Secure data storage resilient against compromised users via an access structure

No Thumbnail Available
Authors
ZivariFard, Hassan
Chou, RĂ©mi
Advisors
Issue Date
2022-11-09
Type
Conference paper
Keywords
Databases , Source coding , Conferences , Memory , Distortion , Random variables
Research Projects
Organizational Units
Journal Issue
Citation
H. ZivariFard and R. A. Chou, "Secure Data Storage Resilient Against Compromised Users via an Access Structure," 2022 IEEE Information Theory Workshop (ITW), 2022, pp. 464-469, doi: 10.1109/ITW54588.2022.9965904.
Abstract

Consider a source and multiple users who observe the independent and identically distributed (i.i.d.) copies of correlated Gaussian random variables. The source wishes to compress and store its observation in a public database such that (i) authorized sets of users can reconstruct the source with some distortion level, and (ii) information leakage to non-authorized sets of colluding users is minimized. In other words, the recovery of the data is restricted to a predefined access structure of the users. One of the main results of this paper is a closed-form characterization of the fundamental trade-off between source coding rate and the information leakage rate when any authorized set of users has "better" side information than any set of unauthorized users.

Table of Contents
Description
Click on the DOI to access this conference paper (may not be free).
Publisher
IEEE
Journal
Book Title
Series
IEEE Information Theory Workshop (ITW)
2022
PubMed ID
DOI
ISSN
EISSN