Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things

被引:169
作者
Hu, Pengfei [1 ]
Ning, Huansheng [1 ]
Qiu, Tie [2 ]
Song, Houbing [3 ]
Wang, Yanna [1 ]
Yao, Xuanxia [1 ]
机构
[1] Univ Sci & Technol Beijing, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
[2] Dalian Univ Technol, Sch Software, Dalian 116024, Peoples R China
[3] West Virginia Univ, Dept Elect & Comp Engn, Montgomery, WV 25136 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2017年 / 4卷 / 05期
基金
中国国家自然科学基金;
关键词
Face identification; face resolution; fog computing; Internet of Things (IoT); privacy preservation; security; LOCAL BINARY PATTERNS; MANAGEMENT; SCALE;
D O I
10.1109/JIOT.2017.2659783
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Face identification and resolution technology is crucial to ensure the identity consistency of humans in physical space and cyber space. In the current Internet of Things (IoT) and big data situation, the increase of applications based on face identification and resolution raises the demands of computation, communication, and storage capabilities. Therefore, we have proposed the fog computing-based face identification and resolution framework to improve processing capacity and save the bandwidth. However, there are some security and privacy issues brought by the properties of fog computing-based framework. In this paper, we propose a security and privacy preservation scheme to solve the above issues. We give an outline of the fog computing-based face identification and resolution framework, and summarize the security and privacy issues. Then the authentication and session key agreement scheme, data encryption scheme, and data integrity checking scheme are proposed to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution. Finally, we implement a prototype system to evaluate the influence of security scheme on system performance. Meanwhile, we also evaluate and analyze the security properties of proposed scheme from the viewpoint of logical formal proof and the confidentiality, integrity, and availability (CIA) properties of information security. The results indicate that the proposed scheme can effectively meet the requirements for security and privacy preservation.
引用
收藏
页码:1143 / 1155
页数:13
相关论文
共 47 条
  • [21] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [22] Ubiquitous ID: Standards for Ubiquitous Computing and the Internet of Things
    Koshizuka, Noboru
    Sakamura, Ken
    [J]. IEEE PERVASIVE COMPUTING, 2010, 9 (04) : 98 - 101
  • [23] Physimetric identification (Physi-ID)-Applying biometric concept in physical object identification
    Kwok, S. K.
    Ng, Ocean P. H.
    Tsang, Albert H. C.
    Liem, H. M.
    [J]. COMPUTERS IN INDUSTRY, 2011, 62 (01) : 32 - 41
  • [24] Transfer time analysis of file transfer framework with AL-FEC in SOTM networks
    Lee, Kyu-Hwan
    Kim, Jong-Mu
    Kim, Jae-Hyun
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015,
  • [25] Lienhart R, 2002, IEEE IMAGE PROC, P900
  • [26] Cyber-Individual Meets Brain Informatics
    Ma, Jianhua
    Wen, Jie
    Huang, Runhe
    Huang, Benxiong
    [J]. IEEE INTELLIGENT SYSTEMS, 2011, 26 (05) : 30 - 37
  • [27] From the Internet of Things to the Internet of People
    Miranda, Javier
    Makitalo, Niko
    Garcia-Alonso, Jose
    Berrocal, Javier
    Mikkonen, Tommi
    Canal, Carlos
    Murillo, Juan M.
    [J]. IEEE INTERNET COMPUTING, 2015, 19 (02) : 40 - 47
  • [28] Cybermatics: Cyber-physical-social-thinking hyperspace based science and technology
    Ning, Huansheng
    Liu, Hong
    Ma, Jianhua
    Yang, Laurence T.
    Huang, Runhe
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 504 - 522
  • [29] Cyber-physical-social-thinking space based science and technology framework for the Internet of Things
    Ning HuanSheng
    Liu Hong
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (03) : 1 - 19
  • [30] Tree-Code modeling and addressing for non-ID physical objects in the Internet of Things
    Ning, Huansheng
    Fu, Yang
    Hu, Sha
    Liu, Hong
    [J]. TELECOMMUNICATION SYSTEMS, 2015, 58 (03) : 195 - 204