Efficient and privacy-preserving biometric identification in cloud

被引:13
|
作者
Hahn, Changhee [1 ]
Hur, Junbeom [1 ]
机构
[1] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
ICT EXPRESS | 2016年 / 2卷 / 03期
基金
新加坡国家研究基金会;
关键词
Privacy; Biometrics; Identification; Cloud;
D O I
10.1016/j.icte.2016.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid growth in the development of smart devices equipped with biometric sensors, client identification system using biometric traits are widely adopted across various applications. Among many biometric traits, fingerprint-based identification systems have been extensively studied and deployed. However, to adopt biometric identification systems in practical applications, two main obstacles in terms of efficiency and client privacy must be resolved simultaneously. That is, identification should be performed at an acceptable time, and only a client should have access to his/her biometric traits, which are not revocable if leaked. Until now, multiple studies have demonstrated successful protection of client biometric data; however, such systems lack efficiency that leads to excessive time utilization for identification. The most recently researched scheme shows efficiency improvements but reveals client biometric traits to other entities such as biometric database server. This violates client privacy. In this paper, we propose an efficient and privacy-preserving fingerprint identification scheme by using cloud systems. The proposed scheme extensively exploits the computation power of a cloud so that most of the laborious computations are performed by the cloud service provider. According to our experimental results on an Amazon EC2 cloud, the proposed scheme is faster than the existing schemes and guarantees client privacy by exploiting symmetric homomorphic encryption. Our security analysis shows that during identification, the client fingerprint data is not disclosed to the cloud service provider or fingerprint database server. (C) 2016 The Korean Institute of Communications Information Sciences. Publishing Services by Elsevier B.V. This is an open access article under the CC BY-NC-ND license.
引用
收藏
页码:135 / 139
页数:5
相关论文
共 50 条
  • [41] An efficient privacy-preserving data query and dissemination scheme in vehicular cloud
    Hu, Peng
    Wang, Yongli
    Xiao, Gang
    Zhou, Junlong
    Gong, Bei
    Wang, Yongjian
    PERVASIVE AND MOBILE COMPUTING, 2020, 65
  • [42] Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage
    Yan, Hao
    Liu, Yanan
    Zhang, Zheng
    Wang, Qian
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] Stable Hash Generation for Efficient Privacy-Preserving Face Identification
    Osorio-Roig, Daile
    Rathgeb, Christian
    Drozdowski, Pawel
    Busch, Christoph
    IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2022, 4 (03): : 333 - 348
  • [44] Secure and efficient privacy-preserving public auditing scheme for cloud storage
    Worku, Solomon Guadie
    Xu, Chunxiang
    Zhao, Jining
    He, Xiaohu
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (05) : 1703 - 1713
  • [45] Towards efficient privacy-preserving encrypted image search in cloud computing
    Yuan Wang
    Meixia Miao
    Jian Shen
    Jianfeng Wang
    Soft Computing, 2019, 23 : 2101 - 2112
  • [46] Efficient and privacy-preserving location-based services over the cloud
    Vijay Kumar Yadav
    Shekhar Verma
    S. Venkatesan
    Cluster Computing, 2022, 25 : 3175 - 3192
  • [47] Efficient Privacy-Preserving Authentication Protocol for Mobile Cloud Computing Services
    Xiong L.
    Peng D.
    Peng T.
    Liang H.
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2019, 54 (01): : 202 - 210
  • [48] Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing
    Qin, Zhan
    Yan, Jingbo
    Ren, Kui
    Chen, Chang Wen
    Wang, Cong
    PROCEEDINGS OF THE 2014 ACM CONFERENCE ON MULTIMEDIA (MM'14), 2014, : 497 - 506
  • [49] SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud
    Zheng, Yandong
    Lu, Rongxing
    Zhu, Hui
    Zhang, Songnian
    Guan, Yunguo
    Shao, Jun
    Wang, Fengwei
    Li, Hui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 888 - 903
  • [50] An Efficient and Privacy-Preserving Range Query over Encrypted Cloud Data
    Wang, Wentao
    Jin, Yuxuan
    Cao, Bin
    2022 19TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY & TRUST (PST), 2022,