MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

被引:0
|
作者
Xiaopeng Yang
Hui Zhu
Fengwei Wang
Songnian Zhang
Rongxing Lu
Hui Li
机构
[1] Xidian University,State Key Laboratory of Integrated Services Networks
[2] University of New Brunswick,Faculty of Computer Science
来源
Peer-to-Peer Networking and Applications | 2021年 / 14卷
关键词
Biometric identification; Privacy-preserving; Efficiency; M-tree;
D O I
暂无
中图分类号
学科分类号
摘要
In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.
引用
收藏
页码:2171 / 2186
页数:15
相关论文
共 50 条
  • [31] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wu, Wei
    Xian, Ming
    Parampalli, Udaya
    Lu, Bin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2021, 24 (02): : 607 - 629
  • [32] Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database
    Wei Wu
    Ming Xian
    Udaya Parampalli
    Bin Lu
    World Wide Web, 2021, 24 : 607 - 629
  • [33] A Privacy-Preserving Framework for Outsourcing Location-Based Services to the Cloud
    Zhu, Xiaojie
    Ayday, Erman
    Vitenberg, Roman
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 384 - 399
  • [34] An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud
    Zhu, Hui
    Lu, Rongxing
    Huang, Cheng
    Chen, Le
    Li, Hui
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (09) : 7729 - 7739
  • [35] A privacy-preserving cloud-based data management system with efficient revocation scheme
    Chang, Shih-Chien
    Wu, Ja-Ling
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 20 (02) : 190 - 199
  • [36] Efficient Privacy-preserving Processing Scheme for Location-based Queries in Mobile Cloud
    Xie, Qingqing
    Wang, Liangmin
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 424 - 429
  • [37] Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data
    Zhu, Hui
    Wei, Qing
    Yang, Xiaopeng
    Lu, Rongxing
    Li, Hui
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (02) : 576 - 586
  • [38] Towards efficient privacy-preserving encrypted image search in cloud computing
    Yuan Wang
    Meixia Miao
    Jian Shen
    Jianfeng Wang
    Soft Computing, 2019, 23 : 2101 - 2112
  • [39] Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    PROCEEDINGS OF THE 2014 ACM CONFERENCE ON MULTIMEDIA (MM'14), 2014, : 497 - 506
  • [40] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong L.
    Peng D.
    Peng T.
    Liang H.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210