Symmetries and Isomorphisms for Privacy in Control Over the Cloud
نویسندگان
چکیده
Cloud computing platforms are being increasingly used for closing feedback control loops, especially when computationally expensive algorithms, such as model-predictive control, to optimize performance. Outsourcing of algorithms entails an exchange data between the system and cloud and, naturally, raises concerns about privacy system's (e.g., state trajectory objective). Moreover, any attempt at enforcing needs add minimal computational overhead avoid degrading In this article, we propose several transformation-based methods privacy. We also quantify amount provided discuss how much is lost adversary has access side knowledge. address three different scenarios: 1) no knowledge controlled; 2) knows what sensors actuators employs but not dynamics; 3) dynamics, its sensors, actuators. all these scenarios, proposed allow over without compromising private information (which considered depends on scenario).
منابع مشابه
the search for the self in becketts theatre: waiting for godot and endgame
this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...
15 صفحه اولPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملPrivacy and Security of Big Data in THE Cloud
Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...
متن کاملdevelopment and implementation of an optimized control strategy for induction machine in an electric vehicle
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
15 صفحه اولCloud Control: Copyright, Global Memes and Privacy
Imagine for a moment that electricity was used only to power one kind of computer known as an electricity computer. That is what computer power is like now: it mainly powers devices that sit on our desks with qwerty keyboards attached. As computing becomes a utility it will power many more devices, many of them with no user interface, more of them mobile and handheld. The Cloud should also enco...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Automatic Control
سال: 2021
ISSN: ['0018-9286', '1558-2523', '2334-3303']
DOI: https://doi.org/10.1109/tac.2020.2982611