Skip to main content
Erschienen in: Neural Processing Letters 1/2022

15.09.2021

A Privacy Preserving Based Multi-Biometric System for Secure Identification in Cloud Environment

verfasst von: R. Megiba Jasmine, J. Jasper

Erschienen in: Neural Processing Letters | Ausgabe 1/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy-preserving biometrics identification has drawn greater attention that efficiently provides secure storage of sensitive information in cloud servers. In this paper, we design a Privacy-Preserving Multi-Biometric Identification (PPMBI) scheme that ensures secure biometric data outsourcing and protects user privacy against higher-level attacks in the cloud. This approach uses a multi-biometric model that integrates the fingerprint and finger vein features to improve data security. Also, we present a weighted sample encryption process and the user profile encryption that controls access of user data and finds a close match for the input query. During the user identification stage, pattern matching and decryption with the minimum distance computation are performed to obtain the index of the user registered in the database. Based on the computed index value, similarity is estimated and outputs the result as identified or denied to the user. Experimental analysis indicates the proposed approach achieves better privacy and resists all possible attacks in the cloud system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wong KS, Kim MH (2012) Secure biometric-based authentication for cloud computing. International conference on cloud computing and services science. Springer, Cham, pp 86–101 Wong KS, Kim MH (2012) Secure biometric-based authentication for cloud computing. International conference on cloud computing and services science. Springer, Cham, pp 86–101
2.
Zurück zum Zitat Wong KS, Kim MH (2012) Towards biometric-based authentication for cloud computing. In: CLOSER, pp 501–510 Wong KS, Kim MH (2012) Towards biometric-based authentication for cloud computing. In: CLOSER, pp 501–510
3.
Zurück zum Zitat Rui Z, Yan Z (2018) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994–6009CrossRef Rui Z, Yan Z (2018) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994–6009CrossRef
4.
Zurück zum Zitat Vallabhu H, Satyanarayana RV (2012) Biometric authentication as a service on cloud: novel solution. Int J Soft Comput Eng 2(4):163 Vallabhu H, Satyanarayana RV (2012) Biometric authentication as a service on cloud: novel solution. Int J Soft Comput Eng 2(4):163
5.
Zurück zum Zitat Haghighat M, Zonouz S, Abdel-Mottaleb M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Exp Syst Appl 42(21):7905–7916CrossRef Haghighat M, Zonouz S, Abdel-Mottaleb M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Exp Syst Appl 42(21):7905–7916CrossRef
6.
Zurück zum Zitat Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Signal Process Mag 30(2):42–52CrossRef Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Signal Process Mag 30(2):42–52CrossRef
7.
Zurück zum Zitat Velciu MA, Pătraşcu A, Patriciu VV (2014) Bio-cryptographic authentication in cloud storage sharing. In: Proceedings of the 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp 165–170. Velciu MA, Pătraşcu A, Patriciu VV (2014) Bio-cryptographic authentication in cloud storage sharing. In: Proceedings of the 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp 165–170.
8.
Zurück zum Zitat Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing, pp 90–104. Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing, pp 90–104.
9.
Zurück zum Zitat Al-Hudhud G, Alarfag E, Alkahtani S, Alaskar A, Almashari B, Almashari H (2015) Web-based multimodal biometric authentication application. In: Proceedings of the 2015 5th national symposium on information technology: towards new smart world (NSITNSW). IEEE, pp 1–6 Al-Hudhud G, Alarfag E, Alkahtani S, Alaskar A, Almashari B, Almashari H (2015) Web-based multimodal biometric authentication application. In: Proceedings of the 2015 5th national symposium on information technology: towards new smart world (NSITNSW). IEEE, pp 1–6
10.
Zurück zum Zitat Fathi R, Salehi MA, Leiss EL (2015) User-friendly and secure architecture (UFSA) for authentication of cloud services. In: Proceedings of the 2015 IEEE 8th international conference on cloud computing. IEEE, pp 516–523 Fathi R, Salehi MA, Leiss EL (2015) User-friendly and secure architecture (UFSA) for authentication of cloud services. In: Proceedings of the 2015 IEEE 8th international conference on cloud computing. IEEE, pp 516–523
11.
Zurück zum Zitat Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutor 17(3):1268–1293CrossRef Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutor 17(3):1268–1293CrossRef
12.
