A critical survey of the security and privacy aspects of the Aadhaar framework

被引:1
|
作者
Sadhya, Debanjan [1 ]
Sahu, Tanya [1 ]
机构
[1] Indian Inst Informat Technol & Management Gwalior, ABV, Dept Comp Sci & Engn, Gwalior, Madhya Pradesh, India
关键词
Aadhaar; Biometrics; Security; Privacy; Linkage attacks; BIOMETRIC AUTHENTICATION; K-ANONYMITY; NOISE;
D O I
10.1016/j.cose.2024.103782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aadhaar is an identification document issued by the Unique Identification Authority of India (UIDAI) to the residents of India. It contains a 12-digit unique identification number (known as the Aadhaar number) and personal details such as name, address, date of birth and biometric data. The biometric data captured for Aadhaar includes fingerprints, facial images and iris scans, which are unique to each individual. The Aadhaar data is used for entity authentication while accessing various government services, availing subsidies, opening bank accounts and conducting other identity-dependent transactions. Thus, the Aadhaar framework provides efficient authentication services in India's public delivery systems. Although UIDAI has implemented stringent security measures such as encryption, access controls and regular audits of the system, the use of Aadhaar has raised several concerns regarding privacy and data security aspects. In this regard, only a handful of studies discuss the security challenges related to Aadhaar. Furthermore, the Aadhaar framework itself is always evolving, thus making prior studies less informative. This paper describes in detail the security features of the Aadhaar card while emphasizing the security challenges involving demographic and biometric data. We have also outlined the preventive measures that can be enforced to secure these data. Finally, this study investigates possible linkage attacks that could occur when different databases are linked for Aadhaar-enabled public schemes. Hence, our work summarizes the security and privacy implications of the Aadhaar infrastructure from a holistic perspective. We believe that our work would be useful for security professionals and policy makers engaged in designing large-scale authentication frameworks.
引用
收藏
页数:16
相关论文
共 50 条
  • [1] Security and privacy aspects in MapReduce on clouds: A survey
    Derbeko, Philip
    Dolev, Shlomi
    Gudes, Ehud
    Sharma, Shantanu
    [J]. COMPUTER SCIENCE REVIEW, 2016, 20 : 1 - 28
  • [2] Privacy Concerns with Aadhaar
    Banerjee, Subhashis
    Sharma, Subodh
    [J]. COMMUNICATIONS OF THE ACM, 2019, 62 (11) : 80 - 80
  • [3] Security aspects of mobile phone virus: a critical survey
    Shih, Dong-Her
    Lin, Binshan
    Chiang, Hslu-Sen
    Shih, Ming-Hung
    [J]. INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2008, 108 (3-4) : 478 - 494
  • [4] Analysis of Newer Aadhaar Privacy Models
    Rajput, Ajinkya
    Gopinath, K.
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2018, 2018, 11281 : 386 - 404
  • [5] Cultural and social aspects of security and privacy the critical elements of trusted online service
    Yang, Yinan
    Lewis, Ed
    Brown, Lawrie
    [J]. Usability and Internationalization, Pt 2, Proceedings: GLOBAL AND LOCAL USER INTERFACES, 2007, 4560 : 546 - 553
  • [6] Security and Privacy in IoT: A Survey
    Poornima M. Chanal
    Mahabaleshwar S. Kakkasageri
    [J]. Wireless Personal Communications, 2020, 115 : 1667 - 1693
  • [7] Security and Privacy in IoT: A Survey
    Chanal, Poornima M.
    Kakkasageri, Mahabaleshwar S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 115 (02) : 1667 - 1693
  • [8] Privacy Violating Opensource Intelligence Threat Evaluation Framework: A Security Assessment Framework For Critical Infrastructure Owners
    Cartagena, Adrian
    Rimmer, Gerald
    van Dalsen, Thomas
    Watkins, Lanier
    Robinson, William H.
    Rubin, Aviel
    [J]. 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 494 - 499
  • [9] Aspects of data security and privacy in teleradiology
    Baur, HJ
    Saurbier, F
    Engelmann, U
    Schroter, A
    Baur, U
    Meinzer, HP
    [J]. CAR '96: COMPUTER ASSISTED RADIOLOGY, 1996, 1124 : 525 - 530
  • [10] A Critical Survey of different Security aspects in Saudi Arabian Web Servers
    Al-Saleem, Saleh M.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (02): : 1 - 6