Hệ Thống Đa Sinh Trắc Không Xâm Phạm Dữ Liệu Dựa Trên Quyền Riêng Tư Để Xác Định An Toàn Trong Môi Trường Đám Mây

Springer Science and Business Media LLC - Tập 54 - Trang 303-325 - 2021
R. Megiba Jasmine1, J. Jasper2
1Department of Computer Science and Engineering, Ponjesly College of Engineering, Nagercoil, India
2Department of Electrical and Electronic Engineering, Ponjesly College of Engineering, Nagercoil, India

Tóm tắt

Việc xác định danh tính sinh trắc bảo vệ quyền riêng tư đã thu hút nhiều sự chú ý, cung cấp hiệu quả giải pháp lưu trữ an toàn thông tin nhạy cảm trên các máy chủ đám mây. Trong bài báo này, chúng tôi thiết kế một hệ thống Đa Sinh Trắc Bảo Vệ Quyền Riêng Tư (PPMBI) đảm bảo việc thuê ngoài dữ liệu sinh trắc an toàn và bảo vệ quyền riêng tư của người dùng chống lại các cuộc tấn công cấp cao hơn trong đám mây. Phương pháp này sử dụng mô hình sinh trắc đa chiều tích hợp các đặc điểm vân tay và tĩnh mạch ngón tay để cải thiện an ninh dữ liệu. Ngoài ra, chúng tôi trình bày một quy trình mã hóa mẫu trọng số và mã hóa hồ sơ người dùng nhằm kiểm soát quyền truy cập dữ liệu của người dùng và tìm ra sự khớp gần nhất cho truy vấn đầu vào. Trong giai đoạn xác định danh tính người dùng, việc khớp mẫu và giải mã với phép tính khoảng cách tối thiểu được thực hiện để thu được chỉ số của người dùng đã đăng ký trong cơ sở dữ liệu. Dựa trên giá trị chỉ số đã tính, sự tương đồng được ước lượng và kết quả được xuất ra cho người dùng dưới dạng đã được xác định hoặc từ chối. Phân tích thí nghiệm chỉ ra rằng phương pháp đề xuất đạt được tính riêng tư tốt hơn và kháng cự lại tất cả các cuộc tấn công có thể xảy ra trong hệ thống đám mây.

Từ khóa

#sinh trắc #bảo vệ quyền riêng tư #xác định danh tính #an toàn thông tin #đám mây

