Abstract

Data collection and storage in a large size is done on a routine basis in any company or organization. To this end, wireless network infrastructure and cloud computing are two widely-used tools. With the use of such services, less time is needed to attain the required output, and also managing the jobs will be simpler for users. General services employ a unique identifier for the aim of storing data in a digital database. However, it may be associated with some limitations and challenges. There is a link between the unique identifier and the data holder, e.g., name, address, Identity card number, etc. Attackers can manipulate a unique identifier for stealing the whole data. To get the data needed, attackers may even eavesdrop or guess. It results in lack of data privacy protection. As a result, it is necessary to take into consideration the data privacy issues in any data digital data storage. With the use of current services, there is a high possibility of exposure and leak of data/information to an unauthorized party during their transfer process. In addition, attacks may take place against services; for instance spoofing attacks, forgery attacks, etc. in the course of information transaction. To address such risks, this paper suggests the use of a biometric authentication method by means of a palm vein during the authentication process. Furthermore, a pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected. This way, any unauthorized party cannot gain access to data/information. The proposed system can resolve the information leaked, the user true identity is never revealed to others.

Highlights

  • In current world, all companies and organizations have to hold a huge amount of digital data in storage

  • A number of algorithms are required to be designed for the aim of searching and querying the encrypted information based on the Full Homomorrphic Encryption (FHE)

  • The offered model is established to arrange the spreading of the modify delay, such that at least k nodes modify their pseudonyms during the delay to pose any enemies

Read more

Summary

INTRODUCTION

All companies and organizations have to hold a huge amount of digital data in storage. The systems currently employed by the majority of companies still have problems with data privacy [1] They make use of a single ID or a unique identifier that represents all attributes of personal records. Remember that personal records consist of various information some of which may be of a high sensitivity and confidentiality If it is observed from the perspective of privacy issue, it can be said that services typically used might result in data exposure. There is still a need for efficient biometric methods and processes proposed to protect the data privacy and confidentiality of users. A pseudonym creation technique is adopted to make the database record anonymous, which can make sure the data is properly protected This way, any unauthorized party cannot gain access to data/information.

AND RELATED WORKS
PRESERVING DATA PRIVACY APPROACHES
Registering with the CA organization
Registering with an organization
Issuing credentials
PROPOSED METHOD
PRIVACY PRESERVING ANALYSIS
DISCUSSION
VIII. CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.