Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

被引:169
作者
Hu, Pengfei [1 ]
Ning, Huansheng [1 ]
Qiu, Tie [2 ]
Song, Houbing [3 ]
Wang, Yanna [1 ]
Yao, Xuanxia [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116024, Peoples R China
[3] West Virginia Univ, Dept Elect & Comp Engn, Montgomery, WV 25136 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 05期
基金
中国国家自然科学基金;
关键词
Face identification; face resolution; fog computing; Internet of Things (IoT); privacy preservation; security; LOCAL BINARY PATTERNS; MANAGEMENT; SCALE;
D O I
10.1109/JIOT.2017.2659783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification and resolution technology is crucial to ensure the identity consistency of humans in physical space and cyber space. In the current Internet of Things (IoT) and big data situation, the increase of applications based on face identification and resolution raises the demands of computation, communication, and storage capabilities. Therefore, we have proposed the fog computing-based face identification and resolution framework to improve processing capacity and save the bandwidth. However, there are some security and privacy issues brought by the properties of fog computing-based framework. In this paper, we propose a security and privacy preservation scheme to solve the above issues. We give an outline of the fog computing-based face identification and resolution framework, and summarize the security and privacy issues. Then the authentication and session key agreement scheme, data encryption scheme, and data integrity checking scheme are proposed to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution. Finally, we implement a prototype system to evaluate the influence of security scheme on system performance. Meanwhile, we also evaluate and analyze the security properties of proposed scheme from the viewpoint of logical formal proof and the confidentiality, integrity, and availability (CIA) properties of information security. The results indicate that the proposed scheme can effectively meet the requirements for security and privacy preservation.
引用
收藏
页码:1143 / 1155
页数:13
相关论文
共 47 条
  • [1] Face description with local binary patterns:: Application to face recognition
    Ahonen, Timo
    Hadid, Abdenour
    Pietikainen, Matti
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2006, 28 (12) : 2037 - 2041
  • [2] [Anonymous], NETW DISTR SYST SEC
  • [3] [Anonymous], P INT WORKSH FAST SO
  • [4] [Anonymous], 2017, SMART CITIES FDN PRI, DOI DOI 10.1002/9781119226444
  • [5] [Anonymous], IEEE T IND IN PRESS
  • [6] [Anonymous], 2016, FUTURE GENER COMPUT
  • [7] [Anonymous], IEEE COMSOC MMTC COM
  • [8] [Anonymous], 2017, Security and privacy in cyber-physical systems foundations, principles and applications
  • [9] [Anonymous], 2015, INT J ENG TECHNICAL
  • [10] [Anonymous], IEEE T CLOU IN PRESS