Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing

被引:7
|
作者
Liu, Yao [1 ]
Zhou, Tanping [2 ,3 ]
Yue, Zelun [4 ]
Liu, Wenchao [3 ]
Han, Yiliang [3 ]
Li, Qi [5 ]
Yang, Xiaoyuan [3 ]
机构
[1] Engn Univ PAP, Inst Sch Cryptog Engn, Xian 710086, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Software, TCA Lab, State Key Lab Comp Sci, Beijing 100080, Peoples R China
[3] Engn Univ PAP, Key Lab Network & Informat Secur PAP, Xian 710086, Shaanxi, Peoples R China
[4] Univ Peoples Armed Police Force, Dept Secrecy Arch & Screen Logist, Tianjin 300300, Peoples R China
[5] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Fingerprint recognition; Authentication; Cryptography; Cloud computing; Security; Biometrics (access control); Authorization; Homomorphic encryption; bilinear mapping; cloud computing; online authentication; fingerprint matching; threshold authentication; BIOMETRIC AUTHENTICATION;
D O I
10.1109/TCC.2021.3103546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy protection of biometrics-based on cloud computing is attracting increasing attention. In 2018, Zhu et al. proposed an efficient and privacy-preserving online fingerprint authentication scheme for data outsourcing e-Finga. Under the premise of ensuring user's fingerprint data privacy and message security authentication, the e-Finga scheme can provide accurate and efficient fingerprint identity authentication services. However, our analysis shows that the temporary fingerprint in this scheme uses the deterministic encryption algorithm, which has the risk of leaking the user's fingerprint characteristics. Therefore, we propose a temporary fingerprint attack method for the e-Finga scheme. Experiments demonstrate that an adversary can analyze specific secret parameters and fingerprint features when eavesdropping on a user's temporary fingerprint ciphertext. To counter the temporary fingerprint attack, we propose a secure e-fingerprint scheme- Secure e-finger that uses the learning with errors samples, which has the homomorphic addition property, to encrypt user's temporary fingerprints. Experiments show that the secure e-finger scheme can resist the temporary fingerprint attack. Compared with the unprotected e-Finga scheme, the client running time is increased by about 6% percent, the communication cost on the user side only increased by 0.3125% percent. As a result, our solution can realize secure online fingerprint authentication without losing efficiency. Single user authentication is likely to cause the problem of excessive authority. Based on the Secure e-finger scheme, we propose a threshold scheme based on biological characteristics.
引用
收藏
页码:564 / 578
页数:15
相关论文
共 50 条
  • [1] An Indirect Fingerprint Authentication Scheme in Cloud Computing
    Jiang, Xingchen
    Zheng, Jiande
    [J]. GREEN POWER, MATERIALS AND MANUFACTURING TECHNOLOGY AND APPLICATIONS III, PTS 1 AND 2, 2014, 484-485 : 986 - 990
  • [2] An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
    Akram, Waseem
    Mahmood, Khalid
    Li, Xiong
    Sadiq, Mazhar
    Lv, Zhihan
    Chaudhry, Shehzad Ashraf
    [J]. COMPUTER NETWORKS, 2022, 217
  • [3] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [4] Towards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing
    Huang Qinlong
    Ma Zhaofeng
    Fu Jingyi
    Yang Yixian
    Niu Xinxin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 159 - 168
  • [5] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
  • [6] An Efficient FHE Scheme to Secure Cloud Computing
    Hariss, Khalil
    Samhat, Abed Ellatif
    Chamoun, Maroun
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 341 - 349
  • [7] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [8] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [9] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    [J]. The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [10] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713