Skip to main content
Erschienen in: Soft Computing 8/2020

04.10.2019 | Focus

Cloud-assisted secure biometric identification with sub-linear search efficiency

verfasst von: Youwen Zhu, Xingxin Li, Jian Wang, Jing Li

Erschienen in: Soft Computing | Ausgabe 8/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing has been one of the critical solutions to reduce heavy storage and computation burden of biometric identification. To protect the privacy of biometric data against untrusted cloud servers, outsourced biometric databases are usually encrypted by users. Performing biometric identification over encrypted data without revealing privacy to cloud servers attracts more and more attention. Several secure biometric identification solutions have been proposed to solve this challenging problem. However, these schemes still suffer from various limitations, such as low search efficiency and heavy computation burden on users. In this paper, we propose a novel cloud-assisted biometric identification scheme based on the asymmetric scalar-product preserving encryption (ASPE) and spatial data structures such as the R-tree index, which simultaneously achieves sub-linear search efficiency and low computation burden on users. Specifically, we construct an R-tree index on the biometric dataset and encrypt the index with ASPE. Then we modify the original search algorithm in the R-tree index and design a secure search algorithm based on ASPE to find the nearest neighbor result over the encrypted R-tree index. Through theoretical analysis and extensive experiments, we demonstrate the effectiveness and efficiency of our proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960CrossRef Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960CrossRef
Zurück zum Zitat Bertolacci IJ, Strout MM, Riley J, Guzik SM, Davis EC, Olschanowsky C (2019) Using the loop chain abstraction to schedule across loops in existing code. Int J High Perform Comput Netw 13(1):86–104CrossRef Bertolacci IJ, Strout MM, Riley J, Guzik SM, Davis EC, Olschanowsky C (2019) Using the loop chain abstraction to schedule across loops in existing code. Int J High Perform Comput Netw 13(1):86–104CrossRef
Zurück zum Zitat Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European symposium on research in computer security. Springer, pp 190–209 Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European symposium on research in computer security. Springer, pp 190–209
Zurück zum Zitat Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order-preserving symmetric encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 224–241 Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order-preserving symmetric encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 224–241
Zurück zum Zitat Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, pp 401–412 Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, pp 401–412
Zurück zum Zitat Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934CrossRef
Zurück zum Zitat Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th international conference on data engineering (ICDE). IEEE, pp 664–675 Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th international conference on data engineering (ICDE). IEEE, pp 664–675
Zurück zum Zitat Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyCrossRef Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, HersheyCrossRef
Zurück zum Zitat Gupta S, Gupta BB (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput IJCAC 7(3):1–43 Gupta S, Gupta BB (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput IJCAC 7(3):1–43
Zurück zum Zitat Guttman A (1984) R-trees: a dynamic index structure for spatial searching. ACM, New York Guttman A (1984) R-trees: a dynamic index structure for spatial searching. ACM, New York
Zurück zum Zitat Hossain K, Rahman M, Roy S (2019) Iot data compression and optimization techniques in cloud storage: current prospects and future directions. Int J Cloud Appl Comput IJCAC 9(2):43–59 Hossain K, Rahman M, Roy S (2019) Iot data compression and optimization techniques in cloud storage: current prospects and future directions. Int J Cloud Appl Comput IJCAC 9(2):43–59
Zurück zum Zitat Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:596–606CrossRef Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:596–606CrossRef
Zurück zum Zitat Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inf Forensics Secur 13(10):2448–2463CrossRef Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inf Forensics Secur 13(10):2448–2463CrossRef
Zurück zum Zitat Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the 17th conference network and distributed system security symposium, pp 130–150 Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the 17th conference network and distributed system security symposium, pp 130–150
