Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing

被引:0
|
作者
Xu, Chang [1 ]
Zhang, Lvhan [2 ]
Zhu, Liehuang [1 ]
Zhang, Chuan [1 ]
Sharif, Kashif [2 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Biometric Identification; Cloud Server; Data outsourcing; Privacy-preserving; SCHEME;
D O I
10.1109/TRUSTCOM53373.2021.00063
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Biometrics identification has been used in a growing number of fields in recent years, since it is more secure, classified and convenient. With the development of cloud computing, database systems are able to upload large amounts of biometric data to cloud server for storage and identification to save local memory and improve computational efficiency. However, this involves potential privacy concerns because of the introduction of third-party platforms. In this paper, we achieve computational and communication efficiency in biometric identification, while preserving the privacy of data. Specifically, the database system firstly encrypts all biometric data and query data. Then, it sends the ciphertext to a cloud server to carry out matching tasks. Finally, the cloud server returns the index of final matches to the system so that it can check whether the biometric vector is legal or not. Detailed security analysis indicates that the proposed scheme can resist powerful attacks. Beyond that, Experiments show that the scheme is more efficient in computation and communication than stat of art biometric identification schemes.
引用
收藏
页码:363 / 370
页数:8
相关论文
共 50 条
  • [21] Privacy-Preserving Data Sharing in Cloud Computing
    王慧
    JournalofComputerScience&Technology, 2010, 25 (03) : 401 - 414
  • [22] Privacy-preserving outsourced classification in cloud computing
    Ping Li
    Jin Li
    Zhengan Huang
    Chong-Zhi Gao
    Wen-Bin Chen
    Kai Chen
    Cluster Computing, 2018, 21 : 277 - 286
  • [23] Privacy-Preserving Data Sharing in Cloud Computing
    Wang, Hui
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (03) : 401 - 414
  • [24] Privacy-Preserving Data Sharing in Cloud Computing
    Hui Wang
    Journal of Computer Science and Technology, 2010, 25 : 401 - 414
  • [25] Privacy-preserving outsourced classification in cloud computing
    Li, Ping
    Li, Jin
    Huang, Zhengan
    Gao, Chong-Zhi
    Chen, Wen-Bin
    Chen, Kai
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2018, 21 (01): : 277 - 286
  • [26] Achieving Efficient and Privacy-Preserving (α, β)-Core Query Over Bipartite Graphs in Cloud
    Guan, Yunguo
    Lu, Rongxing
    Zheng, Yandong
    Zhang, Songnian
    Shao, Jun
    Wei, Guiyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1979 - 1993
  • [27] Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments
    Zhang, Chuan
    Hu, Chenfei
    Wu, Tong
    Zhu, Liehuang
    Liu, Ximeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4245 - 4257
  • [28] An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree
    Yang X.
    Zhu H.
    Zhang S.
    Lu R.
    Gao X.
    Security and Communication Networks, 2021, 2021
  • [29] PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing
    Huang, Cheng
    Lu, Rongxing
    Zhu, Hui
    Hu, Hao
    Lin, Xiaodong
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [30] A review of privacy-preserving biometric identification and authentication protocols
    Zeng, Li
    Shen, Peisong
    Zhu, Xiaojie
    Tian, Xue
    Chen, Chi
    COMPUTERS & SECURITY, 2025, 150