Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 4/2021

25.05.2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

verfasst von: Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abidin A (2016) On privacy-preserving biometric authentication. In: Chen K, Lin D, Yung M (eds) Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers, Lecture Notes in Computer Science, vol 10143. Springer, pp 169–186 Abidin A (2016) On privacy-preserving biometric authentication. In: Chen K, Lin D, Yung M (eds) Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers, Lecture Notes in Computer Science, vol 10143. Springer, pp 169–186
2.
Zurück zum Zitat Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66–76CrossRef Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66–76CrossRef
4.
Zurück zum Zitat Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Atluri V, Díaz C (eds) Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Lecture Notes in Computer Science, vol 6879. Springer, pp 190–209 Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Atluri V, Díaz C (eds) Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Lecture Notes in Computer Science, vol 6879. Springer, pp 190–209
6.
Zurück zum Zitat Chen L, Zhang K (2021) Privacy-aware smart card based biometric authentication scheme for e-health. Peer Peer Netw. Appl. 14(3):1353–1365CrossRef Chen L, Zhang K (2021) Privacy-aware smart card based biometric authentication scheme for e-health. Peer Peer Netw. Appl. 14(3):1353–1365CrossRef
7.
Zurück zum Zitat Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Moriai S, Jaeger T, Sakurai K (eds) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014. ACM, pp 401–412 Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Moriai S, Jaeger T, Sakurai K (eds) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014. ACM, pp 401–412
8.
Zurück zum Zitat Ciaccia P, Patella M, Zezula P (1997) M-tree: An efficient access method for similarity search in metric spaces. In: Jarke M, Carey MJ, Dittrich KR, Lochovsky FH, Loucopoulos P, Jeusfeld MA (eds) VLDB’97, Proceedings of 23rd International Conference on Very Large Data Bases, August 25-29, 1997, Athens, Greece. Morgan Kaufmann, pp 426–435 Ciaccia P, Patella M, Zezula P (1997) M-tree: An efficient access method for similarity search in metric spaces. In: Jarke M, Carey MJ, Dittrich KR, Lochovsky FH, Loucopoulos P, Jeusfeld MA (eds) VLDB’97, Proceedings of 23rd International Conference on Very Large Data Bases, August 25-29, 1997, Athens, Greece. Morgan Kaufmann, pp 426–435
9.
Zurück zum Zitat Delfs H, Knebl H (2015) Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography Springer Delfs H, Knebl H (2015) Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography Springer
11.
Zurück zum Zitat Fianyi I, Zia TA (2016) Biometric technology solutions to countering today’s terrorism. Int J Cyber Warf Terror 6(4):28–40CrossRef Fianyi I, Zia TA (2016) Biometric technology solutions to countering today’s terrorism. Int J Cyber Warf Terror 6(4):28–40CrossRef
12.
Zurück zum Zitat Higo H, Isshiki T, Mori K, Obana S (2015) Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. In: Dunkelman O, Keliher L (eds) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9566. Springer, pp 44–64 Higo H, Isshiki T, Mori K, Obana S (2015) Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. In: Dunkelman O, Keliher L (eds) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9566. Springer, pp 44–64
13.
Zurück zum Zitat Hirano T, Hattori M, Ito T, Matsuda N (2013) Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption. In: Sakiyama K, Terada M (eds) Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, Lecture Notes in Computer Science, vol 8231. Springer, pp 183–200 Hirano T, Hattori M, Ito T, Matsuda N (2013) Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption. In: Sakiyama K, Terada M (eds) Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, Lecture Notes in Computer Science, vol 8231. Springer, pp 183–200
14.
Zurück zum Zitat Hu S, Li M, Wang Q, Chow SSM, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forensics Sec 13(10):2448–2463CrossRef Hu S, Li M, Wang Q, Chow SSM, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forensics Sec 13(10):2448–2463CrossRef
15.
Zurück zum Zitat Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society
16.
Zurück zum Zitat Kikuchi H, Nagai K, Ogata W, Nishigaki M. (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536CrossRef Kikuchi H, Nagai K, Ogata W, Nishigaki M. (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536CrossRef
17.
Zurück zum Zitat Klontz JC, Jain AK (2013) A case study of automated face recognition: The boston marathon bombings suspects. IEEE Computer 46(11):91–94CrossRef Klontz JC, Jain AK (2013) A case study of automated face recognition: The boston marathon bombings suspects. IEEE Computer 46(11):91–94CrossRef
19.
Zurück zum Zitat Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani A (2020) Achieving o(log3n) communication-efficient privacy-preserving range query in fog-based iot. IEEE Internet Things J 7(6):5220–5232CrossRef Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani A (2020) Achieving o(log3n) communication-efficient privacy-preserving range query in fog-based iot. IEEE Internet Things J 7(6):5220–5232CrossRef
20.