Zurück zum Zitat Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859CrossRef Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859CrossRef
Zurück zum Zitat Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26CrossRef Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26CrossRef
Zurück zum Zitat Li X, Zhu Y, Wang J (2016) Secure naïve Bayesian classification over encrypted data in cloud. In: International conference on provable security. Springer, pp 130–150 Li X, Zhu Y, Wang J (2016) Secure naïve Bayesian classification over encrypted data in cloud. In: International conference on provable security. Springer, pp 130–150
Zurück zum Zitat Li X, Zhu Y, Wang J (2017) Efficient encrypted data comparison through a hybrid method. J Inf Sci Eng 33(4):953–964MathSciNet Li X, Zhu Y, Wang J (2017) Efficient encrypted data comparison through a hybrid method. J Inf Sci Eng 33(4):953–964MathSciNet
Zurück zum Zitat Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018b) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018b) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRef
Zurück zum Zitat Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018c) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform 14(7):3216–3225CrossRef Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018c) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform 14(7):3216–3225CrossRef
Zurück zum Zitat Li X, Zhu Y, Wang J, Liu Z, Liu Y, Zhang M (2018d) On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Trans Dependable Secure Comput 15(5):906–912CrossRef Li X, Zhu Y, Wang J, Liu Z, Liu Y, Zhang M (2018d) On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Trans Dependable Secure Comput 15(5):906–912CrossRef
Zurück zum Zitat Li X, Zhu Y, Wang J, Zhang J (2019) Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel Distrib Comput 131(5):44–54CrossRef Li X, Zhu Y, Wang J, Zhang J (2019) Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel Distrib Comput 131(5):44–54CrossRef
Zurück zum Zitat Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef
Zurück zum Zitat Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J Biomed Health Inform 20(2):655–668CrossRef Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J Biomed Health Inform 20(2):655–668CrossRef
Zurück zum Zitat Liu X, Choo KR, Deng RH, Lu R, Weng J (2018a) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39CrossRef Liu X, Choo KR, Deng RH, Lu R, Weng J (2018a) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39CrossRef
Zurück zum Zitat Liu Z, Huang Y, Li J, Cheng X, Shen C (2018b) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef Liu Z, Huang Y, Li J, Cheng X, Shen C (2018b) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11CrossRef
Zurück zum Zitat Manolopoulos Y, Nanopoulos A, Papadopoulos AN, Theodoridis Y (2010) R-trees: theory and applications. Springer, BerlinMATH Manolopoulos Y, Nanopoulos A, Papadopoulos AN, Theodoridis Y (2010) R-trees: theory and applications. Springer, BerlinMATH
Zurück zum Zitat Negi P, Mishra A, Gupta B (2013) Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. Int J Comput Sci Issues IJCSI 10(2 Part 1):142 Negi P, Mishra A, Gupta B (2013) Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. Int J Comput Sci Issues IJCSI 10(2 Part 1):142
Zurück zum Zitat Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357CrossRef Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357CrossRef
Zurück zum Zitat Preparata FP, Shamos MI (2012) Computational geometry: an introduction. Springer, BerlinMATH Preparata FP, Shamos MI (2012) Computational geometry: an introduction. Springer, BerlinMATH
Zurück zum Zitat Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput IJCAC 9(1):33–49 Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput IJCAC 9(1):33–49
Zurück zum Zitat Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018a) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018a) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123CrossRef
Zurück zum Zitat Shen J, Wang C, Li T, Chen X, Huang X, Zhan Z (2018b) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197CrossRef Shen J, Wang C, Li T, Chen X, Huang X, Zhan Z (2018b) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197CrossRef
Zurück zum Zitat Shen J, Zhou T, Chen X, Li J, Susilo W (2018c) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925CrossRef Shen J, Zhou T, Chen X, Li J, Susilo W (2018c) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925CrossRef
Zurück zum Zitat Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975CrossRef Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975CrossRef
