Secure and Private Cloud-Based Control Using Semi-Homomorphic Encryption

被引:51
作者
Farokhi, Farhad [1 ]
Shames, Iman [1 ]
Batterham, Nathan [1 ]
机构
[1] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic 3010, Australia
来源
IFAC PAPERSONLINE | 2016年 / 49卷 / 22期
关键词
Networked control system; Privacy; Semi-homomorphic encryption; Paillier method;
D O I
10.1016/j.ifacol.2016.10.390
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Networked control systems with encrypted sensors measurements is considered. Semi-homomorphic encryption is used so that the controller can perform the required computation on the encrypted data. Specifically, in this paper, the Paillier encryption technique is utilized that allows summation of decrypted data to be performed by multiplication of the encrypted data. Conditions on the parameters of the encryption technique are provided that guarantee the stability of the closed-loop system and ensure certain bounds on the closed-loop performance. (C) 2016, IFAC (International Federation of Automatic Control) Hosting by Elsevier Ltd. All rights reserved.
引用
收藏
页码:163 / 168
页数:6
相关论文
共 18 条
[1]   GAME-THEORETIC MODELS OF ELECTRICITY THEFT DETECTION IN SMART UTILITY NETWORKS PROVIDING NEW CAPABILITIES WITH ADVANCED METERING INFRASTRUCTURE [J].
Amin, Saurabh ;
Schwartz, Galina A. ;
Cardenas, Alvaro A. ;
Sastry, S. Shankar .
IEEE CONTROL SYSTEMS MAGAZINE, 2015, 35 (01) :66-81
[2]   ALGEBRAIC CHARACTERIZATION OF FIXED MODES IN DECENTRALIZED CONTROL [J].
ANDERSON, BDO ;
CLEMENTS, DJ .
AUTOMATICA, 1981, 17 (05) :703-712
[3]  
[Anonymous], 2012, ASIACCS
[4]  
Brenner Michael, 2011, 2011 5th IEEE International Conference on Digital Ecosystems and Technologies (DEST 2011), P114, DOI 10.1109/DEST.2011.5936608
[5]  
De Luca A., 2000, P 6 IFAC S ROB CONTR, V33, P687, DOI DOI 10.1016/S1474-6670(17)38011-4
[6]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[7]  
Farokhi F., 2016, SECURE PRIVATE CLOUD
[8]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[9]  
Hespanha JP, 2009, LINEAR SYSTEMS THEORY, P1
[10]  
Kogiso K, 2015, IEEE DECIS CONTR P, P6836, DOI 10.1109/CDC.2015.7403296