Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems

被引:10
作者
Gao, Wenjing [1 ]
Yu, Jia [1 ,2 ,3 ]
Hao, Rong [1 ,2 ,3 ]
Kong, Fanyu [4 ]
Liu, Xiaodong [5 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100878, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[4] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[5] ShanDong Sansec Informat & Technol Co Ltd, Jinan 250101, Peoples R China
基金
中国国家自然科学基金;
关键词
Face recognition; Servers; Protocols; Security; Data privacy; Task analysis; Internet of Things; Edge computing; face recognition; intelligent security; parallel computing; privacy preserving; LARGE MATRIX;
D O I
10.1109/JIOT.2023.3240166
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face recognition is one of the key technologies in intelligent security systems. Data privacy and identification efficiency have always been concerns about face recognition. Existing privacy-preserving protocols only focus on the training phase of face recognition. Since intelligent security systems mainly complete the calculation of large-scale face data in the identification phase, existing privacy-preserving protocols cannot be well applied to intelligent security systems. In this article, we propose the first privacy-preserving face recognition protocol for the calculations in the identification phase for intelligent security systems. We introduce the Householder matrix to blind user data including model data and face data, which enables the proposed protocol to support privacy-preserving face recognition on semi-trusted edge servers. Utilizing edge computing, fast response for large-scale face recognition can be achieved. The user can offload heavy calculations of matrix multiplication and Euclidean distances to edge servers simultaneously. The proposed protocol supports parallel computing based on multiple edge servers and thus enhances the efficiency of face recognition in intelligent security systems. Moreover, the recognition accuracy in the proposed protocol is the same as that in the original PCA-based face recognition algorithm. The security analysis demonstrates that the protocol protects the privacy of user data. The numerical analysis and simulation experiments are carried out to show the efficiency and feasibility of the proposed protocol.
引用
收藏
页码:10948 / 10958
页数:11
相关论文
共 30 条
[1]   Secure and verifiable outsourced data dimension reduction on dynamic data [J].
Chen, Zhenzhu ;
Fu, Anmin ;
Deng, Robert H. ;
Liu, Ximeng ;
Yang, Yang ;
Zhang, Yinghui .
INFORMATION SCIENCES, 2021, 573 :182-193
[2]   Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF) [J].
Duan, Jia ;
Zhou, Jiantao ;
Li, Yuanman .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) :1940-1953
[3]  
Hu C.-K., 2017, 2017 IEEE INT INTERC, P1, DOI DOI 10.1109/IITC-AMC.2017.7968977
[4]   Secure outsourcing SIFT: Efficient and Privacy-Preserving Image Feature Extraction in the Encrypted Domain [J].
Jiang, Linzhi ;
Xu, Chunxiang ;
Wang, Xiaofang ;
Luo, Bo ;
Wang, Huaqun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (01) :179-193
[5]   Acquiring linear subspaces for face recognition under variable lighting [J].
Lee, KC ;
Ho, J ;
Kriegman, DJ .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2005, 27 (05) :684-698
[6]   Achieving security, robust cheating resistance, and high-efficiency for outsourcing large matrix multiplication computation to a malicious cloud [J].
Lei, Xinyu ;
Liao, Xiaofeng ;
Huang, Tingwen ;
Heriniaina, Feno .
INFORMATION SCIENCES, 2014, 280 :205-217
[7]   Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions [J].
Li, Minghui ;
Chow, Sherman S. M. ;
Hu, Shengshan ;
Yan, Yuejing ;
Shen, Chao ;
Wang, Qian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :1592-1604
[8]  
Liang J., 2019, IEEE ICC, P1, DOI DOI 10.1109/icc.2019.8761610
[9]   A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications [J].
Lin, Jie ;
Yu, Wei ;
Zhang, Nan ;
Yang, Xinyu ;
Zhang, Hanlin ;
Zhao, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1125-1142
[10]   Secure outsourcing of large matrix determinant computation [J].
Liu, Jiayang ;
Bi, Jingguo ;
Li, Mu .
FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (06)