Abstract

Biometric identification services have been applied to almost all aspects of life. However, how to securely and efficiently identify an individual in a huge biometric dataset is still very challenging. For one thing, biometric data is very sensitive and should be kept secure during the process of biometric identification. On the other hand, searching a biometric template in a large dataset can be very time-consuming, especially when some privacy-preserving measures are adopted. To address this problem, we propose an efficient and privacy-preserving biometric identification scheme based on the FITing-tree, iDistance, and a symmetric homomorphic encryption (SHE) scheme with two cloud servers. With our proposed scheme, the privacy of the user’s identification request and service provider’s dataset is guaranteed, while the computational costs of the cloud servers in searching the biometric dataset can be kept at an acceptable level. Detailed security analysis shows that the privacy of both the biometric dataset and biometric identification request is well protected during the identification service. In addition, we implement our proposed scheme and compare it to a previously reported M-Tree based privacy-preserving identification scheme in terms of computational and communication costs. Experimental results demonstrate that our proposed scheme is indeed efficient in terms of computational and communication costs while identifying a biometric template in a large dataset.

Highlights

  • With the booming development of the Internet of ings (IoT), the number of smart devices, such as smart cameras and smartwatches, has grown dramatically in recent years

  • In order to measure the integrated performance, we implement both schemes with Java and conduct some experiments on an Intel Xeon 6226R CPU@2.9 GHz Windows platform with 256 GB RAM. e symmetric homomorphic encryption (SHE) scheme is used to protect the privacy of the dataset and identification requests in these two schemes. e security parameters are set as k0 2048, k1 20 and k2 160

  • Each face feature is a 512-dimensional vector, and all face features lie in the same range (−1, 1) as the face features extracted by the FaceNet. e templates in the synthetic dataset are distributed in a hypercubes, in which each dimension is lying in (-1, 1)

Read more

Summary

Introduction

With the booming development of the Internet of ings (IoT), the number of smart devices, such as smart cameras and smartwatches, has grown dramatically in recent years. Security and Communication Networks templates should be able to be derived from their encrypted data To solve this problem, researchers have proposed many schemes [6,7,8,9,10,11,12,13] to achieve privacy-preserving biometric recognition. Researchers have proposed many schemes [6,7,8,9,10,11,12,13] to achieve privacy-preserving biometric recognition Most of these schemes [6,7,8,9,10] work in a basic way, which means that they just traverse the whole dataset to get the identification result, and no optimization tactics are taken to accelerate the searching process. The data owner has to be on standby during the identification service, which results in the loss of the native advantages of cloud computing

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call