PassBio: Privacy-Preserving User-Centric Biometric Authentication

被引:64
|
作者
Zhou, Kai [1 ]
Ren, Jian [1 ]
机构
[1] Michigan State Univ, Dept Elect & Comp Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Biometric authentication; data security and privacy; computation over encrypted data; predicate encryption; inner product encryption; FUNCTIONAL ENCRYPTION; INNER-PRODUCT; SECURE;
D O I
10.1109/TIFS.2018.2838540
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The proliferation of online biometric authentication has necessitated security requirements of biometric templates. The existing secure biometric authentication schemes feature a server-centric model, where a service provider maintains a biometric database and is fully responsible for the security of the templates. The end-users have to fully trust the server in storing, processing, and managing their private templates. As a result, the end-users' templates could be compromised by outside attackers or even the service provider itself. In this paper, we propose a user-centric biometric authentication scheme (PassBio) that enables end-users to encrypt their own templates with our proposed light-weighted encryption scheme. During authentication, all the templates remain encrypted such that the server will never see them directly. However, the server is able to determine whether the distance of two encrypted templates is within a pre-defined threshold. Our security analysis shows that no critical information of the templates can be revealed under both passive and active attacks. PassBio follows a "compute-then-compare" computational model over encrypted data. More specifically, our proposed threshold predicate encryption (TPE) scheme can encrypt two vectors x and y in such a manner that the inner product of x and y can be evaluated and compared to a pre-defined threshold. TPE guarantees that only the comparison result is revealed and no key information about x and y can be learned. Furthermore, we show that TPE can be utilized as a flexible building block to evaluate different distance metrics, such as Hamming distance and Euclidean distance over encrypted data. Such a compute-then-compare computational model, enabled by TPE, can be widely applied in many interesting applications, such as searching over encrypted data while ensuring data security and privacy.
引用
收藏
页码:3050 / 3063
页数:14
相关论文
共 50 条
  • [31] A User-Centric Privacy-Preserving Approach to Control Data Collection, Storage, and Disclosure in Own Smart Home Environments
    Wickramasinghe, Chathurangi Ishara
    Reinhardt, Delphine
    MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES, 2022, 419 : 190 - 206
  • [32] Lightweight and Privacy-Preserving Remote User Authentication for Smart Homes
    Nimmy, K.
    Sankaran, Sriram
    Achuthan, Krishnashree
    Calyam, Prasad
    IEEE ACCESS, 2022, 10 : 176 - 190
  • [33] Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
    Gunasinghe, Hasini
    Bertino, Elisa
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 389 - 408
  • [34] Privacy-Preserving Implicit Authentication
    Safa, Nashad Ahmed
    Safavi-Naini, Reihaneh
    Shahandashti, Siamak F.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 471 - 484
  • [35] Privacy-Preserving Fingercode Authentication
    Barni, Mauro
    Bianchi, Tiziano
    Catalano, Dario
    Di Raimondo, Mario
    Labati, Ruggero Donida
    Failla, Pierluigi
    MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 231 - 240
  • [36] Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems
    Xuelei Li
    Qiaoyan Wen
    Wenmin Li
    Hua Zhang
    Zhengping Jin
    Journal of Medical Systems, 2014, 38
  • [37] Privacy-preserving model for biometric-based authentication and Key Derivation Function
    Italis, Olson
    Pierre, Samuel
    Quintero, Alejandro
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [38] RETRACTED: Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems (Retracted Article)
    Nigam, Dhananjay
    Patel, Shilp Nirajbhai
    Vincent, P. M. Durai Raj
    Srinivasan, Kathiravan
    Arunmozhi, Sinouvassane
    JOURNAL OF HEALTHCARE ENGINEERING, 2022, 2022
  • [39] Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption
    Patsakis, Constantinos
    van Rest, Jeroen
    Choras, Michal
    Bouroche, Melanie
    DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 169 - 182
  • [40] Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems
    Li, Xuelei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zhengping
    JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (11)