Distributed Attribute-based Private Access Control

02/09/2022
by   Amir Masoud Jafarpisheh, et al.
0

In attribute-based access control, users with certain verified attributes will gain access to some particular data. Concerning with privacy of the users' attributes, we study the problem of distributed attribute-based private access control (DAPAC) with multiple authorities, where each authority will learn and verify only one of the attributes. To investigate its fundamental limits, we introduce an information theoretic DAPAC framework, with N ∈ℕ, N≥ 2, replicated non-colluding servers (authorities) and some users. Each user has an attribute vector 𝐯^*=(v_1^*, ..., v_N^*) of dimension N and is eligible to retrieve a message W^𝐯^*, available in all servers. Each server n∈ [N] is able to only observe and verify the n'th attribute of a user. In response, it sends a function of its data to the user. The system must satisfy the following conditions: (1) Correctness: the user with attribute vector 𝐯^* is able to retrieve his intended message W^𝐯^* from the servers' response, (2) Data Secrecy: the user will not learn anything about the other messages, (3) Attribute Privacy: each Server n learns nothing beyond attribute n of the user. The capacity of the DAPAC is defined as the ratio of the file size and the aggregated size of the responses, maximized over all feasible schemes. We obtain a lower bound on the capacity of this problem by proposing an achievable algorithm with rate 1/2K, where K is the size of the alphabet of each attribute.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/13/2017

Private Function Retrieval

The widespread use of cloud computing services raises the question of ho...
research
01/11/2020

Private Information Retrieval Over Gaussian MAC

Consider the problem of Private Information Retrieval (PIR) where a user...
research
04/26/2018

The Capacity of Private Information Retrieval with Eavesdroppers

We consider the problem of private information retrieval (PIR) with coll...
research
01/22/2019

Single-Server Multi-Message Individually-Private Information Retrieval with Side Information

We consider a multi-user variant of the private information retrieval pr...
research
01/11/2021

Reachability Analysis for Attributes in ABAC with Group Hierarchy

Attribute-based access control (ABAC) models are widely used to provide ...
research
07/09/2019

Interactive Verifiable Polynomial Evaluation

Cloud computing platforms have created the possibility for computational...
research
05/09/2023

On Multi-Message Private Computation

In a typical formulation of the private information retrieval (PIR) prob...

Please sign up or login with your details

Forgot password? Click here to reset