A critical survey of the security and privacy aspects of the Aadhaar framework

被引:1
|
作者
Sadhya, Debanjan [1 ]
Sahu, Tanya [1 ]
机构
[1] Indian Inst Informat Technol & Management Gwalior, ABV, Dept Comp Sci & Engn, Gwalior, Madhya Pradesh, India
关键词
Aadhaar; Biometrics; Security; Privacy; Linkage attacks; BIOMETRIC AUTHENTICATION; K-ANONYMITY; NOISE;
D O I
10.1016/j.cose.2024.103782
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aadhaar is an identification document issued by the Unique Identification Authority of India (UIDAI) to the residents of India. It contains a 12-digit unique identification number (known as the Aadhaar number) and personal details such as name, address, date of birth and biometric data. The biometric data captured for Aadhaar includes fingerprints, facial images and iris scans, which are unique to each individual. The Aadhaar data is used for entity authentication while accessing various government services, availing subsidies, opening bank accounts and conducting other identity-dependent transactions. Thus, the Aadhaar framework provides efficient authentication services in India's public delivery systems. Although UIDAI has implemented stringent security measures such as encryption, access controls and regular audits of the system, the use of Aadhaar has raised several concerns regarding privacy and data security aspects. In this regard, only a handful of studies discuss the security challenges related to Aadhaar. Furthermore, the Aadhaar framework itself is always evolving, thus making prior studies less informative. This paper describes in detail the security features of the Aadhaar card while emphasizing the security challenges involving demographic and biometric data. We have also outlined the preventive measures that can be enforced to secure these data. Finally, this study investigates possible linkage attacks that could occur when different databases are linked for Aadhaar-enabled public schemes. Hence, our work summarizes the security and privacy implications of the Aadhaar infrastructure from a holistic perspective. We believe that our work would be useful for security professionals and policy makers engaged in designing large-scale authentication frameworks.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Privacy and Security in Federated Learning: A Survey
    Gosselin, Remi
    Vieu, Loic
    Loukil, Faiza
    Benoit, Alexandre
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [32] A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
    Bouzidi, Mohammed
    Gupta, Nishu
    Cheikh, Faouzi Alaya
    Shalaginov, Andrii
    Derawi, Mohammad
    [J]. IEEE ACCESS, 2022, 10 : 101362 - 101384
  • [33] A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
    Bouzidi, Mohammed
    Gupta, Nishu
    Cheikh, Faouzi Alaya
    Shalaginov, Andrii
    Derawi, Mohammad
    [J]. IEEE Access, 2022, 10 : 101362 - 101384
  • [34] Aspects of security, integrity and privacy in the telecommunication network
    Ambrois, O.
    [J]. CSELT Technical Reports, 1991, 19 (02): : 155 - 161
  • [35] A study on privacy and security aspects of personalised apps
    Gerasimou, Stylianos
    Limniotis, Konstantinos
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (05) : 3217 - 3239
  • [36] PRIVACY IN INTERNET TRANSACTIONS: ECONOMIC AND SECURITY ASPECTS
    Helmbrecht, Udo
    [J]. INTERNATIONAL SEMINAR ON NUCLEAR WAR AND PLANETARY EMERGENCIES: 45TH SESSION, 2013, : 477 - 486
  • [37] IDENTITY MANAGEMENT ON BLOCKCHAIN - PRIVACY AND SECURITY ASPECTS
    Panait, Andreea-Elena
    Olimid, Ruxandra F.
    Stefanescu, Alin
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 45 - 52
  • [38] Security and privacy Aspects for Internet of Things (IoT)
    Bansal, Malti
    Nanda, Marshal
    Husain, Md Nazir
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 199 - 204
  • [39] A systematic survey on security and privacy issues of medicine supply chain: Taxonomy, framework, and research challenges
    Hathaliya, Jigna J.
    Tanwar, Sudeep
    [J]. SECURITY AND PRIVACY, 2024, 7 (04)
  • [40] Security and Privacy Framework for Academic Monitoring System
    Muthusenthil, B.
    Vijayakumaran, C.
    Kim, Hyunsung
    [J]. 2015 8TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2015, : 5 - 8