MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

被引:0
|
作者
Xiaopeng Yang
Hui Zhu
Fengwei Wang
Songnian Zhang
Rongxing Lu
Hui Li
机构
[1] Xidian University,State Key Laboratory of Integrated Services Networks
[2] University of New Brunswick,Faculty of Computer Science
关键词
Biometric identification; Privacy-preserving; Efficiency; M-tree;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.
引用
收藏
页码:2171 / 2186
页数:15
相关论文
共 50 条
  • [1] MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
    Yang, Xiaopeng
    Zhu, Hui
    Wang, Fengwei
    Zhang, Songnian
    Lu, Rongxing
    Li, Hui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2171 - 2186
  • [2] Efficient and privacy-preserving biometric identification in cloud
    Hahn, Changhee
    Hur, Junbeom
    ICT EXPRESS, 2016, 2 (03): : 135 - 139
  • [3] Efficient Privacy-Preserving Biometric Identification in Cloud Computing
    Yuan, Jiawei
    Yu, Shucheng
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2652 - 2660
  • [4] Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing
    Xu, Chang
    Zhang, Lvhan
    Zhu, Liehuang
    Zhang, Chuan
    Sharif, Kashif
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 363 - 370
  • [5] An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Zhu, Liehuang
    Zhang, Chuan
    Xu, Chang
    Liu, Ximeng
    Huang, Cheng
    IEEE ACCESS, 2018, 6 : 19025 - 19033
  • [6] PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud
    Zhang, Chuan
    Zhu, Liehuang
    Xu, Chang
    INFORMATION SCIENCES, 2017, 409 : 56 - 67
  • [7] An Efficient and Privacy-Preserving Biometric Identification Scheme Based on the FITing-Tree
    Yang X.
    Zhu H.
    Zhang S.
    Lu R.
    Gao X.
    Security and Communication Networks, 2021, 2021
  • [8] POSTER: Towards Privacy-Preserving Biometric Identification in Cloud Computing
    Hahn, Changhee
    Hur, Junbeom
    CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1826 - 1828
  • [9] An Improved Privacy-Preserving Biometric Identification Scheme in Cloud Computing
    Huang, Kai
    Xu, Ming
    Fu, Shaojing
    Luo, Yuchuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10) : 1891 - 1894
  • [10] CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
    Wang, Qian
    Hu, Shengshan
    Ren, Kui
    He, Meiqi
    Du, Minxin
    Wang, Zhibo
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 186 - 205