Encrypted Model Predictive Control in the Cloud

  • Moritz Schulze DarupEmail author


In this chapter, we focus on encrypted model predictive control (MPC) implemented in a single cloud. In general, encrypted control enables confidential controller evaluations in networked control systems. Technically, an encrypted controller is a modified control algorithm that is capable of computing encrypted control actions based on encrypted system states without intermediate decryptions. Encrypted control can, for example, be realized using homomorphic encryption that allows simple mathematical operations to be carried out on encrypted data. However, encrypting optimization-based control schemes such as MPC is non-trivial. Against this background, the contribution of the chapter is twofold. First, we summarize and unify two existing encrypted MPCs using the additively homomorphic Paillier cryptosystem. Second, we present a novel encrypted MPC based on real-time iterations of the alternating direction method of multipliers (ADMM). We theoretically and experimentally compare the three approaches and highlight unique features of the new scheme.



Support by the German Research Foundation (DFG) under the grant SCHU 2940/4-1 is gratefully acknowledged.


  1. 1.
    Alexandru AB, Morari M, Pappas GJ (2018) Cloud-based MPC with encrypted data. In: Proceedings of the 57th conference on decision and control, pp 5014–5019Google Scholar
  2. 2.
    Alexandru AB, Pappas GJ (2019) Encrypted LQG using labeled homomorphic encryption. In: Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, pp 129–140Google Scholar
  3. 3.
    Bemporad A, Morari M, Dua V, Pistikopoulos EN (2002) The explicit linear quadratic regulator for constrained systems. Automatica 38(1):3–20MathSciNetCrossRefGoogle Scholar
  4. 4.
    Boccia A, Grüne L, Worthmann K (2014) Stability and feasibility of state constrained MPC without stabilizing terminal constraints. Syst Control Lett 72:14–21MathSciNetCrossRefGoogle Scholar
  5. 5.
    Boyd S, Parikh N, Chu E, Peleato B, Eckstein J (2011) Distributed optimization and statistical learning via the alternating direction method of multipliers. Found Trends Mach Learn 3(1):1–122CrossRefGoogle Scholar
  6. 6.
    Diehl M, Bock HG, Schlöder JP (2005) A real-time iteration scheme for nonlinear optimization in optimal feedback control. SIAM J Control Optim 43(5):1714–1736MathSciNetCrossRefGoogle Scholar
  7. 7.
    ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MathSciNetCrossRefGoogle Scholar
  8. 8.
    Farokhi F, Shames I, Batterham N (2016) Secure and private cloud-based control using semi-homomorphic encryption. In: Proceedings of 6th IFAC workshop on distributed estimation and control in networked systemGoogle Scholar
  9. 9.
    Farokhi F, Shames I, Batterham N (2017) Secure and private control using semi-homomorphic encryption. Control Eng Pract 67:13–20CrossRefGoogle Scholar
  10. 10.
    Gentry C (2010) Computing arbitrary functions of encrypted data. Commun ACM 22(11):612–613zbMATHGoogle Scholar
  11. 11.
    Ghadimi E, Teixeira A, Shames I, Johansson M (2015) Optimal parameter selection for the alternating direction method of multipliers (ADMM): quadratic problems. IEEE Trans Autom Control 60(3):644–658MathSciNetCrossRefGoogle Scholar
  12. 12.
    Gilbert EG, Tan KT (1991) Linear systems with state and control constraints: the theory and application of maximal output admissible sets. IEEE Trans Autom Control 36(9):1008–1020MathSciNetCrossRefGoogle Scholar
  13. 13.
    Jerez JL, Goulart PJ, Richter S, Constantinides GA, Kerrigan EC, Morari M (2014) Embedded online optimization for model predictive control at megahertz rates. IEEE Trans Autom Control 59(12):3238–3251MathSciNetCrossRefGoogle Scholar
  14. 14.
    Katz J, Lindell Y (2014) Introduction to modern cryptography, 2nd edn. CRC PressGoogle Scholar
  15. 15.