Zurück zum Zitat Pukdesree S, Netinant P (2016) Conceptual framework: the adaptive biometrics authentication for accessing cloud computing services using iPhone. Recent Advances in Information and Communication Technology 2016. Springer, Cham, pp 209–216CrossRef Pukdesree S, Netinant P (2016) Conceptual framework: the adaptive biometrics authentication for accessing cloud computing services using iPhone. Recent Advances in Information and Communication Technology 2016. Springer, Cham, pp 209–216CrossRef
13.
Zurück zum Zitat Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2018) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inform Sci 433:431–447CrossRef Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2018) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inform Sci 433:431–447CrossRef
14.
Zurück zum Zitat Anakath AS, Rajakumar S, Ambika S (2019) Privacy preserving multi factor authentication using trust management. Clust Comput 22(5):10817–10823CrossRef Anakath AS, Rajakumar S, Ambika S (2019) Privacy preserving multi factor authentication using trust management. Clust Comput 22(5):10817–10823CrossRef
15.
Zurück zum Zitat Kumari S, Li X, Wu F, Das AK, Choo KKR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Fut Gen Comput Syst 68:320–330CrossRef Kumari S, Li X, Wu F, Das AK, Choo KKR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Fut Gen Comput Syst 68:320–330CrossRef
16.
Zurück zum Zitat Mansour A, Sadik M, Sabir E (2015) Multi-factor authentication based on multimodal biometrics (mfa-mb) for cloud computing. In: Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–4 Mansour A, Sadik M, Sabir E (2015) Multi-factor authentication based on multimodal biometrics (mfa-mb) for cloud computing. In: Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–4
17.
Zurück zum Zitat Yassin AA, Jin H, Ibrahim A, Zou D (2012) Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the 2012 second international conference on cloud and green computing. IEEE, pp 282–289 Yassin AA, Jin H, Ibrahim A, Zou D (2012) Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the 2012 second international conference on cloud and green computing. IEEE, pp 282–289
18.
Zurück zum Zitat Omri F, Foufou S, Hamila R, Jarraya M (2013) Cloud-based mobile system for biometrics authentication. In: Proceedings of the 2013 13th International conference on ITS telecommunications (ITST). IEEE, pp 325–330 Omri F, Foufou S, Hamila R, Jarraya M (2013) Cloud-based mobile system for biometrics authentication. In: Proceedings of the 2013 13th International conference on ITS telecommunications (ITST). IEEE, pp 325–330
19.
Zurück zum Zitat Abdellaoui A, Khamlichi YI, Chaoui H (2015) An efficient framework for enhancing user authentication in cloud storage using digital watermark. Int Rev Comput Softw (IRECOS) 10(2):130–136CrossRef Abdellaoui A, Khamlichi YI, Chaoui H (2015) An efficient framework for enhancing user authentication in cloud storage using digital watermark. Int Rev Comput Softw (IRECOS) 10(2):130–136CrossRef
20.
Zurück zum Zitat Barra S, Choo KKR, Nappi M, Castiglione A, Narducci F, Ranjan R (2018) Biometrics-as-a-service: Cloud-based technology, systems, and applications. IEEE Cloud Comput 5(4):33–37CrossRef Barra S, Choo KKR, Nappi M, Castiglione A, Narducci F, Ranjan R (2018) Biometrics-as-a-service: Cloud-based technology, systems, and applications. IEEE Cloud Comput 5(4):33–37CrossRef
21.
Zurück zum Zitat Peralta D, García S, Benitez JM, Herrera F (2017) Minutiae-based fingerprint matching decomposition: methodology for big data frameworks. Inf Sci 408:198–212CrossRef Peralta D, García S, Benitez JM, Herrera F (2017) Minutiae-based fingerprint matching decomposition: methodology for big data frameworks. Inf Sci 408:198–212CrossRef
22.
Zurück zum Zitat Althamary IA, El-Alfy ESM (2017) A more secure scheme for CAPTCHA-based authentication in cloud environment. In: Proceeding of the 2017 8th international conference on information technology (ICIT). IEEE, pp 405–411 Althamary IA, El-Alfy ESM (2017) A more secure scheme for CAPTCHA-based authentication in cloud environment. In: Proceeding of the 2017 8th international conference on information technology (ICIT). IEEE, pp 405–411
23.
Zurück zum Zitat Barman S, Shum HP, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access 7:12557–12574CrossRef Barman S, Shum HP, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access 7:12557–12574CrossRef
24.
Zurück zum Zitat Topcu B, Karabat C, Azadmanesh M, Erdogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 2016(1):100CrossRef Topcu B, Karabat C, Azadmanesh M, Erdogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 2016(1):100CrossRef
25.
