一种云上的高效生物隐私保护协议
An Efficient Biometric Identification Privacy Protection Protocol on the Cloud
DOI: 10.12677/CSA.2023.139163, PDF,   
作者: 吴 铎:青岛大学计算机科学技术学院,山东 青岛
关键词: 生物隐私保护安全外包最近邻居Biological Privacy Protection Security Outsourcing Nearest Neighbor
摘要: 由于生物识别的可靠性和便捷性,这项技术已经成为一种重要且可靠的识别技术,常被用于身份验证。但生物特征数据具有很高的敏感性,因此,在隐私保护生物识别协议中,安全性便成为了一大挑战。现存的大多数协议都存在效率低下或者安全级别低的问题,从而限制了他们在实践中的广泛应用。为了提高安全性和效率,本文提出了一种新的隐私保护生物识别协议。新的协议对原始的生物数据库进行了预处理操作,使得上传到云服务器上的密文操作的对象大大减少,即算法匹配操作只需要在最近邻候选者之间进行,进一步提高了效率,并且,我们的新协议在大型数据库上也有很好的表现,具有更高的现实意义。
Abstract: Due to the reliability and convenience of biometrics, this technology has become an important and reliable identification technology, which is often used for identity verification. However, biometric data is highly sensitive, so security becomes a major challenge in privacy-protecting biometric pro-tocols. Most existing protocols are inefficient or have low security levels, which limits their wide-spread use in practice. In order to improve security and efficiency, this paper proposes a new privacy protection biometric protocol. The new protocol performs pre-processing operations on the original biological database, greatly reducing the objects of ciphertext operations uploaded to the cloud server, that is, the algorithm matching operation only needs to be carried out between the nearest candidates, further improving the efficiency. In addition, our new protocol also has good performance on large databases, and has higher practical significance.
文章引用:吴铎. 一种云上的高效生物隐私保护协议[J]. 计算机科学与应用, 2023, 13(9): 1641-1654. https://doi.org/10.12677/CSA.2023.139163

参考文献

[1] Aparna, P. and Kishore, P. (2019) Biometric-Based Efficient Medical Image Watermarking in E-Healthcare Application. IET Image Processing, 13, 421-428. [Google Scholar] [CrossRef
[2] Kraovec, A., Baldini, G. and Pejovi, V. (2021) Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Envi-ronments. Proceedings of the 16th International Conference on Availability, Reliability and Security, Vienna, August 2021, 1-7. [Google Scholar] [CrossRef
[3] Das, A.K. (2017) A Secure and Effective Bio-metric-Based User Authentication Scheme for Wireless Sensor Networks Using Smart Card and Fuzzy Extractor. Inter-national Journal of Communication Systems, 30, e2933. [Google Scholar] [CrossRef
[4] Baltana, S.F., Ruiz-Sarmiento, J.R. and Gonzalez-Jimenez, J. (2020) A Face Recognition System for Assistive Robots. APPIS 2020: 3rd International Conference on Applications of Intelligent Sys-tems, New York, January 2020, 1-6. [Google Scholar] [CrossRef
[5] Erkin, Z., Franz, M., Guajardo, J., Katzenbeisser, S., Lagendijk, I. and Toft, T. (2009) Privacy-Preserving Face Recognition. In: Goldberg, I. and Atallah, M.J., Eds., Privacy Enhancing Technologies. PETS 2009. Lecture Notes in Computer Science, Springer, Berlin. [Google Scholar] [CrossRef
[6] Sadeghi, A.R., Schneider, T. and Wehrenberg, I. (2009) Effi-cient Privacy-Preserving Face Recognition. Proceedings of the 12th International Conference on Information Security and Cryptology, Berlin, 2-4 December 2009, 229-244. [Google Scholar] [CrossRef
[7] Osadchy, M., Pinkas, B., Jarrous, A., et al. (2010) SCiFI—A System for Secure Face Identification. Proceedings of the 2010 IEEE Symposium on Security and Privacy, Oakland, 16-19 May 2010, 239-254. [Google Scholar] [CrossRef
[8] Huang, Y., Malka, L., Evans, D., et al. (2011) Efficient Priva-cy-Preserving Biometric Identification. Proceedings of the Network and Distributed System Security Symposium, Califor-nia, 14-19 April 2013, 319-323.
[9] Blanton, M. and Gasti, P. (2011) Secure and Efficient Protocols for Iris and Fin-gerprint Identification. In: Atluri, V. and Diaz, C. Eds., Computer Security—ESORICS 2011, Springer, Berlin, 190-209. [Google Scholar] [CrossRef
[10] Wong, W., Cheung, D., Kao, B., et al. (2009) Secure kNN Computation on Encrypted Databases. Proceedings of the 2009 ACM SIGMOD International Conference on Manage-ment of Data, New York, June 2009, 139-152. [Google Scholar] [CrossRef
[11] Yuan, J. and Yu, S. (2013) Efficient Privacy-Preserving Biometric Identification in Cloud Computing. 2013 Proceedings IEEE INFOCOM, Turin, 14-19 April 2013, 2652-2660. [Google Scholar] [CrossRef
[12] Wang, Q., Hu, S., Ren, K., et al. (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Proceedings of the 20th European Symposium on Research in Computer Security, Vienna, 18 November 2015, 186-205. [Google Scholar] [CrossRef
[13] Zhang, C., Zhu, L. and Chang, X. (2017) PTBI: An Efficient Privacy-Preserving Biometric Identification Based on Perturbed Term in the Cloud. Information Sciences, 409-410, 56-67. [Google Scholar] [CrossRef
[14] Zhu, L., Zhang, C., Xu, C., et al. (2018) An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEEE Access, 6, 19025-19033. [Google Scholar] [CrossRef
[15] Hu, S., Li, M.H., et al. (2018) Outsourced Biometric Identi-fication with Privacy. IEEE Transactions on Information Forensics and Security, 13, 2448-2463. [Google Scholar] [CrossRef
[16] Liu, C., Hu, X., Zhang, Q., et al. (2019) An Efficient Biometric Identification in Cloud Computing with Enhanced Privacy Security. IEEE Access, 7, 105363-105375. [Google Scholar] [CrossRef
[17] Delfs, H. and Knebl, H. (2007) Introduction to Cryptography. 2nd Edition, Springer, Berlin. [Google Scholar] [CrossRef
[18] Liu, K., Giannella, C. and Kargupta, H. (2006) An Attacker’s View of Distance Preserving Maps for Privacy Preserving Data Mining. European Conference on Principles of Data Mining and Knowledge Discovery, Berlin, 18-22 September 2006, 297-308. [Google Scholar] [CrossRef
[19] Esmaeili, M.M., Ward, R.K. and Fatourechi, M. (2012) A Fast Ap-proximate Nearest Neighbor Search Algorithm in the Hamming Space. IEEE Transactions on Pattern Analysis and Ma-chine Intelligence, 34, 2481-2488. [Google Scholar] [CrossRef
[20] Gionis, A., Indyk, P., Motwani, R., et al. (1999) Similarity Search in High Dimensions via Hashing. Proceedings of the 25th International Conference on Very Large Data Bases, San Francisco, 7 September 1999, 518-529.