PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud

被引:24
作者
Zhang, Chuan [1 ]
Zhu, Liehuang [1 ]
Xu, Chang [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Biometric identification; Data outsourcing; Privacy-preserving; Cloud computing; SEARCH; QUERY;
D O I
10.1016/j.ins.2017.05.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biometric identification has played an important role in achieving user authentication. For efficiency and economic savings, biometric data owners are motivated to outsource the biometric data and identification tasks to a third party, which however introduces potential threats to user's privacy. In this paper, we propose a new privacy-preserving biometric identification scheme which can release the database owner from heavy computation burden. In the proposed scheme, we design concrete biometric data encryption and matching algorithms, and introduce perturb terms in each biometric data. A thorough analysis indicates that our schemes are secure, and the ultimate scheme offers a high level of privacy protection. In addition, the performance evaluations via extensive simulations demonstrate our schemes' efficiency. (C) 2017 Elsevier Inc. All rights reserved.
引用
收藏
页码:56 / 67
页数:12
相关论文
共 29 条
[1]   Automated wireless video surveillance: an evaluation framework [J].
Alsmirat, Mohammad A. ;
Jararweh, Yaser ;
Obaidat, Islam ;
Gupta, Brij B. .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2017, 13 (03) :527-546
[2]  
[Anonymous], 2002, INTRO CRYPTOGRAPHY P
[3]  
[Anonymous], 2016, EVID BASED COMPLEMEN
[4]  
[Anonymous], 2016, P INT C REC COGN WIR
[5]  
[Anonymous], 2009, NATL I STAND TECHNOL, DOI DOI 10.6028/NIST.SP.800-145
[6]  
Badve OP, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P584, DOI 10.1109/GCCE.2015.7398603
[7]  
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[8]  
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[9]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[10]   Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing [J].
Cao, Ning ;
Yang, Zhenyu ;
Wang, Cong ;
Ren, Kui ;
Lou, Wenjing .
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011), 2011, :393-402