paint-brush
Privacy in Cloud Computing through Immersion-based Coding: Conclusion and Referencesby@computational
355 reads
355 reads

Privacy in Cloud Computing through Immersion-based Coding: Conclusion and References

tldt arrow

Too Long; Didn't Read

A framework for privacy-preserving cloud computing, combining differential privacy and system immersion to secure data without sacrificing utility.
featured image - Privacy in Cloud Computing through Immersion-based Coding: Conclusion and References
Computational Technology for All HackerNoon profile picture

Authors:

(1) Haleh Hayati, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands;

(2) Nathan van de Wouw, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands;

(3) Carlos Murguia, Department of Mechanical Engineering, Dynamics and Control Group, Eindhoven University of Technology, The Netherlands, and with the School of Electrical Engineering and Robotics, Queensland University of Technology, Brisbane, Australia.

Abstract and Introduction

Problem Formulation

Affine Solution to Problem 1

Privacy Guarantee

General Guidelines for Implementation

Case Studies

Conclusion and References

VII. CONCLUSION

In this paper, we have developed a privacy-preserving framework for the implementation of remote dynamical algorithms in the cloud. It is built on the synergy of random coding and system immersion tools from control theory to protect private information. We have devised a synthesis procedure to design the dynamics of a coding scheme for privacy and a higher-dimensional system called target algorithm such that trajectories of the standard dynamical algorithm are immersed/embedded in its trajectories, and it operates on randomly encoded higher-dimensional data. Random coding was formulated at the user side as a random change of coordinates that maps original private data to a higher-dimensional space. Such coding enforces that the target algorithm produces an encoded higher-dimensional version of the utility of the original algorithm that can be decoded on the user side.


The proposed immersion-based coding scheme provides the same utility as the original algorithm (i.e., when no coding is employed to protect against data inference), (practically) reveals no information about private data, can be applied to large-scale algorithms, is computationally efficient, and offers any desired level of differential privacy without degrading the algorithm utility.

REFERENCES

[1] S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor, “Smart meter privacy: A utility-privacy framework,” in Proceedings of the IEEE International Conference on Smart Grid Communications (SmartGridComm), 2011, pp. 190–195.


[2] O. Tan, D. Gund ¨ uz, and H. V. Poor, “Increasing smart meter privacy ¨ through energy harvesting and storage devices,” IEEE Journal on Selected Areas in Communications, vol. 31, pp. 1331–1341, 2013.


[3] Z. Huang, Y. Wang, S. Mitra, and G. E. Dullerud, “On the cost of differential privacy in distributed control systems,” in Proceedings of the 3rd International Conference on High Confidence Networked Systems, 2014, pp. 105–114.


[4] and M. Gruteser, , and A. Alrabady, “Enhancing security and privacy in traffic-monitoring systems,” IEEE Pervasive Computing, vol. 5, pp. 38–46, 2006.


[5] R. H. Weber, “Internet of things - new security and privacy challenges,” Computer Law and Security Review, vol. 26, pp. 23–30, 2010.


[6] Z. Xiao and Y. Xiao, “Security and privacy in cloud computing,” IEEE communications surveys & tutorials, vol. 15, no. 2, pp. 843–859, 2012.


[7] J. L. Ny and G. J. Pappas, “Differentially private filtering,” IEEE Transactions on Automatic Control, vol. 59, pp. 341–354, 2014.


[8] R. M. Ferrari and A. M. Teixeira, Safety, Security and Privacy for CyberPhysical Systems. Springer, 2021.


[9] T. Tanaka, M. Skoglund, H. Sandberg, and K. H. Johansson, “Directed information as privacy measure in cloud-based control,” arXiv preprint arXiv:1705.02802, 2017.


[10] C. Murguia, I. Shames, F. Farokhi, and D. Nesiˇ c, “On privacy of ´ quantized sensor measurements through additive noise,” in Proceedings of the 57th IEEE Conference on Decision and Control (CDC), 2018.


[11] N. Wang, W. Zhou, J. Wang, Y. Guo, J. Fu, and J. Liu, “Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption,” IEEE Transactions on Information Forensics and Security, 2024.


[12] M. S. Prakash and N. Monshizadeh, “Privacy-preserving cloud computation of algebraic riccati equations,” IEEE Control Systems Letters, 2024.


[13] F. Farokhi, Privacy in Dynamical Systems. Springer, 2020. [14] F. Farokhi and H. Sandberg, “Optimal privacy-preserving policy using constrained additive noise to minimize the fisher information,” in Proceedings of the IEEE 56th Annual Conference on Decision and Control (CDC), 2017.


[15] C. Murguia, I. Shames, F. Farokhi, D. Nesiˇ c, and H. V. Poor, “On privacy ´ of dynamical systems: An optimal probabilistic mapping approach,” IEEE Transactions on Information Forensics and Security, 2021.


[16] H. Hayati, C. Murguia, and N. Van De Wouw, “Finite horizon privacy of stochastic dynamical systems: A synthesis framework for gaussian mechanisms,” in 2021 60th IEEE Conference on Decision and Control (CDC). IEEE, 2021, pp. 5607–5613.


[17] H. Hayati, N. van de Wouw, and C. Murguia, “Infinite horizon privacy in networked control systems: Utility/privacy tradeoffs and design tools,” in 2023 62nd IEEE Conference on Decision and Control (CDC), 2023, pp. 1847–1852.


[18] C. Dwork, “Differential privacy: A survey of results,” in Theory and Applications of Models of Computation. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008, pp. 1–19.


[19] J. Wan, A. Lopez, and M. A. A. Faruque, “Physical layer key generation: Securing wireless communication in automotive cyber-physical systems,” ACM Transactions on Cyber-Physical Systems, vol. 3, no. 2, pp. 1–26, 2018.


