Symmetries and Isomorphisms for Privacy in Control Over the Cloud

نویسندگان

چکیده

Cloud computing platforms are being increasingly used for closing feedback control loops, especially when computationally expensive algorithms, such as model-predictive control, to optimize performance. Outsourcing of algorithms entails an exchange data between the system and cloud and, naturally, raises concerns about privacy system's (e.g., state trajectory objective). Moreover, any attempt at enforcing needs add minimal computational overhead avoid degrading In this article, we propose several transformation-based methods privacy. We also quantify amount provided discuss how much is lost adversary has access side knowledge. address three different scenarios: 1) no knowledge controlled; 2) knows what sensors actuators employs but not dynamics; 3) dynamics, its sensors, actuators. all these scenarios, proposed allow over without compromising private information (which considered depends on scenario).

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

the search for the self in becketts theatre: waiting for godot and endgame

this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...

15 صفحه اول

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Cloud Control: Copyright, Global Memes and Privacy

Imagine for a moment that electricity was used only to power one kind of computer known as an electricity computer. That is what computer power is like now: it mainly powers devices that sit on our desks with qwerty keyboards attached. As computing becomes a utility it will power many more devices, many of them with no user interface, more of them mobile and handheld. The Cloud should also enco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Automatic Control

سال: 2021

ISSN: ['0018-9286', '1558-2523', '2334-3303']

DOI: https://doi.org/10.1109/tac.2020.2982611