Efficient and privacy-preserving biometric identification in cloud

被引:13
|
作者
Hahn, Changhee [1 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
ICT EXPRESS | 2016年 / 2卷 / 03期
基金
新加坡国家研究基金会;
关键词
Privacy; Biometrics; Identification; Cloud;
D O I
10.1016/j.icte.2016.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server. (C) 2016 The Korean Institute of Communications Information Sciences. Publishing Services by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:135 / 139
页数:5
相关论文
共 50 条
  • [11] Efficient and Privacy-Preserving Weighted Range Set Sampling in Cloud
    Zheng, Yandong
    Zhu, Hui
    Lu, Rongxing
    Zhang, Songnian
    Wang, Fengwei
    Shao, Jun
    Li, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 534 - 548
  • [12] An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification
    Wang, Yongjin
    Plataniotis, Konstantinos N.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2010, 40 (05): : 1280 - 1293
  • [13] Privacy-Preserving Biometric Verification With Handwritten Random Digit String
    Zhang, Peirong
    Liu, Yuliang
    Lai, Songxuan
    Li, Hongliang
    Jin, Lianwen
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2025, 47 (04) : 3049 - 3066
  • [14] Privacy-Preserving Credit Scoring on Cloud
    Wang, Jilin
    Chen, Yingzi
    Feng, Xiaoqing
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 195 - 205
  • [15] EFPA: Efficient and Flexible Privacy-Preserving Mining of Association Rule in Cloud
    Huang, Cheng
    Lu, Rongxing
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [16] Novel and Efficient Privacy-Preserving Continuous Authentication
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    CRYPTOGRAPHY, 2024, 8 (01)
  • [17] Covert Channels in Privacy-Preserving Identification Systems
    Bailey, Daniel V.
    Boneh, Dan
    Goh, Eu-Jin
    Juels, Ari
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 297 - 306
  • [18] Privacy-Preserving Identification Systems With Noisy Enrollment
    Zhou, Linghui
    Minh Thanh Vu
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 3510 - 3523
  • [19] Security of a Privacy-Preserving Biometric Authentication Protocol Revisited
    Abidin, Aysajan
    Matsuura, Kanta
    Mitrokotsa, Aikaterini
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 290 - +
  • [20] Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud
    Wang, Guoming
    Lu, Rongxing
    Guan, Yong Liang
    IEEE ACCESS, 2018, 6 : 70831 - 70842