Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abidin A (2016) On privacy-preserving biometric authentication. In: Chen K, Lin D, Yung M (eds) Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers, Lecture Notes in Computer Science, vol 10143. Springer, pp 169–186

  2. Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66–76

    Article  Google Scholar 

  3. BBC News India aadhaar id cards: Collecting biometric data from 1bn people. [EB/OL]. https://www.bbc.com/news/world-asia-40371523

  4. Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Atluri V, Díaz C (eds) Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Lecture Notes in Computer Science, vol 6879. Springer, pp 190–209

  5. Baraniuk C Biostar security software ‘leaked a million fingerprints’. [EB/OL]. https://bbc.com/news/technology-49343774

  6. Chen L, Zhang K (2021) Privacy-aware smart card based biometric authentication scheme for e-health. Peer Peer Netw. Appl. 14(3):1353–1365

    Article  Google Scholar 

  7. Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Moriai S, Jaeger T, Sakurai K (eds) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014. ACM, pp 401–412

  8. Ciaccia P, Patella M, Zezula P (1997) M-tree: An efficient access method for similarity search in metric spaces. In: Jarke M, Carey MJ, Dittrich KR, Lochovsky FH, Loucopoulos P, Jeusfeld MA (eds) VLDB’97, Proceedings of 23rd International Conference on Very Large Data Bases, August 25-29, 1997, Athens, Greece. Morgan Kaufmann, pp 426–435

  9. Delfs H, Knebl H (2015) Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography Springer

  10. of Essex U Description of the collection of facial images. [EB/OL]. https://cswww.essex.ac.uk/mv/allfaces/index.html/

  11. Fianyi I, Zia TA (2016) Biometric technology solutions to countering today’s terrorism. Int J Cyber Warf Terror 6(4):28–40

    Article  Google Scholar 

  12. Higo H, Isshiki T, Mori K, Obana S (2015) Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. In: Dunkelman O, Keliher L (eds) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9566. Springer, pp 44–64

  13. Hirano T, Hattori M, Ito T, Matsuda N (2013) Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption. In: Sakiyama K, Terada M (eds) Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, Lecture Notes in Computer Science, vol 8231. Springer, pp 183–200

  14. Hu S, Li M, Wang Q, Chow SSM, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forensics Sec 13(10):2448–2463

    Article  Google Scholar 

  15. Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society

  16. Kikuchi H, Nagai K, Ogata W, Nishigaki M. (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536

    Article  Google Scholar 

  17. Klontz JC, Jain AK (2013) A case study of automated face recognition: The boston marathon bombings suspects. IEEE Computer 46(11):91–94

    Article  Google Scholar 

  18. Kelion L Gatwick airport commits to facial recognition tech at boarding. [EB/OL]. https://www.bbc.com/news/technology-49728301

  19. Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani A (2020) Achieving o(log3n) communication-efficient privacy-preserving range query in fog-based iot. IEEE Internet Things J 7(6):5220–5232

    Article  Google Scholar 

  20. Mahdikhani H, Shahsavarifar R, Lu R, Bremner D (2020) Achieve privacy-preserving simplicial depth query over collaborative cloud servers. Peer-to-Peer Netw Appl 13(1):412–423

    Article  Google Scholar 

  21. Mandal A, Roy A, Yasuda M (2015) Comprehensive and improved secure biometric system using homomorphic encryption. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science, vol 9481. Springer, pp 183–198

  22. Nguyen N-T, Chang C-C (2018) Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw Appl 11(3):644–663

    Article  Google Scholar 

  23. Patsakis C, van Rest J, Choras M, Bouroche M (2015) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds), vol 9481. Springer, pp 169–182

  24. Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, pp 815–823

  25. Toli C, Preneel B (2018) Privacy-preserving biometric authentication model for e-finance applications. In: Mori P, Furnell S, Camp O (eds) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress, pp 353–360

  26. Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul G, Ryan PYA, Weippl ER (eds) Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Lecture Notes in Computer Science, vol 9327. Springer, pp 186–205

  27. Wang Y, Wan J, Guo J, Cheung Y, Yuen PC (2018) Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification. IEEE Trans Pattern Anal Mach Intell 40(7):1611–1624

    Article  Google Scholar 

  28. Yang X, Zhu H, Lu R, Liu X, Li H (2018) Efficient and privacy-preserving online face recognition over encrypted outsourced data. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE, pp 366–373

  29. Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE, pp 2652–2660

  30. Yu S, Park K, Park Y, Kim H, YoungHo P (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl 13(5):1340–1356

    Article  Google Scholar 

  31. Zheng Y, Lu R, Beibei L, Shao J, Yang H, Choo K-K R (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498:91–105

    Article  Google Scholar 

  32. Zezula P, Amato G, Dohnal V, Batko M (2006) Similarity search - the metric space approach. Adv Database Syst 32, Kluwer

  33. Zhang C, Zhu L, Xu C (2017) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67

    Article  Google Scholar 

  34. Zhu H, Wei Q, Yang X, Lu R, Li H (2018) Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data

  35. Zhu Y, Li X, Wang J, Li J (2020) Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24(8):5885–5896

    Article  Google Scholar 

  36. Zhu Y, Takagi T, Hu R (2014) Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE Trans Inf Syst 97-D(2):326–330

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by National Key Research and Development Program of China (2017YFB0802200), National Natural Science Foundation of China (61972304,61932015), Natural Science Foundation of Shaanxi Province (2019ZDLGY12-02),Technical Research program of the Public Security Ministry (2019JSYJA01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Zhu.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, X., Zhu, H., Wang, F. et al. MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud. Peer-to-Peer Netw. Appl. 14, 2171–2186 (2021). https://doi.org/10.1007/s12083-021-01120-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-021-01120-7

Keywords

Navigation