CloudID: Trustworthy cloud-based and cross-enterprise biometric identification

作者: Mohammad Haghighat , Saman Zonouz , Mohamed Abdel-Mottaleb

DOI: 10.1016/J.ESWA.2015.06.025

关键词:

摘要: In biometric identification systems, the database is typically stored in a trusted server, which also responsible for performing process. However, standalone server may not be able to provide enough storage and processing power large databases. Nowadays, cloud computing solutions have provided users enterprises with various capabilities store process their data third-party centers. maintenance of confidentiality integrity sensitive requires trustworthy proven zero information leakage. this paper, we present CloudID, privacy-preserving cloud-based cross-enterprise solution. It links confidential biometrics stores it an encrypted fashion. Making use searchable encryption technique, performed domain make sure that provider or potential attackers do gain access any even contents individual queries. order create search queries, propose k-d tree structure core encryption. This helps only handling variations domain, but improving overall performance system. Our proposed approach first system disclosure possibility. allows different perform on single without revealing information. experimental results show CloudID performs clients high accuracy minimal overhead disclosure.

参考文章(40)
Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa, On the Leakage of Information in Biometric Authentication international conference on cryptology in india. ,vol. 8885, pp. 265- 280 ,(2014) , 10.1007/978-3-319-13039-2_16
Mohammad Haghighat, Saman Zonouz, Mohamed Abdel-Mottaleb, Identification Using Encrypted Biometrics computer analysis of images and patterns. pp. 440- 448 ,(2013) , 10.1007/978-3-642-40246-3_55
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft, None, Privacy-Preserving Face Recognition privacy enhancing technologies. pp. 235- 253 ,(2009) , 10.1007/978-3-642-03168-7_14
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg, Efficient privacy-preserving face recognition international conference on information security and cryptology. pp. 229- 244 ,(2009) , 10.1007/978-3-642-14423-3_16
Margarita Osadchy, Boaz Moskovich, Ayman Jarrous, Binyamin Pinkas, System for secure face identification (scifi) and methods useful in conjunction therewith ,(2010)
Adnan Khashman, Intelligent Face Recognition Intelligence and Security Informatics. pp. 383- 406 ,(2008) , 10.1007/978-3-540-69209-6_20
Dan Boneh, Brent Waters, Conjunctive, Subset, and Range Queries on Encrypted Data Theory of Cryptography. pp. 535- 554 ,(2007) , 10.1007/978-3-540-70936-7_29
Marina Blanton, Paolo Gasti, Secure and Efficient Protocols for Iris and Fingerprint Identification Computer Security – ESORICS 2011. pp. 190- 209 ,(2011) , 10.1007/978-3-642-23822-2_11
Mohammad Bagher Akbari Haghighat, Ehsan Namjoo, Evaluating the informativity of features in dimensionality reduction methods advanced industrial conference on telecommunications. pp. 1- 5 ,(2011) , 10.1109/ICAICT.2011.6110938
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Boaz Moskovich, SCiFI - A System for Secure Face Identification ieee symposium on security and privacy. pp. 239- 254 ,(2010) , 10.1109/SP.2010.39