogle Scholar
- 19.Nesterov Y (2004) Introductory lectures on convex optimization: a basic course, applied optimization, vol 87. Kluwer Academic PublishersGoogle Scholar
- 20.Nesterov Y (2013) Gradient methods for minimizing composite functions. Math Program 140(1):125–161MathSciNetCrossRefGoogle Scholar
- 21.Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology-eurocrypt ’99. Lecture notes in computer science, vol 1592. Springer, pp 223–238Google Scholar
- 22.van Parys R, Pipeleers G (2018) Real-time proximal gradient method for linear MPC. In: Proceedings of the 2018 European control conference, pp 1142–1147Google Scholar
- 23.Pinkas B, Schneider T, Smart N, Williams S (2009) Secure two-party computation is practical. In: Advances in cryptology-asiacrypt 2009. Lecture notes in computer science, vol 5912. Springer, pp 250–267Google Scholar
- 24.Rawlings JB, Mayne DQ, Diehl MM (2017) Model predictive control: theory, computation, and design, 2nd edn. Nob Hill PublishingGoogle Scholar
- 25.Richter S, Jones CN, Morari M (2009) Real-time input-constrained MPC using fast gradient methods. In: Proceedings of the 48th IEEE conference on decision and control, pp 7387–7392Google Scholar
- 26.Schulze Darup M (2019) Verschlüsselte Regelung in der Cloud - Stand der Technik und offene Probleme. at - Automatisierungstechnik 67(8): 668–681Google Scholar
- 27.Schulze Darup M, Book G (2019) arXiv:1911.02641 [math.OC]
- 28.Schulze Darup M, Book G (2019) Towards real-time ADMM for linear MPC. In: Proceedings of the 2019 European control conference, pp 4276–4282Google Scholar
- 29.Schulze Darup M, Cannon M (2016) Some observations on the activity of terminal constraints in linear MPC. In: Proceedings of the 2016 European control conference, pp 4977–4983Google Scholar
- 30.Schulze Darup M, Jager T (2019) Encrypted cloud-based control using secret sharing with one-time pads. In: Proceedings of the 58th conference on decision and controlGoogle Scholar
- 31.Schulze Darup M, Redder A, Quevedo DE (2018) Encrypted cloud-based MPC for linear systems with input constraints. In: Proceedings of 6th IFAC nonlinear model predictive control conference, pp 635–642Google Scholar
- 32.Schulze Darup M, Redder A, Shames I, Farokhi F, Quevedo D (2018) Towards encrypted MPC for linear constrained systems. IEEE Control Syst Lett 2(2):195–200CrossRefGoogle Scholar
- 33.Shamir A (1979) How to share a secret. Commun ACM 53(3):97–105MathSciNetzbMATHGoogle Scholar
- 34.Tøndel P, Johansen TA, Bemporad A (2002) Computation and approximation of piecewise affine control laws via binary search trees. In: Proceedings of the 41st conference on decision and control, pp 3144–3149Google Scholar
- 35.Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82. IEEE Computer Society, pp 160–164Google Scholar