Access Control for Information-Theoretically Secure Data

Research output: Contribution to journalConference articlepeer-review

Abstract

This paper presents a novel key-based access control technique for secure outsourcing key-value stores where values correspond to documents that are indexed and accessed using keys. The proposed approach adopts Shamir’s secret-sharing that offers unconditional or information-theoretic security. It supports keyword-based document retrieval while preventing leakage of the data, access rights of users, or the size (i.e., volume of the output that satisfies a query). The proposed approach allows servers to detect (and abort) malicious clients from gaining unauthorized access to data, and prevents malicious servers from altering data undetected while ensuring efficient access – it takes 231.5ms over 5,000 keywords across 500,000 files.

Original languageEnglish (US)
Pages (from-to)3243-3255
Number of pages13
JournalProceedings of the VLDB Endowment
Volume18
Issue number10
DOIs
StatePublished - 2025
Event51st International Conference on Very Large Data Bases, VLDB 2025 - London, United Kingdom
Duration: Sep 1 2025Sep 5 2025

All Science Journal Classification (ASJC) codes

  • Computer Science (miscellaneous)
  • General Computer Science

Fingerprint

Dive into the research topics of 'Access Control for Information-Theoretically Secure Data'. Together they form a unique fingerprint.

Cite this