Zurück zum Zitat Gomez-Barrero M, Rathgeb C, Scherhag U, Busch C (2017) Is your biometric system robust to morphing attacks? In: Proceedings of the 2017 5th international workshop on biometrics and forensics (IWBF). IEEE, pp 1–6 Gomez-Barrero M, Rathgeb C, Scherhag U, Busch C (2017) Is your biometric system robust to morphing attacks? In: Proceedings of the 2017 5th international workshop on biometrics and forensics (IWBF). IEEE, pp 1–6
26.
Zurück zum Zitat Rattani A, Poh N, Ross A (2012) Analysis of user-specific score characteristics for spoof biometric attacks. In: Proceedings of the 2012 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE, pp 124–129 Rattani A, Poh N, Ross A (2012) Analysis of user-specific score characteristics for spoof biometric attacks. In: Proceedings of the 2012 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE, pp 124–129
27.
Zurück zum Zitat Gumaei A, Sammouda R, Al-Salman AMS, Alsanad A (2019) Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. J Parallel Distrib Comput 124:27–40CrossRef Gumaei A, Sammouda R, Al-Salman AMS, Alsanad A (2019) Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. J Parallel Distrib Comput 124:27–40CrossRef
28.
Zurück zum Zitat Guo S, Xiang T, Li X (2019) Towards efficient privacy-preserving face recognition in the cloud. Signal Process 164:320–328CrossRef Guo S, Xiang T, Li X (2019) Towards efficient privacy-preserving face recognition in the cloud. Signal Process 164:320–328CrossRef
29.
Zurück zum Zitat Zhang C, Zhu L, Xu C (2017) PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inform Sci 409:56–67CrossRef Zhang C, Zhu L, Xu C (2017) PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inform Sci 409:56–67CrossRef
30.
Zurück zum Zitat Zhu L, Zhang C, Xu C, Liu X, Huang C (2018) An efficient and privacy-preserving biometric identification scheme in cloud computing. IEEE Access 6:19025–19033CrossRef Zhu L, Zhang C, Xu C, Liu X, Huang C (2018) An efficient and privacy-preserving biometric identification scheme in cloud computing. IEEE Access 6:19025–19033CrossRef
31.
Zurück zum Zitat De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: Security of cloud computing in the IoT era. Fut Internet 11(6):127CrossRef De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: Security of cloud computing in the IoT era. Fut Internet 11(6):127CrossRef
32.
Zurück zum Zitat Ilankumaran S, Deisy C (2019) Multi-biometric authentication system using finger vein and iris in cloud computing. Cluster Comput 22(1):103–117CrossRef Ilankumaran S, Deisy C (2019) Multi-biometric authentication system using finger vein and iris in cloud computing. Cluster Comput 22(1):103–117CrossRef
33.
Zurück zum Zitat Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale Multidiscip Model Exp Des 2(4):233–248CrossRef Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale Multidiscip Model Exp Des 2(4):233–248CrossRef
34.
Zurück zum Zitat Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimedia Tools Appl 77(9):11017–11039CrossRef Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimedia Tools Appl 77(9):11017–11039CrossRef
35.
Zurück zum Zitat Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Proceedings of the European symposium on research in computer security, pp 186–205. Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Proceedings of the European symposium on research in computer security, pp 186–205.
36.
Zurück zum Zitat Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859CrossRef Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859CrossRef
39.
Zurück zum Zitat Yin Y, Liu L, Sun X (2011) SDUMLA-HMT: a multimodal biometric database. Chinese conference on biometric recognition. Springer, Berlin, Heidelberg, pp 260–268CrossRef Yin Y, Liu L, Sun X (2011) SDUMLA-HMT: a multimodal biometric database. Chinese conference on biometric recognition. Springer, Berlin, Heidelberg, pp 260–268CrossRef
40.
Zurück zum Zitat Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forens Sec 13(10):2448–2463CrossRef Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forens Sec 13(10):2448–2463CrossRef
41.
Zurück zum Zitat Liu C, Hu X, Zhang Q, Wei J, Liu W (2019) An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7:105363–105375CrossRef Liu C, Hu X, Zhang Q, Wei J, Liu W (2019) An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7:105363–105375CrossRef
Metadaten
Titel
A Privacy Preserving Based Multi-Biometric System for Secure Identification in Cloud Environment
verfasst von
R. Megiba Jasmine
J. Jasper
Publikationsdatum
15.09.2021
Verlag
Springer US
Erschienen in
Neural Processing Letters / Ausgabe 1/2022
Print ISSN: 1370-4621
Elektronische ISSN: 1573-773X
DOI
https://doi.org/10.1007/s11063-021-10630-7

Weitere Artikel der Ausgabe 1/2022

Neural Processing Letters 1/2022 Zur Ausgabe

Neuer Inhalt