PRIVACY-SECURITY TRADEOFFS IN REUSABLE BIOMETRIC SECURITY SYSTEMS

被引:2
|
作者
Lai, Lifeng [1 ]
Ho, Siu-Wai [2 ]
Poor, H. Vincent [3 ]
机构
[1] Univ Arkansas, Dept Syst Engn, Little Rock, AR 72204 USA
[2] Univ South Australia, Inst Telecommun Res, Adelaide, SA, Australia
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Biometric; Privacy; Reusable; Security;
D O I
10.1109/ICASSP.2010.5495470
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
The performance of reusable biometric security systems in which the same biometric information is reused in several different locations is analyzed in this paper. The scenario in which the subsystems used at different locations are jointly designed is first considered. A fundamental limit of the privacy-security tradeoff is derived. Next, an incremental design approach is studied, in which the biometric measurements are reused while keeping the existing system intact. An achievable privacy-security tradeoff region for this design approach is derived. It is shown that under certain conditions, the incremental design approach can achieve the performance of the joint design approach. Finally, examples are given to illustrate the results.
引用
收藏
页码:1722 / 1725
页数:4
相关论文
共 50 条
  • [1] Privacy-Security Tradeoffs in Biometric Security Systems
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    [J]. 2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 268 - 273
  • [2] Privacy-Security Trade-Offs in Biometric Security Systems-Part I: Single Use Case
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 122 - 139
  • [3] Privacy-Security Trade-Offs in Biometric Security Systems-Part II: Multiple Use Case
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 140 - 151
  • [4] A Survey on Privacy-security in Internet of Vehicles
    Cheng, Wenzhi
    Luo, Entao
    Tang, Yayuan
    Wan, Li
    Wei, Meiyan
    [J]. 2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 644 - 650
  • [5] Understanding the Security in Privacy-Security Concerns: A Theoretical and Empirical Examination
    Bansal, Gaurav
    [J]. AMCIS 2011 PROCEEDINGS, 2011,
  • [6] Privacy and Security: How to Differentiate them using Privacy-Security Tree (PST) Classification
    Ji, Jocelyn Chan Ming
    Chua, Hui Na
    Lee, Hong Seng
    Iranmanesh, Vahab
    [J]. 2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 37 - 40
  • [7] "We Have No Security Concerns": Understanding the Privacy-Security Nexus in Telehealth for Audiologists and Speech-Language Pathologists: Understanding the Privacy-Security Nexus in Telehealth
    Tazi, Faiza
    Dykstra, Josiah
    Rajivan, Prashanth
    Das, Sanchari
    [J]. PROCEEDINGS OF THE 2024 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYTEMS, CHI 2024, 2024,
  • [8] Cancelable Biometrics for Better Security and Privacy in Biometric Systems
    Kanade, Sanjay Ganesh
    Petrovska-Delacretaz, Dijana
    Dorizzi, Bernadette
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 20 - 34
  • [9] A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems
    Simoens, Koen
    Bringer, Julien
    Chabanne, Herve
    Seys, Stefaan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 833 - 841
  • [10] Security of Biometric Systems
    Adamek, Milan
    Matysek, Miroslav
    Neumann, Petr
    [J]. 25TH DAAAM INTERNATIONAL SYMPOSIUM ON INTELLIGENT MANUFACTURING AND AUTOMATION, 2014, 2015, 100 : 169 - 176