Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing

被引:7
|
作者
Liu, Yao [1 ]
Zhou, Tanping [2 ,3 ]
Yue, Zelun [4 ]
Liu, Wenchao [3 ]
Han, Yiliang [3 ]
Li, Qi [5 ]
Yang, Xiaoyuan [3 ]
机构
[1] Engn Univ PAP, Inst Sch Cryptog Engn, Xian 710086, Shaanxi, Peoples R China
[2] Chinese Acad Sci, Inst Software, TCA Lab, State Key Lab Comp Sci, Beijing 100080, Peoples R China
[3] Engn Univ PAP, Key Lab Network & Informat Secur PAP, Xian 710086, Shaanxi, Peoples R China
[4] Univ Peoples Armed Police Force, Dept Secrecy Arch & Screen Logist, Tianjin 300300, Peoples R China
[5] Univ Guelph, Sch Comp Sci, Guelph, ON N1G 2W1, Canada
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Fingerprint recognition; Authentication; Cryptography; Cloud computing; Security; Biometrics (access control); Authorization; Homomorphic encryption; bilinear mapping; cloud computing; online authentication; fingerprint matching; threshold authentication; BIOMETRIC AUTHENTICATION;
D O I
10.1109/TCC.2021.3103546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy protection of biometrics-based on cloud computing is attracting increasing attention. In 2018, Zhu et al. proposed an efficient and privacy-preserving online fingerprint authentication scheme for data outsourcing e-Finga. Under the premise of ensuring user's fingerprint data privacy and message security authentication, the e-Finga scheme can provide accurate and efficient fingerprint identity authentication services. However, our analysis shows that the temporary fingerprint in this scheme uses the deterministic encryption algorithm, which has the risk of leaking the user's fingerprint characteristics. Therefore, we propose a temporary fingerprint attack method for the e-Finga scheme. Experiments demonstrate that an adversary can analyze specific secret parameters and fingerprint features when eavesdropping on a user's temporary fingerprint ciphertext. To counter the temporary fingerprint attack, we propose a secure e-fingerprint scheme- Secure e-finger that uses the learning with errors samples, which has the homomorphic addition property, to encrypt user's temporary fingerprints. Experiments show that the secure e-finger scheme can resist the temporary fingerprint attack. Compared with the unprotected e-Finga scheme, the client running time is increased by about 6% percent, the communication cost on the user side only increased by 0.3125% percent. As a result, our solution can realize secure online fingerprint authentication without losing efficiency. Single user authentication is likely to cause the problem of excessive authority. Based on the Secure e-finger scheme, we propose a threshold scheme based on biological characteristics.
引用
收藏
页码:564 / 578
页数:15
相关论文
共 50 条
  • [41] Authentication Scheme in Cloud Computing: A Review
    Meena, Sunita
    Syal, Rupali
    [J]. PROCEEDINGS OF THE 2017 IEEE SECOND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES (ICECCT), 2017,
  • [42] SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing
    Huang, Qinlong
    Yang, Yixian
    Shi, Yuxiang
    [J]. SENSORS, 2018, 18 (02)
  • [43] Secure Authentication Protocol for Efficient Computational Offloading Service in the Mobile Cloud Computing
    Munivel, E.
    Kannammal, A.
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 457 - 467
  • [44] Secure fingerprint-based remote user authentication scheme using smartcards
    Yoon, EJ
    Yoo, KY
    [J]. INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 405 - 413
  • [45] Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment
    Lee, Hakjun
    Kang, Dongwoo
    Lee, Youngsook
    Won, Dongho
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [46] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    [J]. Journal of Cloud Computing, 9
  • [47] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [48] An Efficient and Secure Search Database Scheme for Cloud Computing in Smart Grid
    Jiang, Yixin
    Guo, Xiaobin
    Li, Chao
    Wen, Hong
    Lei, Cai
    Rui, Zhang
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 413 - +
  • [49] A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment
    Yu, SungJin
    Park, KiSung
    Park, YoungHo
    [J]. SENSORS, 2019, 19 (16)
  • [50] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    [J]. Pervasive Mob. Comput., (210-223):