Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing

被引:7
|
作者
Liu, Yao [1 ]
Zhou, Tanping [2 ,3 ]
Yue, Zelun [4 ]
Liu, Wenchao [3 ]
Han, Yiliang [3 ]
Li, Qi [5 ]
Yang, Xiaoyuan [3 ]
机构
[1] Engn Univ PAP, Inst Sch Cryptog Engn, Xian 710086, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Software, TCA Lab, State Key Lab Comp Sci, Beijing 100080, Peoples R China
[3] Engn Univ PAP, Key Lab Network & Informat Secur PAP, Xian 710086, Shaanxi, Peoples R China
[4] Univ Peoples Armed Police Force, Dept Secrecy Arch & Screen Logist, Tianjin 300300, Peoples R China
[5] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Fingerprint recognition; Authentication; Cryptography; Cloud computing; Security; Biometrics (access control); Authorization; Homomorphic encryption; bilinear mapping; cloud computing; online authentication; fingerprint matching; threshold authentication; BIOMETRIC AUTHENTICATION;
D O I
10.1109/TCC.2021.3103546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy protection of biometrics-based on cloud computing is attracting increasing attention. In 2018, Zhu et al. proposed an efficient and privacy-preserving online fingerprint authentication scheme for data outsourcing e-Finga. Under the premise of ensuring user's fingerprint data privacy and message security authentication, the e-Finga scheme can provide accurate and efficient fingerprint identity authentication services. However, our analysis shows that the temporary fingerprint in this scheme uses the deterministic encryption algorithm, which has the risk of leaking the user's fingerprint characteristics. Therefore, we propose a temporary fingerprint attack method for the e-Finga scheme. Experiments demonstrate that an adversary can analyze specific secret parameters and fingerprint features when eavesdropping on a user's temporary fingerprint ciphertext. To counter the temporary fingerprint attack, we propose a secure e-fingerprint scheme- Secure e-finger that uses the learning with errors samples, which has the homomorphic addition property, to encrypt user's temporary fingerprints. Experiments show that the secure e-finger scheme can resist the temporary fingerprint attack. Compared with the unprotected e-Finga scheme, the client running time is increased by about 6% percent, the communication cost on the user side only increased by 0.3125% percent. As a result, our solution can realize secure online fingerprint authentication without losing efficiency. Single user authentication is likely to cause the problem of excessive authority. Based on the Secure e-finger scheme, we propose a threshold scheme based on biological characteristics.
引用
收藏
页码:564 / 578
页数:15
相关论文
共 50 条
  • [31] A provable and secure mobile user authentication scheme for mobile cloud computing services
    Irshad, Azeem
    Chaudhry, Shehzad Ashraf
    Shafiq, Muhammad
    Usman, Muhammad
    Asif, Muhammad
    Ghani, Anwar
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (14)
  • [32] New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [33] Secure fingerprint authentication system on an untrusted computing environment
    Chung, Y
    Moon, D
    Kim, T
    Pan, S
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, 2005, 3592 : 299 - 310
  • [34] An Efficient and Secure Smart Card Based Authentication Scheme
    Chen, Chien-Ming
    Xiang, Bin
    Wang, King-Hang
    Zhang, Yong
    Wu, Tsu-Yang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (04): : 1113 - 1123
  • [35] Efficient and secure identity-based encryption scheme with equality test in cloud computing
    Wu, Libing
    Zhang, Yubo
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 22 - 31
  • [36] A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
    Jia, Xiaoying
    He, Debiao
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    [J]. IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 560 - 571
  • [37] Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
    Zhu, Qiang
    You, Lin
    Hu, Gengran
    Wang, Shengguo
    [J]. IEEE Internet of Things Journal, 2024, 11 (20) : 33604 - 33623
  • [38] A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
    Zhu, Wenlong
    Chen, Xuexiao
    Jiang, Linmei
    [J]. Alexandria Engineering Journal, 2024, 101 : 52 - 61
  • [39] Lightweight Hardware Based Secure Authentication Scheme for Fog Computing
    Huang, Baiyi
    Cheng, Xiuzhen
    Cao, Yuan
    Zhang, Le
    [J]. 2018 THIRD IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC), 2018, : 433 - 439
  • [40] Multilevel Authentication Scheme for Cloud Computing
    Adam, Sara Alfatih
    Yousif, Adil
    Bashir, Mohammed Bakri
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (09): : 205 - 212