Access Control for Information-Theoretically Secure Key-Document Stores
By: Yin Li , Sharad Mehrota , Shantanu Sharma and more
Potential Business Impact:
Keeps secret files safe when stored online.
This paper presents a novel key-based access control technique for secure outsourcing key-value stores where values correspond to documents that are indexed and accessed using keys. The proposed approach adopts Shamir's secret-sharing that offers unconditional or information-theoretic security. It supports keyword-based document retrieval while preventing leakage of the data, access rights of users, or the size (\textit{i}.\textit{e}., volume of the output that satisfies a query). The proposed approach allows servers to detect (and abort) malicious clients from gaining unauthorized access to data, and prevents malicious servers from altering data undetected while ensuring efficient access -- it takes 231.5ms over 5,000 keywords across 500,000 files.
Similar Papers
TEE-based Key-Value Stores: a Survey
Cryptography and Security
Keeps secret data safe even on untrusted computers.
Enhancing Distributed Authorization With Lagrange Interpolation And Attribute-Based Encryption
Cryptography and Security
Lets people share secret files faster and safer.
Enhanced Rényi Entropy-Based Post-Quantum Key Agreement with Provable Security and Information-Theoretic Guarantees
Cryptography and Security
Protects secrets from future super-powerful computers.