MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

被引:0
|
作者
Xiaopeng Yang
Hui Zhu
Fengwei Wang
Songnian Zhang
Rongxing Lu
Hui Li
机构
[1] Xidian University,State Key Laboratory of Integrated Services Networks
[2] University of New Brunswick,Faculty of Computer Science
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Biometric identification; Privacy-preserving; Efficiency; M-tree;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.
引用
收藏
页码:2171 / 2186
页数:15
相关论文
共 50 条
  • [21] SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework
    Zhao, Jiaqi
    Zhu, Hui
    Xu, Wei
    Wang, Fengwei
    Lu, Rongxing
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1022 - 1036
  • [22] Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data
    Liu, Yaru
    Xiao, Xiaodong
    Kong, Fanyu
    Zhang, Hanlin
    Yu, Jia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 166
  • [23] EPCQ: Efficient Privacy-Preserving Contact Query Processing over Trajectory Data in Cloud
    Lu, Qu
    Dai, Hua
    Li, Bohan
    Li, Pengyue
    Zhou, Qian
    Zhou, Qiang
    Yang, Geng
    WEB AND BIG DATA, APWEB-WAIM 2024, PT IV, 2024, 14964 : 183 - 198
  • [24] Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm
    Renuga, S.
    Jagatheeshwari, S. S. K.
    COMPUTER JOURNAL, 2018, 61 (10) : 1577 - 1588
  • [25] Privacy-preserving query over the encrypted image in cloud computing
    Zhu, Xudong
    Li, Hui
    Guo, Zhen
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2014, 41 (02): : 151 - 158
  • [26] Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud
    Yin, Fan
    Lu, Rongxing
    Zheng, Yandong
    Shao, Jun
    Yang, Xue
    Tang, Xiaohu
    COMPUTERS & SECURITY, 2021, 110
  • [27] Efficient Privacy-Preserving Spatial Data Query in Cloud Computing
    Miao, Yinbin
    Yang, Yutao
    Li, Xinghua
    Wei, Linfeng
    Liu, Zhiquan
    Deng, Robert H.
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (01) : 122 - 136
  • [28] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [29] HAC: Model for Privacy-Preserving Outsourced Data Over Cloud
    Osman, Huda
    Siraj, Maheyzah Md
    Maarof, Mohd Aizaini
    2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 168 - 171
  • [30] Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification
    Wang, Yi
    Wan, Jianwu
    Guo, Jun
    Cheung, Yiu-Ming
    Yuen, Pong C.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (07) : 1611 - 1624