An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing
Keywords:
Abstract
Biometric recognizable proof has gotten progressively well-known as of late. With the turn of events of distributed computing, data set proprietors are propelled to revaluate the huge size of biometric information and ID undertakings to the cloud to dispose of the costly stockpiling and calculation costs, which, be that as it may, carries possible dangers to clients' security. In this paper, we propose an effective and security saving bio-metric ID rethinking plan. In particular, the biometric to execute a biometric ID, the information base proprietor scrambles the inquiry information also, submits it to the cloud. The cloud performs recognizable proof activities over the scrambled data set and returns the outcome to the data set proprietor. A careful security investigation demonstrates that the proposed conspire is secure regardless of whether assailants can fashion ID demands and conspire with the cloud.
References
- A. Jain, L. Hong, and S. Pankanti, ‘‘Biometric identification,’’ Commun. ACM, vol. 43, no. 2, pp. 90–98, 2000.
- R. Allen, P. Sankar, and S. Prabhakar, ‘‘Fingerprint identification technology,’’ in Biometric Systems. London, U.K.: Springer, 2005, pp. 22–61.
- J. de Mira, Jr., H. V. Neto, E. B. Neves, and F. K. Schneider, ‘‘Biometric oriented iris identification based on mathematical morphology,’’ J. Signal Process. Syst., vol. 80, no. 2, pp. 181–195, 2015.
- S. Romdhani, V. Blanz, and T. Vetter, ‘‘Face identification by fitting a 3D morphable model using linear shape and texture error functions,’’ in Proc. Eur. Conf. Comput. Vis., 2002, pp. 3–19.
- Y. Xiao et al., ‘‘A survey of key management schemes in wireless sensor networks,’’ Comput. Commun., vol. 30, nos. 11–12, pp. 2314–2341, Sep. 2007.
- X. Du, Y. Xiao, M. Guizani, and H.-H. Chen, ‘‘An effective key management scheme for heterogeneous sensor networks,’’ Ad Hoc Netw., vol. 5, no. 1, pp. 24–34, 2007.
- X. Du and H. H. Chen, ‘‘Security in wireless sensor networks,’’ IEEE Wireless Commun. Mag., vol. 15, no. 4, pp. 60–66, Aug. 2008.
- X. Hei and X. Du, ‘‘Biometric-based two-level secure access control for implantable medical devices during emergencies,’’ in Proc. IEEE INFOCOM, Apr. 2011, pp. 346–350.
- X. Hei, X. Du, J. Wu, and F. Hu, ‘‘Defending resource depletion attacks on implantable medical devices,’’ in Proc. IEEE GLOBECOM, Dec. 2010, pp. 1–5.
- M. Barni et al., ‘‘Privacy-preserving fingercode authentication,’’ in Proc. 12th ACM Workshop Multimedia Secur., 2010, pp. 231–240.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.