A Strong Privacy-Preserving and Efficient Fingerprint Authentication via Clustering

被引:0
作者
Liu, Jingwei [1 ]
Zhou, Zihan [1 ]
Sun, Rong [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian, Peoples R China
[2] Xidian Univ, State Key Lab ISN, Xian, Peoples R China
[3] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM | 2023年
关键词
Privacy preservation; biometric authentication; cloud computing; homomorphic encryption; ATTACKS;
D O I
10.1109/GLOBECOM54140.2023.10437834
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the advancement of cloud technology, the storage and computing overhead in large-scale biometric authentication is mitigated by outsourcing data to the cloud. Since biometric features serve as a unique identifier bound to each individual, transmitting them directly to the cloud may bring about serious privacy disclosure risks. To guarantee users' biometric features, there are many solutions have been proposed. However, most of them neglect to protect identity security. In light of the challenges, this paper proposes a strong privacy-preserving fingerprint authentication via clustering. Besides safeguarding fingerprint features, the scheme also blurs the identities of users to enable anonymity of identity. Meanwhile, the authentication efficiency of the proposed scheme is improved by vector processing of fingerprints and fast retrieval of clustered identities. Furthermore, a dual-server matching architecture effectively reduces the communication overhead of the service provider. The security analysis and experimental results indicate that the proposed scheme provides strong privacy preservation while maintaining high efficiency.
引用
收藏
页码:5889 / 5894
页数:6
相关论文
共 25 条
[1]  
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[2]   Detection of selective forwarding attacks in heterogeneous sensor networks [J].
Brown, Jeremy ;
Du, Xiaojiang .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1583-1587
[3]  
Buhan I., 2008, P 16 EUR SIGN PROC C, P1
[4]   Homomorphic Encryption for Arithmetic of Approximate Numbers [J].
Cheon, Jung Hee ;
Kim, Andrey ;
Kim, Miran ;
Song, Yongsoo .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :409-437
[5]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[6]   CloudID: Trustworthy cloud-based and cross-enterprise biometric identification [J].
Haghighat, Mohammad ;
Zonouz, Saman ;
Abdel-Mottaleb, Mohamed .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (21) :7905-7916
[7]   Building Redactable Consortium Blockchain for Industrial Internet-of-Things [J].
Huang, Ke ;
Zhang, Xiaosong ;
Mu, Yi ;
Wang, Xiaofen ;
Yang, Guomin ;
Du, Xiaojiang ;
Rezaeibagha, Fatemeh ;
Xia, Qi ;
Guizani, Mohsen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3670-3679
[8]   Secret Rate - Privacy Leakage in Biometric Systems [J].
Ignatenko, Tanya ;
Willems, Frans .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :2251-2255
[9]  
Jain A. K., 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), P187, DOI 10.1109/CVPR.1999.784628
[10]   Biohashing: two factor authentication featuring fingerprint data and tokenised random number [J].
Jin, ATB ;
Ling, DNC ;
Goh, A .
PATTERN RECOGNITION, 2004, 37 (11) :2245-2255