Tài liệu tham khảo

Wong KS, Kim MH (2012) Secure biometric-based authentication for cloud computing. International conference on cloud computing and services science. Springer, Cham, pp 86–101 Wong KS, Kim MH (2012) Towards biometric-based authentication for cloud computing. In: CLOSER, pp 501–510 Rui Z, Yan Z (2018) A survey on biometric authentication: toward secure and privacy-preserving identification. IEEE Access 7:5994–6009 Vallabhu H, Satyanarayana RV (2012) Biometric authentication as a service on cloud: novel solution. Int J Soft Comput Eng 2(4):163 Haghighat M, Zonouz S, Abdel-Mottaleb M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Exp Syst Appl 42(21):7905–7916 Bringer J, Chabanne H, Patey A (2013) Privacy-preserving biometric identification using secure multiparty computation: an overview and recent trends. IEEE Signal Process Mag 30(2):42–52 Velciu MA, Pătraşcu A, Patriciu VV (2014) Bio-cryptographic authentication in cloud storage sharing. In: Proceedings of the 2014 IEEE 9th IEEE international symposium on applied computational intelligence and informatics (SACI), pp 165–170. Sarier ND (2017) Privacy preserving multimodal biometric authentication in the cloud. In: International conference on green, pervasive, and cloud computing, pp 90–104. Al-Hudhud G, Alarfag E, Alkahtani S, Alaskar A, Almashari B, Almashari H (2015) Web-based multimodal biometric authentication application. In: Proceedings of the 2015 5th national symposium on information technology: towards new smart world (NSITNSW). IEEE, pp 1–6 Fathi R, Salehi MA, Leiss EL (2015) User-friendly and secure architecture (UFSA) for authentication of cloud services. In: Proceedings of the 2015 IEEE 8th international conference on cloud computing. IEEE, pp 516–523 Meng W, Wong DS, Furnell S, Zhou J (2014) Surveying the development of biometric user authentication on mobile phones. IEEE Commun Surv Tutor 17(3):1268–1293 Pukdesree S, Netinant P (2016) Conceptual framework: the adaptive biometrics authentication for accessing cloud computing services using iPhone. Recent Advances in Information and Communication Technology 2016. Springer, Cham, pp 209–216 Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2018) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inform Sci 433:431–447 Anakath AS, Rajakumar S, Ambika S (2019) Privacy preserving multi factor authentication using trust management. Clust Comput 22(5):10817–10823 Kumari S, Li X, Wu F, Das AK, Choo KKR, Shen J (2017) Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Fut Gen Comput Syst 68:320–330 Mansour A, Sadik M, Sabir E (2015) Multi-factor authentication based on multimodal biometrics (mfa-mb) for cloud computing. In: Proceedings of the 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–4 Yassin AA, Jin H, Ibrahim A, Zou D (2012) Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the 2012 second international conference on cloud and green computing. IEEE, pp 282–289 Omri F, Foufou S, Hamila R, Jarraya M (2013) Cloud-based mobile system for biometrics authentication. In: Proceedings of the 2013 13th International conference on ITS telecommunications (ITST). IEEE, pp 325–330 Abdellaoui A, Khamlichi YI, Chaoui H (2015) An efficient framework for enhancing user authentication in cloud storage using digital watermark. Int Rev Comput Softw (IRECOS) 10(2):130–136 Barra S, Choo KKR, Nappi M, Castiglione A, Narducci F, Ranjan R (2018) Biometrics-as-a-service: Cloud-based technology, systems, and applications. IEEE Cloud Comput 5(4):33–37 Peralta D, García S, Benitez JM, Herrera F (2017) Minutiae-based fingerprint matching decomposition: methodology for big data frameworks. Inf Sci 408:198–212 Althamary IA, El-Alfy ESM (2017) A more secure scheme for CAPTCHA-based authentication in cloud environment. In: Proceeding of the 2017 8th international conference on information technology (ICIT). IEEE, pp 405–411 Barman S, Shum HP, Chattopadhyay S, Samanta D (2019) A secure authentication protocol for multi-server-based e-healthcare using a fuzzy commitment scheme. IEEE Access 7:12557–12574 Topcu B, Karabat C, Azadmanesh M, Erdogan H (2016) Practical security and privacy attacks against biometric hashing using sparse recovery. EURASIP J Adv Signal Process 2016(1):100 Gomez-Barrero M, Rathgeb C, Scherhag U, Busch C (2017) Is your biometric system robust to morphing attacks? In: Proceedings of the 2017 5th international workshop on biometrics and forensics (IWBF). IEEE, pp 1–6 Rattani A, Poh N, Ross A (2012) Analysis of user-specific score characteristics for spoof biometric attacks. In: Proceedings of the 2012 IEEE computer society conference on computer vision and pattern recognition workshops. IEEE, pp 124–129 Gumaei A, Sammouda R, Al-Salman AMS, Alsanad A (2019) Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation. J Parallel Distrib Comput 124:27–40 Guo S, Xiang T, Li X (2019) Towards efficient privacy-preserving face recognition in the cloud. Signal Process 164:320–328 Zhang C, Zhu L, Xu C (2017) PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inform Sci 409:56–67 Zhu L, Zhang C, Xu C, Liu X, Huang C (2018) An efficient and privacy-preserving biometric identification scheme in cloud computing. IEEE Access 6:19025–19033 De Donno M, Giaretta A, Dragoni N, Bucchiarone A, Mazzara M (2019) Cyber-storms come from clouds: Security of cloud computing in the IoT era. Fut Internet 11(6):127 Ilankumaran S, Deisy C (2019) Multi-biometric authentication system using finger vein and iris in cloud computing. Cluster Comput 22(1):103–117 Kakkad V, Patel M, Shah M (2019) Biometric authentication and image encryption for image security in cloud framework. Multiscale Multidiscip Model Exp Des 2(4):233–248 Kumar S, Singh SK, Singh AK, Tiwari S, Singh RS (2018) Privacy preserving security using biometrics in cloud computing. Multimedia Tools Appl 77(9):11017–11039 Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud. In: Proceedings of the European symposium on research in computer security, pp 186–205. Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859 Fingerprint Verification Competition (2002). http://bias.csr.unibo.it/fvc2002 Fingerprint Verification Competition (2004). http://bias.csr.unibo.it/fvc2004 Yin Y, Liu L, Sun X (2011) SDUMLA-HMT: a multimodal biometric database. Chinese conference on biometric recognition. Springer, Berlin, Heidelberg, pp 260–268 Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inform Forens Sec 13(10):2448–2463 Liu C, Hu X, Zhang Q, Wei J, Liu W (2019) An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7:105363–105375