[20] Y. Shoukry, K. Gatsis, A. Alanwar, G. J. Pappas, S. A. Seshia, M. Srivastava, and P. Tabuada, “Privacy-aware quadratic optimization using partially homomorphic encryption,” in Proceedings of the IEEE 55th Conference on Decision and Control (CDC), 2016, pp. 5053–5058.


[21] B. Joshi, B. Joshi, A. Mishra, V. Arya, A. K. Gupta, and D. Perakovic,´ “A comparative study of privacy-preserving homomorphic encryption techniques in cloud computing,” International Journal of Cloud Applications and Computing (IJCAC), vol. 12, no. 1, pp. 1–11, 2022.


[22] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International conference on the theory and applications of cryptographic techniques. Springer, 1999, pp. 223–238.


[23] C. Murguia, F. Farokhi, and I. Shames, “Secure and private implementation of dynamic controllers using semi homomorphic encryption,” IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3950–3957, 2020.


[24] J. Kim, D. Kim, Y. Song, H. Shim, H. Sandberg, and K. H. Johansson, “Comparison of encrypted control approaches and tutorial on dynamic systems using lwe-based homomorphic encryption,” arXiv preprint arXiv:2210.05560, 2022.


[25] A. Astolfi and R. Ortega, “Immersion and invariance: A new tool for stabilization and adaptive control of nonlinear systems,” IEEE Transactions on Automatic control, vol. 48, no. 4, pp. 590–606, 2003.


[26] H. Hayati, C. Murguia, and N. van de Wouw, “Privacy-preserving federated learning via system immersion and random matrix encryption,” in 2022 IEEE 61st Conference on Decision and Control (CDC). IEEE, 2022, pp. 6776–6781.


[27] H. Hayati, S. Heijmans, L. Persoon, C. Murguia, and N. van de Wouw, “Mo-0304 privacy-preserving federated learning for radiotherapy applications,” Radiotherapy and Oncology, vol. 182, pp. S238–S240, 2023.


[28] H. Hayati, N. van de Wouw, and C. Murguia, “Immersion and invariance-based coding for privacy in remote anomaly detection,” IFACPapersOnLine, vol. 56, no. 2, pp. 11 191–11 196, 2023.


[29] A. Astolfi, D. Karagiannis, and R. Ortega, Nonlinear and adaptive control with applications. Springer, 2008, vol. 187. [30] A. Isidori and C. Byrnes, “Output regulation of nonlinear systems,” IEEE Transactions on Automatic control, vol. 35, no. 2, pp. 131–140, 1990.


[31] F. Delli Priscoli, C. Byrnes, and A. Isidori, “Output regulation of uncertain nonlinear systems,” 1997.


[32] M. W. Hirsch, S. Smale, and R. L. Devaney, Differential equations, dynamical systems, and an introduction to chaos. Academic press, 2012.


[33] N. Schluter, P. Binfet, and M. S. Darup, “Cryptanalysis of ran- ¨ dom affine transformations for encrypted control,” arXiv preprint arXiv:2304.06582, 2023.


[34] J. Upadhyay, “Random projections, graph sparsification, and differential privacy,” in International Conference on the Theory and Application of Cryptology and Information Security. Springer, 2013, pp. 276–295.


[35] C. Dwork and A. Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends in Theoretical Computer Science, vol. 9, pp. 211–407, 2014.


[36] W. Diffie and M. E. Hellman, “New directions in cryptography,” in Secure communications and asymmetric cryptosystems. Routledge, 2019, pp. 143–180.


[37] C. E. Shannon, “Communication theory of secrecy systems,” The Bell system technical journal, vol. 28, no. 4, pp. 656–715, 1949.


[38] C. Wang and S. Ju, “Book cipher with infinite key space,” in 2008 International Symposium on Information Science and Engineering, vol. 1. IEEE, 2008, pp. 456–459.


[39] C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Differential privacy—a primer for the perplexed,”,” Joint UNECE/Eurostat work session on statistical data confidentiality, vol. 11, 2011.


[40] B. Knott, S. Venkataraman, A. Hannun, S. Sengupta, M. Ibrahim, and L. van der Maaten, “Crypten: Secure multi-party computation meets machine learning,” Advances in Neural Information Processing Systems, vol. 34, pp. 4961–4973, 2021.


[41] Y. Aono, T. Hayashi, L. Wang, S. Moriai et al., “Privacy-preserving deep learning via additively homomorphic encryption,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 5, pp. 1333–1345, 2017.


[42] K. Wei, J. Li, M. Ding, C. Ma, H. H. Yang, F. Farokhi, S. Jin, T. Q. Quek, and H. V. Poor, “Federated learning with differential privacy: Algorithms and performance analysis,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 3454–3469, 2020.


[43] S. Ruder, “An overview of gradient descent optimization algorithms,” arXiv preprint arXiv:1609.04747, 2016.


[44] J. Tang, C. Deng, and G.-B. Huang, “Extreme learning machine for multilayer perceptron,” IEEE transactions on neural networks and learning systems, vol. 27, no. 4, pp. 809–821, 2015.


[45] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to document recognition,” Proceedings of the IEEE, vol. 86, no. 11, pp. 2278–2324, 1998.


[46] X. Jia, X. Chen, S. Xu, B. Zhang, and Z. Zhang, “Adaptive output feedback control of nonlinear time-delay systems with application to chemical reactor systems,” IEEE Transactions on Industrial Electronics, vol. 64, no. 6, pp. 4792–4799, 2017.


This paper is available on arxiv under CC BY 4.0 DEED license.