Abstract
In recent years, the extensive application of biometric identification has been witnessed in various fields, such as airport service, criminal investigation, counter-terrorism and so on. Due to the sensitivity of the biometric data, people’s concern over the leakage of their biometric data is a critical obstacle to hinder the future adoption of biometric identification applications. To address this problem, many schemes focusing on the privacy protection during biometric identification process have been proposed. However, identifying an individual in a huge database still faces many challenges while considering privacy protection and efficiency at the same time. In this paper, an efficient and privacy-preserving cloud based biometric identification scheme (named MASK) is proposed based on the M-tree data structure and symmetric homomorphic encryption (SHE) scheme. With MASK, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational cost of the cloud servers in searching the biometric dataset is significantly reduced. Besides, the accuracy of the identification service is not lost. Detailed security analysis shows that MASK can resist various known security threats. In addition, MASK is implemented and evaluated with a synthetic dataset and a real face dataset, and extensive simulation results demonstrate that MASK is efficient in terms of computational and communication costs.
Similar content being viewed by others
References
Abidin A (2016) On privacy-preserving biometric authentication. In: Chen K, Lin D, Yung M (eds) Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers, Lecture Notes in Computer Science, vol 10143. Springer, pp 169–186
Barni M, Droandi G, Lazzeretti R (2015) Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Process Mag 32(5):66–76
BBC News India aadhaar id cards: Collecting biometric data from 1bn people. [EB/OL]. https://www.bbc.com/news/world-asia-40371523
Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: Atluri V, Díaz C (eds) Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, Lecture Notes in Computer Science, vol 6879. Springer, pp 190–209
Baraniuk C Biostar security software ‘leaked a million fingerprints’. [EB/OL]. https://bbc.com/news/technology-49343774
Chen L, Zhang K (2021) Privacy-aware smart card based biometric authentication scheme for e-health. Peer Peer Netw. Appl. 14(3):1353–1365
Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Moriai S, Jaeger T, Sakurai K (eds) 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014. ACM, pp 401–412
Ciaccia P, Patella M, Zezula P (1997) M-tree: An efficient access method for similarity search in metric spaces. In: Jarke M, Carey MJ, Dittrich KR, Lochovsky FH, Loucopoulos P, Jeusfeld MA (eds) VLDB’97, Proceedings of 23rd International Conference on Very Large Data Bases, August 25-29, 1997, Athens, Greece. Morgan Kaufmann, pp 426–435
Delfs H, Knebl H (2015) Introduction to Cryptography - Principles and Applications, Third Edition. Information Security and Cryptography Springer
of Essex U Description of the collection of facial images. [EB/OL]. https://cswww.essex.ac.uk/mv/allfaces/index.html/
Fianyi I, Zia TA (2016) Biometric technology solutions to countering today’s terrorism. Int J Cyber Warf Terror 6(4):28–40
Higo H, Isshiki T, Mori K, Obana S (2015) Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. In: Dunkelman O, Keliher L (eds) Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, Lecture Notes in Computer Science, vol 9566. Springer, pp 44–64
Hirano T, Hattori M, Ito T, Matsuda N (2013) Cryptographically-secure and efficient remote cancelable biometrics based on public-key homomorphic encryption. In: Sakiyama K, Terada M (eds) Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings, Lecture Notes in Computer Science, vol 8231. Springer, pp 183–200
Hu S, Li M, Wang Q, Chow SSM, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forensics Sec 13(10):2448–2463
Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2011, San Diego, California, USA, 6th February - 9th February 2011. The Internet Society
Kikuchi H, Nagai K, Ogata W, Nishigaki M. (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536
Klontz JC, Jain AK (2013) A case study of automated face recognition: The boston marathon bombings suspects. IEEE Computer 46(11):91–94
Kelion L Gatwick airport commits to facial recognition tech at boarding. [EB/OL]. https://www.bbc.com/news/technology-49728301
Mahdikhani H, Lu R, Zheng Y, Shao J, Ghorbani A (2020) Achieving o(log3n) communication-efficient privacy-preserving range query in fog-based iot. IEEE Internet Things J 7(6):5220–5232
Mahdikhani H, Shahsavarifar R, Lu R, Bremner D (2020) Achieve privacy-preserving simplicial depth query over collaborative cloud servers. Peer-to-Peer Netw Appl 13(1):412–423
Mandal A, Roy A, Yasuda M (2015) Comprehensive and improved secure biometric system using homomorphic encryption. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science, vol 9481. Springer, pp 183–198
Nguyen N-T, Chang C-C (2018) Untraceable biometric-based three-party authenticated key exchange for dynamic systems. Peer-to-Peer Netw Appl 11(3):644–663
Patsakis C, van Rest J, Choras M, Bouroche M (2015) Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers, Lecture Notes in Computer Science. In: García-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds), vol 9481. Springer, pp 169–182
Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A unified embedding for face recognition and clustering. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, Boston, MA, USA, June 7-12, pp 815–823
Toli C, Preneel B (2018) Privacy-preserving biometric authentication model for e-finance applications. In: Mori P, Furnell S, Camp O (eds) Proceedings of the 4th International Conference on Information Systems Security and Privacy, ICISSP 2018, Funchal, Madeira - Portugal, January 22-24, 2018. SciTePress, pp 353–360
Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) Cloudbi: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Pernul G, Ryan PYA, Weippl ER (eds) Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, Lecture Notes in Computer Science, vol 9327. Springer, pp 186–205
Wang Y, Wan J, Guo J, Cheung Y, Yuen PC (2018) Inference-based similarity search in randomized montgomery domains for privacy-preserving biometric identification. IEEE Trans Pattern Anal Mach Intell 40(7):1611–1624
Yang X, Zhu H, Lu R, Liu X, Li H (2018) Efficient and privacy-preserving online face recognition over encrypted outsourced data. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), iThings/GreenCom/CPSCom/SmartData 2018, Halifax, NS, Canada, July 30 - August 3, 2018. IEEE, pp 366–373
Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013. IEEE, pp 2652–2660
Yu S, Park K, Park Y, Kim H, YoungHo P (2020) A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Netw Appl 13(5):1340–1356
Zheng Y, Lu R, Beibei L, Shao J, Yang H, Choo K-K R (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf. Sci. 498:91–105
Zezula P, Amato G, Dohnal V, Batko M (2006) Similarity search - the metric space approach. Adv Database Syst 32, Kluwer
Zhang C, Zhu L, Xu C (2017) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67
Zhu H, Wei Q, Yang X, Lu R, Li H (2018) Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
Zhu Y, Li X, Wang J, Li J (2020) Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24(8):5885–5896
Zhu Y, Takagi T, Hu R (2014) Security analysis of collusion-resistant nearest neighbor query scheme on encrypted cloud data. IEICE Trans Inf Syst 97-D(2):326–330
Acknowledgment
This work was supported in part by National Key Research and Development Program of China (2017YFB0802200), National Natural Science Foundation of China (61972304,61932015), Natural Science Foundation of Shaanxi Province (2019ZDLGY12-02),Technical Research program of the Public Security Ministry (2019JSYJA01).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Yang, X., Zhu, H., Wang, F. et al. MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud. Peer-to-Peer Netw. Appl. 14, 2171–2186 (2021). https://doi.org/10.1007/s12083-021-01120-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-021-01120-7