PassBio: Privacy-Preserving User-Centric Biometric Authentication

被引:64
|
作者
Zhou, Kai [1 ]
Ren, Jian [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Biometric authentication; data security and privacy; computation over encrypted data; predicate encryption; inner product encryption; FUNCTIONAL ENCRYPTION; INNER-PRODUCT; SECURE;
D O I
10.1109/TIFS.2018.2838540
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of online biometric authentication has necessitated security requirements of biometric templates. The existing secure biometric authentication schemes feature a server-centric model, where a service provider maintains a biometric database and is fully responsible for the security of the templates. The end-users have to fully trust the server in storing, processing, and managing their private templates. As a result, the end-users' templates could be compromised by outside attackers or even the service provider itself. In this paper, we propose a user-centric biometric authentication scheme (PassBio) that enables end-users to encrypt their own templates with our proposed light-weighted encryption scheme. During authentication, all the templates remain encrypted such that the server will never see them directly. However, the server is able to determine whether the distance of two encrypted templates is within a pre-defined threshold. Our security analysis shows that no critical information of the templates can be revealed under both passive and active attacks. PassBio follows a "compute-then-compare" computational model over encrypted data. More specifically, our proposed threshold predicate encryption (TPE) scheme can encrypt two vectors x and y in such a manner that the inner product of x and y can be evaluated and compared to a pre-defined threshold. TPE guarantees that only the comparison result is revealed and no key information about x and y can be learned. Furthermore, we show that TPE can be utilized as a flexible building block to evaluate different distance metrics, such as Hamming distance and Euclidean distance over encrypted data. Such a compute-then-compare computational model, enabled by TPE, can be widely applied in many interesting applications, such as searching over encrypted data while ensuring data security and privacy.
引用
下载
收藏
页码:3050 / 3063
页数:14
相关论文
共 50 条
  • [1] Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication"
    Kwon, Hee-Yong
    Lee, Mun-Kyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 2816 - 2817
  • [2] A user-centric privacy-preserving authentication protocol for IoT-AmI environments
    Masud, Mehedi
    Gaba, Gurjot Singh
    Kumar, Pardeep
    Gurtov, Andrei
    COMPUTER COMMUNICATIONS, 2022, 196 : 45 - 54
  • [3] A Privacy-Preserving Platform for User-Centric Quantitative Benchmarking
    Herrmann, Dominik
    Scheuer, Florian
    Feustel, Philipp
    Nowey, Thomas
    Federrath, Hannes
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 32 - 41
  • [4] User-Centric Distributed Solutions for Privacy-Preserving Analytics
    Bestavros, Azer
    Lapets, Andrei
    Varia, Mayank
    COMMUNICATIONS OF THE ACM, 2017, 60 (02) : 37 - 39
  • [5] User-Centric Privacy-Preserving Collection and Analysis of Trajectory Data
    Romero-Tris, Cristina
    Megias, David
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 245 - 253
  • [6] Privacy-Preserving Biometric-Based Remote User Authentication
    Tian, Yangguang
    Li, Yingjiu
    Liu, Ximeng
    Deng, Robert H.
    Sengupta, Binanda
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2265 - 2276
  • [7] Towards Privacy-Preserving Web Metering via User-Centric Hardware
    Alarifi, Fahad
    Fernandez, Maribel
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 329 - 340
  • [8] PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication
    Tian, Yangguang
    Li, Yingjiu
    Liu, Ximeng
    Deng, Robert H.
    Sengupta, Binanda
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 82 - 89
  • [9] User-Centric Privacy-Preserving Statistical Analysis of Ubiquitous Health Monitoring Data
    Drosatos, George
    Efraimidis, Pavlos S.
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (02) : 525 - 548
  • [10] Privacy-Preserving Biometric Authentication: Challenges and Directions
    Pagnin, Elena
    Mitrokotsa, Aikaterini
    SECURITY AND COMMUNICATION NETWORKS, 2017,