Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing

被引:45
|
作者
Kaur, Harkeerat [1 ]
Khanna, Pritee [1 ]
机构
[1] PDPM Indian Inst Informat Technol Design & Mfg, Dumna Airport Rd, Jabalpur 482005, India
关键词
Biometric privacy; Biometric security; Cancelable biometrics; Random Distance Method; Secret sharing; FINGERPRINT TEMPLATES; SCHEME;
D O I
10.1016/j.future.2019.07.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometric authentication over cloud and network applications demands a wide range of solutions against increasing cyber crimes and digital identity thefts. This work addresses security and privacy issues of network/cloud based remote biometric authentication where a number of applications are hosted over different servers. The proposed framework combines the benefits of cancelable pseudobiometric identities and advance protection using secret sharing. Random Distance Method is used to generate privacy preserving, non-invertible, revocable, and dimensionally reduced pseudo-biometric identities. Its performance is compared with some recent state-of-art techniques. Multiple pseudoidentities generated from the same biometric can prevent cross-matching and other database attacks, and allow user to operate safely on diverse applications. A share distribution model for multiple servers is developed and authentication protocols are designed to maintain user-anonymity, session key agreement, and prevent transmission attacks like replay, ARM, MIMA, database, and server-spoofing. (C) 2019 Published by Elsevier B.V.
引用
收藏
页码:30 / 41
页数:12
相关论文
共 50 条
  • [21] Enhancing Security and Privacy in Biometrics Based Authentication System Using Multiple Secret Sharing
    Patil, Sonali
    Tajane, Kapil
    Sirdeshpande, Janhavi
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 190 - 194
  • [22] Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
    Trupil Limbasiya
    Sanjay Kumar Sahay
    Bharath Sridharan
    Information Systems Frontiers, 2021, 23 : 835 - 848
  • [23] A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment
    Shao, Min-Hua
    Chin, Ying-Chih
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (01): : 161 - 168
  • [24] Cryptanalysis and Improvement of a Biometrics-based Multi-server Authentication Protocol
    Gu, Yi
    Li, Shengqiang
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 16 - 20
  • [25] Privacy-preserving cancelable multi-biometrics for identity information management
    Zhou, Zhiyong
    Liu, Yuanning
    Zhu, Xiaodong
    Zhang, Shaoqiang
    Liu, Zhen
    INFORMATION PROCESSING & MANAGEMENT, 2025, 62 (01)
  • [26] Cryptanalysis of Biometric-based Multi-server Authentication Scheme Using Smart Card
    Mun, Jongho
    Kim, Jiye
    Lee, Donghoon
    Won, Dongho
    PROCEEDINGS OF THE 11TH EAI INTERNATIONAL CONFERENCE ON HETEROGENEOUS NETWORKING FOR QUALITY, RELIABILITY, SECURITY AND ROBUSTNESS, 2015, : 56 - 59
  • [27] An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card
    Baruah, Khanjan Ch.
    Banerjee, Subhasish
    Dutta, Manash P.
    Bhunia, Chandan T.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 397 - 408
  • [28] Privacy-preserving similarity evaluation and application to remote biometrics authentication
    Kikuchi, Hiroaki
    Nagai, Kei
    Ogata, Wakaha
    Nishigaki, Masakatsu
    SOFT COMPUTING, 2010, 14 (05) : 529 - 536
  • [29] Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
    Kikuchi, Hiroaki
    Nagai, Kei
    Ogata, Wakaha
    Nishigaki, Masakatsu
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2008, 5285 : 3 - +
  • [30] Privacy-preserving similarity evaluation and application to remote biometrics authentication
    Hiroaki Kikuchi
    Kei Nagai
    Wakaha Ogata
    Masakatsu Nishigaki
    Soft Computing, 2010, 14 : 529 - 536