Secure data storage resilient against compromised users via an access structure

No Thumbnail Available
Issue Date
2022-11-09
Embargo End Date
Authors
ZivariFard, Hassan
Chou, RĂ©mi A.
Advisor
Citation

H. ZivariFard and R. A. Chou, "Secure Data Storage Resilient Against Compromised Users via an Access Structure," 2022 IEEE Information Theory Workshop (ITW), 2022, pp. 464-469, doi: 10.1109/ITW54588.2022.9965904.

Abstract

Consider a source and multiple users who observe the independent and identically distributed (i.i.d.) copies of correlated Gaussian random variables. The source wishes to compress and store its observation in a public database such that (i) authorized sets of users can reconstruct the source with some distortion level, and (ii) information leakage to non-authorized sets of colluding users is minimized. In other words, the recovery of the data is restricted to a predefined access structure of the users. One of the main results of this paper is a closed-form characterization of the fundamental trade-off between source coding rate and the information leakage rate when any authorized set of users has "better" side information than any set of unauthorized users.

Table of Content
Description
Click on the DOI to access this conference paper (may not be free).
publication.page.dc.relation.uri
DOI