Secure cloud computing algorithms for discrete constrained potential games

Yang Lu, Minghui Zhu

    Research output: Contribution to journalConference article

    3 Scopus citations

    Abstract

    In this paper, we study secure cloud computing problem for a class of discrete constrained potential games. In the games, certain functions are confidential for the system operator and not disclosed to any other participant. Meanwhile, each agent is unwilling to disclose its private functions and states to any other participant. By utilizing reinforcement learning and homomorphic encryption, we propose a distributed algorithm where (i) both the confidentiality for the system operator and the privacy for the agents are protected; (ii) the convergence to Nash equilibria is formally ensured.

    Original languageEnglish (US)
    Pages (from-to)180-185
    Number of pages6
    JournalIFAC-PapersOnLine
    Volume28
    Issue number22
    DOIs
    StatePublished - Oct 1 2015
    Event5th IFAC Workshop on Distributed Estimation and Control in Networked Systems, NecSys 2015 - Philadelphia, United States
    Duration: Sep 10 2015Sep 11 2015

    All Science Journal Classification (ASJC) codes

    • Control and Systems Engineering

    Fingerprint Dive into the research topics of 'Secure cloud computing algorithms for discrete constrained potential games'. Together they form a unique fingerprint.

  • Cite this