Zurück zum Zitat Mahdikhani H, Shahsavarifar R, Lu R, Bremner D (2020) Achieve privacy-preserving simplicial depth query over collaborative cloud servers. Peer-to-Peer Netw Appl 13(1):412–423CrossRef Mahdikhani H, Shahsavarifar R, Lu R, Bremner D (2020) Achieve privacy-preserving simplicial depth query over collaborative cloud servers. Peer-to-Peer Netw Appl 13(1):412–423CrossRef
21.
Zurück zum Zitat Mandal A, Roy A, Yasuda M (2015) Comprehensive and improved secure biometric system using homomorphic encryption. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science, vol 9481. Springer, pp 183–198 Mandal A, Roy A, Yasuda M (2015) Comprehensive and improved secure biometric system using homomorphic encryption. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science, vol 9481. Springer, pp 183–198
22.
Zurück zum Zitat Nguyen N-T, Chang C-C (2018) Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw Appl 11(3):644–663CrossRef Nguyen N-T, Chang C-C (2018) Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw Appl 11(3):644–663CrossRef
23.
Zurück zum Zitat Patsakis C, van Rest J, Choras M, Bouroche M (2015) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds), vol 9481. Springer, pp 169–182 Patsakis C, van Rest J, Choras M, Bouroche M (2015) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds), vol 9481. Springer, pp 169–182
24.
Zurück zum Zitat Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, pp 815–823 Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, pp 815–823
25.
Zurück zum Zitat Toli C, Preneel B (2018) Privacy-preserving biometric authentication model for e-finance applications. In: Mori P, Furnell S, Camp O (eds) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress, pp 353–360 Toli C, Preneel B (2018) Privacy-preserving biometric authentication model for e-finance applications. In: Mori P, Furnell S, Camp O (eds) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress, pp 353–360
26.
Zurück zum Zitat Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul G, Ryan PYA, Weippl ER (eds) Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Lecture Notes in Computer Science, vol 9327. Springer, pp 186–205 Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul G, Ryan PYA, Weippl ER (eds) Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Lecture Notes in Computer Science, vol 9327. Springer, pp 186–205
27.
Zurück zum Zitat Wang Y, Wan J, Guo J, Cheung Y, Yuen PC (2018) Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification. IEEE Trans Pattern Anal Mach Intell 40(7):1611–1624CrossRef Wang Y, Wan J, Guo J, Cheung Y, Yuen PC (2018) Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification. IEEE Trans Pattern Anal Mach Intell 40(7):1611–1624CrossRef
28.
Zurück zum Zitat Yang X, Zhu H, Lu R, Liu X, Li H (2018) Efficient and privacy-preserving online face recognition over encrypted outsourced data. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE, pp 366–373 Yang X, Zhu H, Lu R, Liu X, Li H (2018) Efficient and privacy-preserving online face recognition over encrypted outsourced data. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE, pp 366–373
29.
Zurück zum Zitat Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE, pp 2652–2660 Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE, pp 2652–2660
30.
Zurück zum Zitat Yu S, Park K, Park Y, Kim H, YoungHo P (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl 13(5):1340–1356CrossRef Yu S, Park K, Park Y, Kim H, YoungHo P (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl 13(5):1340–1356CrossRef
31.
Zurück zum Zitat Zheng Y, Lu R, Beibei L, Shao J, Yang H, Choo K-K R (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498:91–105CrossRef Zheng Y, Lu R, Beibei L, Shao J, Yang H, Choo K-K R (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498:91–105CrossRef
32.
Zurück zum Zitat Zezula P, Amato G, Dohnal V, Batko M (2006) Similarity search - the metric space approach. Adv Database Syst 32, Kluwer Zezula P, Amato G, Dohnal V, Batko M (2006) Similarity search - the metric space approach. Adv Database Syst 32, Kluwer
33.
Zurück zum Zitat Zhang C, Zhu L, Xu C (2017) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67CrossRef Zhang C, Zhu L, Xu C (2017) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67CrossRef
34.
Zurück zum Zitat Zhu H, Wei Q, Yang X, Lu R, Li H (2018) Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data Zhu H, Wei Q, Yang X, Lu R, Li H (2018) Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
35.
Zurück zum Zitat Zhu Y, Li X, Wang J, Li J (2020) Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24(8):5885–5896CrossRef Zhu Y, Li X, Wang J, Li J (2020) Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24(8):5885–5896CrossRef
36.
Zurück zum Zitat Zhu Y, Takagi T, Hu R (2014) Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE Trans Inf Syst 97-D(2):326–330CrossRef Zhu Y, Takagi T, Hu R (2014) Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE Trans Inf Syst 97-D(2):326–330CrossRef
Metadaten
Titel
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
verfasst von
Xiaopeng Yang
Hui Zhu
Fengwei Wang
Songnian Zhang
Rongxing Lu
Hui Li
Publikationsdatum
25.05.2021
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 4/2021
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01120-7

Weitere Artikel der Ausgabe 4/2021

Peer-to-Peer Networking and Applications 4/2021 Zur Ausgabe