Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
194 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

A Privacy-Preserving Framework for Cloud-Based HVAC Control (2312.05183v2)

Published 8 Dec 2023 in eess.SY and cs.SY

Abstract: The objective of this work is (i) to develop an encrypted cloud-based HVAC control framework to ensure the privacy of occupancy information, (ii) to reduce the communication and computation costs of encrypted HVAC control,(iii) to reduce the leakage of private information via the triggering time instances. Occupancy of a building is sensitive and private information that can be accurately inferred by cloud-based HVAC controllers. To ensure the privacy of the privacy information, in our framework, the measurements of an HVAC system are encrypted by a fully homomorphic encryption prior to communication with the cloud controller. We first develop an encrypted algorithm that allows the cloud controller to regulate the indoor temperature and CO_2 of a building. We next develop an event-triggered control policy to reduce the communication and computation costs of the encrypted HVAC control. We cast the optimal design of the event-triggered policy as an optimal control problem. Using BeLLMan's optimality principle, we study the structural properties of the optimal event-triggered policy and show the necessary information for optimal triggering policy. We also show that the optimal design of the event-triggered policy can be transformed into a Markov decision process by introducing new states. As the triggering time instances are not encrypted, there is a risk that the cloud may use them to deduce sensitive information. To mitigate this risk, we introduce two randomized triggering strategies. We finally study the performance of the developed encrypted HVAC control framework using the TRNSYS simulator. Our numerical results show that the proposed framework not only ensures efficient control of the indoor temperature and CO$_2$ but also reduces the computation and communication costs of encrypted HVAC control by at least 60%.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (26)
  1. T. Goldschmidt, M. K. Murugaiah, C. Sonntag, B. Schlich, S. Biallas, and P. Weber, “Cloud-based control: A multi-tenant, horizontally scalable soft-PLC,” in 2015 ieee 8th international conference on cloud computing.   IEEE, 2015, pp. 909–916.
  2. “AC cloud control.” [Online]. Available: https://www.hitachiaircon.com/ranges/commercial-iot-apps-controllers/ac-cloud-control-aircloud-pro
  3. O. Givehchi, H. Trsek, and J. Jasperneite, “Cloud computing for industrial automation systems—A comprehensive overview,” in 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (ETFA).   IEEE, 2013, pp. 1–4.
  4. C. Jiang, M. K. Masood, Y. C. Soh, and H. Li, “Indoor occupancy estimation from carbon dioxide concentration,” Energy and Buildings, vol. 131, pp. 132–141, 2016.
  5. A. Vosughi, M. Xue, and S. Roy, “Occupant-location-catered control of IoT-enabled building hvac systems,” IEEE Transactions on Control Systems Technology, vol. 28, no. 6, pp. 2572–2580, 2020.
  6. “What is saas (software-as-a-service)?” [Online]. Available: https://www.ibm.com/topics/saas
  7. R. L. Rivest, L. Adleman, M. L. Dertouzos et al., “On data banks and privacy homomorphisms,” Foundations of secure computation, vol. 4, no. 11, pp. 169–180, 1978.
  8. A. Acar, H. Aksu, A. S. Uluagac, and M. Conti, “A survey on homomorphic encryption schemes: Theory and implementation,” ACM Computing Surveys (Csur), vol. 51, no. 4, pp. 1–35, 2018.
  9. M. S. Darup, A. B. Alexandru, D. E. Quevedo, and G. J. Pappas, “Encrypted control for networked systems: An illustrative introduction and current challenges,” IEEE Control Systems Magazine, vol. 41, no. 3, pp. 58–78, 2021.
  10. K. Kogiso and T. Fujita, “Cyber-security enhancement of networked control systems using homomorphic encryption,” in 2015 54th IEEE Conference on Decision and Control (CDC).   IEEE, 2015, pp. 6836–6843.
  11. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469–472, 1985.
  12. K. Teranishi, N. Shimada, and K. Kogiso, “Stability-guaranteed dynamic elgamal cryptosystem for encrypted control systems,” IET Control Theory & Applications, vol. 14, no. 16, pp. 2242–2252, 2020.
  13. H. Kawase, K. Teranishi, and K. Kogiso, “Dynamic quantizer synthesis for encrypted state-feedback control systems with partially homomorphic encryption,” in 2022 American Control Conference (ACC), 2022, pp. 75–81.
  14. F. Farokhi, I. Shames, and N. Batterham, “Secure and private cloud-based control using semi-homomorphic encryption,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 163–168, 2016.
  15. C. Murguia, F. Farokhi, and I. Shames, “Secure and private implementation of dynamic controllers using semihomomorphic encryption,” IEEE Transactions on Automatic Control, vol. 65, no. 9, pp. 3950–3957, 2020.
  16. P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International Conference on the Theory and Applications of Cryptographic Techniques.   Springer, 1999, pp. 223–238.
  17. J. Kim, C. Lee, H. Shim, J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Encrypting controller using fully homomorphic encryption for security of cyber-physical systems,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 175–180, 2016.
  18. Z. Zhang, P. Cheng, J. Wu, and J. Chen, “Secure state estimation using hybrid homomorphic encryption scheme,” IEEE Transactions on Control Systems Technology, vol. 29, no. 4, pp. 1704–1720, 2021.
  19. Y. Lin, F. Farokhi, I. Shames, and D. Nešić, “Secure control of nonlinear systems using semi-homomorphic encryption,” in 2018 IEEE Conference on Decision and Control (CDC).   IEEE, 2018, pp. 5002–5007.
  20. M. S. Darup, A. Redder, I. Shames, F. Farokhi, and D. Quevedo, “Towards encrypted MPC for linear constrained systems,” IEEE Control Systems Letters, vol. 2, no. 2, pp. 195–200, 2017.
  21. M. S. Darup et al., “Encrypted model predictive control in the cloud,” in Privacy in Dynamical Systems.   Springer, 2020, pp. 231–265.
  22. J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Homomorphic encryption for arithmetic of approximate numbers,” in Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I 23.   Springer, 2017, pp. 409–437.
  23. I. Kempf, P. Goulart, and S. Duncan, “Fast gradient method for model predictive control with input rate and amplitude constraints,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 6542–6547, 2020.
  24. R. J. Williams, “Simple statistical gradient-following algorithms for connectionist reinforcement learning,” Machine Learning, vol. 8, pp. 229–256, 1992.
  25. S. Yadav and R. S. Yadav, “A review on energy efficient protocols in wireless sensor networks,” Wireless Networks, vol. 22, pp. 335–350, 2016.
  26. J. Fan and F. Vercauteren, “Somewhat practical fully homomorphic encryption,” Cryptology ePrint Archive, 2012.
Citations (2)

Summary

We haven't generated a summary for this paper yet.

Youtube Logo Streamline Icon: https://streamlinehq.com