Zurück zum Zitat Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: European symposium on research in computer security. Springer, pp 186–205 Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: European symposium on research in computer security. Springer, pp 186–205
Zurück zum Zitat Wang B, Hou Y, Li M (2016) Practical and secure nearest neighbor search on encrypted large-scale data. In: The annual IEEE international conference on computer communications. IEEE, pp 1–9 Wang B, Hou Y, Li M (2016) Practical and secure nearest neighbor search on encrypted large-scale data. In: The annual IEEE international conference on computer communications. IEEE, pp 1–9
Zurück zum Zitat Wang Z, Ye J, Wang J (2018) An efficient traceable data sharing scheme in cloud computing for mobile devices. Int J High Perform Comput Netw 12(2):156–165CrossRef Wang Z, Ye J, Wang J (2018) An efficient traceable data sharing scheme in cloud computing for mobile devices. Int J High Perform Comput Netw 12(2):156–165CrossRef
Zurück zum Zitat Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 139–152 Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 139–152
Zurück zum Zitat Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918CrossRef Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918CrossRef
Zurück zum Zitat Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2016b) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433:431–447 Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2016b) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433:431–447
Zurück zum Zitat Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744CrossRef Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744CrossRef
Zurück zum Zitat Xu J, Wei L, Zhang Y, Wang A, Zhou F, Cz Gao (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124CrossRef Xu J, Wei L, Zhang Y, Wang A, Zhou F, Cz Gao (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124CrossRef
Zurück zum Zitat Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99CrossRef Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99CrossRef
Zurück zum Zitat Yao B, Li F, Xiao X (2013) Secure nearest neighbor revisited. In: IEEE 29th international conference on data engineering (ICDE). IEEE, pp 733–744 Yao B, Li F, Xiao X (2013) Secure nearest neighbor revisited. In: IEEE 29th international conference on data engineering (ICDE). IEEE, pp 733–744
Zurück zum Zitat Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: The annual IEEE international conference on computer communications. IEEE, pp 2652–2660 Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: The annual IEEE international conference on computer communications. IEEE, pp 2652–2660
Zurück zum Zitat Zhang C, Zhu L, Xu C (2017a) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67CrossRef Zhang C, Zhu L, Xu C (2017a) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67CrossRef
Zurück zum Zitat Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017b) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61MATHCrossRef Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017b) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61MATHCrossRef
Zurück zum Zitat Zhang X, Tan Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access 6:9292–9302CrossRef Zhang X, Tan Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access 6:9292–9302CrossRef
Zurück zum Zitat Zhu Y, Xu R, Takagi T (2013a) Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 55–60 Zhu Y, Xu R, Takagi T (2013a) Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 55–60
Zurück zum Zitat Zhu Y, Xu R, Takagi T (2013b) Secure k-NN query on encrypted cloud database without key-sharing. Int J Electron Secur Digit Forensics 5(3–4):201–217CrossRef Zhu Y, Xu R, Takagi T (2013b) Secure k-NN query on encrypted cloud database without key-sharing. Int J Electron Secur Digit Forensics 5(3–4):201–217CrossRef
Zurück zum Zitat Zhu Y, Huang Z, Takagi T (2016a) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12CrossRef Zhu Y, Huang Z, Takagi T (2016a) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12CrossRef
Zurück zum Zitat Zhu Y, Wang Z, Wang J (2016b) Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. In: International symposium on quality of service (IWQoS). IEEE, pp 1–6 Zhu Y, Wang Z, Wang J (2016b) Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. In: International symposium on quality of service (IWQoS). IEEE, pp 1–6
Metadaten
Titel
Cloud-assisted secure biometric identification with sub-linear search efficiency
verfasst von
Youwen Zhu
Xingxin Li
Jian Wang
Jing Li
Publikationsdatum
04.10.2019
Verlag
Springer Berlin Heidelberg
Erschienen in
Soft Computing / Ausgabe 8/2020
Print ISSN: 1432-7643
Elektronische ISSN: 1433-7479
DOI
https://doi.org/10.1007/s00500-019-04401-9

Weitere Artikel der Ausgabe 8/2020

Soft Computing 8/2020 Zur Ausgabe