CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud
نویسندگان
چکیده
Biometric identification has been incredibly useful in the law enforcement to authenticate an individual’s identity and/or to figure out who someone is, typically by scanning a database of records for a close enough match. In this work, we investigate the privacy-preserving biometric identification outsourcing problem, where the database owner outsources both the large-scale encrypted database and the computationally intensive identification job to the semi-honest cloud, relieving itself from data storage and computation burden. We present new privacypreserving biometric identification protocols, which substantially reduce the computation burden on the database owner. Our protocols build on new biometric data encryption, distance-computation and matching algorithms that novelly exploit inherent structures of biometric data and properties of identification operations. A thorough security analysis shows that our solutions are practically-secure, and the ultimate solution offers a higher level of privacy protection than the-state-of-theart on biometric identification outsourcing. We evaluate our protocols by implementing an efficient privacy-preserving fingerprint-identification system, showing that our protocols meet both the security and efficiency needs well, and they are appropriate for use in various privacy-preserving biometric identification applications.
منابع مشابه
Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
In ESORICS 2015 [1], Wang et al. proposed a privacy-preserving outsourcing design for biometric identification using public cloud platforms, namely CloudBI. CloudBI introduces two designs: CloudBI-I and CloudBI-II. CloudBII is more efficient and CloudBI-II has stronger privacy protection. Based on the threat model of CloudBI, CloudBI-II is claimed to be secure even when the cloud service provid...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملVerifiable Delegation of Computation in the Setting of Privacy-Preserving Biometric Authentication Master of Science Thesis in Computer Systems and Networks
Cloud computing has gained popularity due to the growth of internet and the number of devices. Although outsourcing computation tasks to the remote cloud come with great convenience, there are increasing concerns regarding data privacy and computation integrity since the cloud providers are external third parties. Verifiable computation (VC) is a mechanism to let the client verify the computati...
متن کاملOn Privacy-Preserving Biometric Authentication
Biometric authentication is becoming increasingly popular as a convenient authentication method. However, the privacy and security issues associated with biometric authentication are very serious. Privacy-preserving biometric authentication addresses privacy concerns associated with the use of biometrics and offers a secure solution for user authentication. Given the tremendous expansion of wir...
متن کاملSecure Signal Processing in the Cloud
In recent years, the paradigm of Cloud Computing has become a very appealing concept both for providers, that can benefit from hiring out their extra computation and storage resources, and for users, that can avoid the initial investment on resources by outsourcing their processes and data to a cloud. This game changer concept of outsourcing has also arrived at multimedia processing, and cloud ...
متن کامل