A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems

被引:75
|
作者
Simoens, Koen [1 ,2 ]
Bringer, Julien [3 ]
Chabanne, Herve [3 ,4 ]
Seys, Stefaan [1 ,2 ]
机构
[1] Katholieke Univ Leuven, B-3001 Louvain, Belgium
[2] IBBT, B-9050 Ghent, Belgium
[3] Morpho, F-95520 Osny, France
[4] Telecom ParisTech, F-75013 Paris, France
关键词
Authentication; biometrics; blackbox security model; malicious adversaries; protocols; template protection;
D O I
10.1109/TIFS.2012.2184092
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols with respect to user and data privacy. The goal of an adversary in such context is not to bypass the authentication but to learn information either on biometric data or on users that are in the system. We elaborate our analysis on a general system model involving four logical entities (sensor, server, database, and matcher), and we focus on internal adversaries to encompass the situation where one or a combination of these entities would be malicious. Our goal is to emphasize that when going beyond the usual honest-but-curious assumption much more complex attacks can affect the privacy of data and users. On the one hand, we introduce a new comprehensive framework that encompasses the various schemes we want to look at. It presents a system model in which each internal entity or combination of entities is a potential attacker. Different attack goals are considered and resulting requirements on data flows are discussed. On the other hand, we develop different generic attacks. We follow a blackbox approach in which we consider components that perform operations on biometric data but where only the input/output behavior is analyzed. These attack strategies are exhibited on recent schemes such as the distributed protocol of Bringer et al. (ACISP 2007), which is based on the Goldwasser-Micali cryptosystem, the related protocol of Barbosa et al. (ACISP 2008), which uses the Paillier cryptosystem, and the scheme of Stoianov (SPIE 2010), that features the Blum-Goldwasser cryptosystem. All these schemes have been developed in the honest-but-curious adversary model and show potential weaknesses when considered in our malicious insider attack model.
引用
收藏
页码:833 / 841
页数:9
相关论文
共 50 条
  • [21] Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change
    Ogbanufe, Obi
    Kim, Dan J.
    [J]. AMCIS 2015 PROCEEDINGS, 2015,
  • [22] How Biometric Authentication Poses New Challenges to Our Security and Privacy
    Memon, Nasir
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2017, 34 (04) : 194 - +
  • [23] PRIVACY-SECURITY TRADEOFFS IN REUSABLE BIOMETRIC SECURITY SYSTEMS
    Lai, Lifeng
    Ho, Siu-Wai
    Poor, H. Vincent
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, 2010, : 1722 - 1725
  • [24] Biometric template security
    Jain, Anil K.
    Nandakumar, Karthik
    Nagar, Abhishek
    [J]. EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2008,
  • [25] Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
    Wang, Kailong
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 441 - 445
  • [26] Biometric authentication and image encryption for image security in cloud framework
    Kakkad, Vishruti
    Patel, Meshwa
    Shah, Manan
    [J]. MULTISCALE AND MULTIDISCIPLINARY MODELING EXPERIMENTS AND DESIGN, 2019, 2 (04) : 233 - 248
  • [27] Biometric authentication and image encryption for image security in cloud framework
    Vishruti Kakkad
    Meshwa Patel
    Manan Shah
    [J]. Multiscale and Multidisciplinary Modeling, Experiments and Design, 2019, 2 : 233 - 248
  • [28] A New Multimodal Behavioural Biometric Authentication Framework for System Security
    Neha
    Chatterjee, Kakali
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT ,POWER AND COMPUTING TECHNOLOGIES (ICCPCT), 2017,
  • [29] Capacity and examples of template-protecting biometric authentication systems
    Tuyls, P
    Goseling, J
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3087 : 158 - 170
  • [30] Lip biometric template security framework using spatial steganography
    Das, Srijan
    Muhammad, Khan
    Bakshi, Sambit
    Mukherjee, Imon
    Sa, Pankaj K.
    Sangaiah, Arun Kumar
    Bruno, Andrea
    [J]. PATTERN RECOGNITION LETTERS, 2019, 126 : 102 - 110