    Kim J, Lee C, Shim H, Cheon JH, Kim A, Kim M, Song Y (2016) Encrypting controller using fully homomorphic encryption for security of cyber-physical systems. In: Proceedings of the 6th IFAC workshop on distributed estimation and control in networked systems, pp 175–180Google Scholar
  16. 16.
    Kogiso K, Fujita T (2015) Cyber-security enhancement of networked control systems using homomorphic encryption. In: Proceedings of the 54th conference on decision and control, pp 6836–6843Google Scholar
  17. 17.
    Mayne DQ, Rawlings JB, Rao C, Scokaert POM (2000) Constrained model predictive control: stability and optimality. Automatica 36:789–814MathSciNetCrossRefGoogle Scholar
  18. 18.
    Barker E (2016) Recommendation for key management Part 1. NIST Spec Publ 800(57). National Institute of Standards and TechnologyGoogle Scholar
  19. 19.
    Nesterov Y (2004) Introductory lectures on convex optimization: a basic course, applied optimization, vol 87. Kluwer Academic PublishersGoogle Scholar
  20. 20.
    Nesterov Y (2013) Gradient methods for minimizing composite functions. Math Program 140(1):125–161MathSciNetCrossRefGoogle Scholar
  21. 21.
    Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Advances in cryptology-eurocrypt ’99. Lecture notes in computer science, vol 1592. Springer, pp 223–238Google Scholar
  22. 22.
    van Parys R, Pipeleers G (2018) Real-time proximal gradient method for linear MPC. In: Proceedings of the 2018 European control conference, pp 1142–1147Google Scholar
  23. 23.
    Pinkas B, Schneider T, Smart N, Williams S (2009) Secure two-party computation is practical. In: Advances in cryptology-asiacrypt 2009. Lecture notes in computer science, vol 5912. Springer, pp 250–267Google Scholar
  24. 24.
    Rawlings JB, Mayne DQ, Diehl MM (2017) Model predictive control: theory, computation, and design, 2nd edn. Nob Hill PublishingGoogle Scholar
  25. 25.
    Richter S, Jones CN, Morari M (2009) Real-time input-constrained MPC using fast gradient methods. In: Proceedings of the 48th IEEE conference on decision and control, pp 7387–7392Google Scholar
  26. 26.
    Schulze Darup M (2019) Verschlüsselte Regelung in der Cloud - Stand der Technik und offene Probleme. at - Automatisierungstechnik 67(8): 668–681Google Scholar
  27. 27.
    Schulze Darup M, Book G (2019) arXiv:1911.02641 [math.OC]
  28. 28.
    Schulze Darup M, Book G (2019) Towards real-time ADMM for linear MPC. In: Proceedings of the 2019 European control conference, pp 4276–4282Google Scholar
  29. 29.
    Schulze Darup M, Cannon M (2016) Some observations on the activity of terminal constraints in linear MPC. In: Proceedings of the 2016 European control conference, pp 4977–4983Google Scholar
  30. 30.
    Schulze Darup M, Jager T (2019) Encrypted cloud-based control using secret sharing with one-time pads. In: Proceedings of the 58th conference on decision and controlGoogle Scholar
  31. 31.
    Schulze Darup M, Redder A, Quevedo DE (2018) Encrypted cloud-based MPC for linear systems with input constraints. In: Proceedings of 6th IFAC nonlinear model predictive control conference, pp 635–642Google Scholar
  32. 32.
    Schulze Darup M, Redder A, Shames I, Farokhi F, Quevedo D (2018) Towards encrypted MPC for linear constrained systems. IEEE Control Syst Lett 2(2):195–200CrossRefGoogle Scholar
  33. 33.
    Shamir A (1979) How to share a secret. Commun ACM 53(3):97–105MathSciNetzbMATHGoogle Scholar
  34. 34.
    Tøndel P, Johansen TA, Bemporad A (2002) Computation and approximation of piecewise affine control laws via binary search trees. In: Proceedings of the 41st conference on decision and control, pp 3144–3149Google Scholar
  35. 35.
    Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, SFCS ’82. IEEE Computer Society, pp 160–164Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Automatic Control Group, Department of Electrical Engineering and Information TechnologyUniversität PaderbornPaderbornGermany

Personalised recommendations