Papers
Topics
Authors
Recent
Search
2000 character limit reached

A Verifiable Computing Scheme for Encrypted Control Systems

Published 28 May 2024 in eess.SY, cs.CR, and cs.SY | (2405.18586v1)

Abstract: The proliferation of cloud computing technologies has paved the way for deploying networked encrypted control systems, offering high performance, remote accessibility and privacy. However, in scenarios where the control algorithms run on third-party cloud service providers, the control logic might be changed by a malicious agent on the cloud. Consequently, it is imperative to verify the correctness of the control signals received from the cloud. Traditional verification methods, like zero-knowledge proof techniques, are computationally demanding in both proof generation and verification, may require several rounds of interactions between the prover and verifier and, consequently, are inapplicable in realtime control system applications. In this paper, we present a novel computationally inexpensive verifiable computing solution inspired by the probabilistic cut-and-choose approach. The proposed scheme allows the plant's actuator to validate the computations accomplished by the encrypted cloud-based networked controller without compromising the control scheme's performance. We showcase the effectiveness and real-time applicability of the proposed verifiable computation scheme using a remotely controlled Khepera IV differential-drive robot.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (18)
  1. Y. Xia, Y. Zhang, L. Dai, Y. Zhan, and Z. Guo, “A brief survey on recent advances in cloud control systems,” IEEE Trans. on Circuits and Systems II: Express Briefs, vol. 69, no. 7, pp. 3108–3114, 2022.
  2. A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson, “Attack models and scenarios for networked control systems,” in Int. Conf. on High Confidence Networked Systems, 2012, pp. 55–64.
  3. J. Giraldo, D. Urbina, A. Cardenas, J. Valente, M. Faisal, J. Ruths, N. O. Tippenhauer, H. Sandberg, and R. Candell, “A survey of physics-based attack detection in cyber-physical systems,” ACM Computing Surveys (CSUR), vol. 51, no. 4, pp. 1–36, 2018.
  4. J. Kim, C. Lee, H. Shim, J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Encrypting controller using fully homomorphic encryption for security of cyber-physical systems,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 175–180, 2016.
  5. N. Schlüter, P. Binfet, and M. S. Darup, “A brief survey on encrypted control: From the first to the second generation and beyond,” Annual Reviews in Control, p. 100913, 2023.
  6. M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, 2021.
  7. A. M. Naseri, W. Lucia, M. Mannan, and A. Youssef, “On securing cloud-hosted cyber-physical systems using trusted execution environments,” in IEEE Int. Conf. on Autonomous Systems, 2021, pp. 1–5.
  8. C. Costello, C. Fournet, J. Howell, M. Kohlweiss, B. Kreuter, M. Naehrig, B. Parno, and S. Zahur, “Geppetto: Versatile verifiable computation,” in IEEE Symposium on Security and Privacy.   IEEE, 2015, pp. 253–270.
  9. B. Parno, J. Howell, C. Gentry, and M. Raykova, “Pinocchio: Nearly practical verifiable computation,” Communications of the ACM, vol. 59, no. 2, pp. 103–112, 2016.
  10. B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille, and G. Maxwell, “Bulletproofs: Short proofs for confidential transactions and more,” in IEEE Symposium on Security and Privacy.   IEEE, 2018, pp. 315–334.
  11. D. Fiore, R. Gennaro, and V. Pastro, “Efficiently verifiable computation on encrypted data,” in ACM SIGSAC Conf. on Computer and Communications Security, 2014, pp. 844–855.
  12. D. Fiore, A. Nitulescu, and D. Pointcheval, “Boosting verifiable computation on encrypted data,” in Public-Key Cryptography: IACR International Conference on Practice and Theory of Public-Key Cryptography.   Springer, 2020, pp. 124–154.
  13. J. H. Cheon, D. Kim, J. Kim, S. Lee, and H. Shim, “Authenticated computation of control signal from dynamic controllers,” in IEEE Conf. on Decision and Control.   IEEE, 2020, pp. 3249–3254.
  14. R. Mahfouzi, A. Aminifar, S. Samii, P. Eles, and Z. Peng, “Secure cloud control using verifiable computation,” in IEEE Int. Conference on Omni-Layer Intelligent Systems.   IEEE, 2021, pp. 1–6.
  15. D. Chaum and et al., “Scantegrity ii: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes,” EVT, vol. 8, no. 1, p. 13, 2008.
  16. C. Escudero, C. Murguia, P. Massioni, and E. Zamaï, “Safety-preserving filters against stealthy sensor and actuator attacks,” in IEEE Conf. on Decision and Control (CDC).   IEEE, 2023, pp. 5097–5104.
  17. C. Tiriolo, G. Franzè, and W. Lucia, “A receding horizon trajectory tracking strategy for input-constrained differential-drive robots via feedback linearization,” IEEE Trans. on Control Systems Technology, vol. 31, no. 3, pp. 1460–1467, 2022.
  18. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in Int. Conf. on the Theory and Applications of Cryptographic Techniques.   Springer, 1999, pp. 223–238.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.