[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content
Log in

Privacy preserving security using biometrics in cloud computing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: Application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041

    Article  MATH  Google Scholar 

  2. Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357–383

    Article  MathSciNet  Google Scholar 

  3. Samer Atawneh, Ammar Almomani et al. (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl. Springer

  4. Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. Ratio 80(1024):160–223

  5. Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Alessandro Scotti (2010) Privacy-preserving fingercode authentication. Proc 12th ACM Workshop Multimed Sec, 231–240

  6. Vinayak Ashok Bharadi and Godson Michael DSilva (2015) Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud. Proc IEEE Int Conf Comput Commun Contrl Automation (ICCUBEA), 65–72

  7. Marina Blanton and Paolo Gasti (2011) Secure and Efficient Protocols for Iris and Fingerprint Identification. In Computer security–ESORICS2011, 190–209

  8. Bringer J, Chabanne H, Kindarji B (2011) Identification with encrypted Biometrics data. Sec Commun Netw 4:548–562

    Article  Google Scholar 

  9. Julien Bringer, Herve Chabanne, Alain Patey (2013) Practical identification with encrypted Biometrics data using oblivious ram. Proc IEEE Int Conf Biomet (ICB), 1–8

  10. Julien Bringer, Hervé Chabanne, Alain Patey (2013) SHADE: Secure hamming distance computation from oblivious transfer. Fin Cryptograph Data Sec, 164–176. Springer

  11. Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner (2014) GSHADE: Faster privacy-preserving distance computation and Biometrics identification. Proc 2nd ACM Workshop Inform Hiding Multimed Sec, 187–198

  12. Ivan Damgård, and Mats Jurik (2001) A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proc 4th Int Workshop Pract Theory Publ Key Cryptograph: Public Key Cryptograph, 119–136

  13. Daugman JG (1993) High confidence visual recognition of persons by test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161

    Article  Google Scholar 

  14. Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft (2009) Privacy-preserving face recognition, In Privacy enhancing technologies, 5672 of the series Lecture Notes in Computer Science, 235–253. Springer

  15. Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170

    Article  Google Scholar 

  16. B. Ferreira; J. Rodrigues; J. Leitao; H. Domingos Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput (99), 1. doi: 10.1109/TCC.2017.2669999

  17. Z. Fu; F. Huang; K. Ren; J. Weng; C. Wang Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inform Forensics Sec (99), 1

  18. Gupta BB, Agrawal DP et al (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global Publisher, USA

    Book  Google Scholar 

  19. Haghighata M, Zonouzb S, Abdel-Mottaleba M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst Appl 42(21):7905–7916

    Article  Google Scholar 

  20. Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media

  21. A. N. Jaber and Mohamad Fadli Bin Zolkipli (2013) Use of cryptography in cloud computing, Control System, Computing and Engineering (ICCSCE). IEEE Int Conf, Mindeb, 179–184

  22. Jain AK, Pankanti S, Prabhakar Karthikeyan S, Lin H, Ross A (2004) Biometrics: a grand challenge. Proc 17th IEEE Int Conf Pattern Recognitn (ICPR) 2:935–942

    Article  Google Scholar 

  23. Anil K. Jain, Arun Ross and Sharath Pankanti Biometrics: A tool for information security. IEEE Trans Inform Forensics Sec, 1, 125–143, 2006

  24. Anil K. Jain, Arun A. Ross, Karthik Nandakumar (2011) Introduction to Biometrics, Springer Science & Business Media

  25. P. Jain, D. Rane and S. Patidar (2011) A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment, Information and Communication Technologies (WICT), 2011 World Congress on, Mumbai, 456–461

  26. Jegede A, Udzir NI, Abdullah A, Mahmod R (2015) Face Recognition and Template Protection with Shielding Function. International Journal of Security and Its Applications 9(12):149–164

    Article  Google Scholar 

  27. Jianzhong Li (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. Springer

  28. Li J, Liu Z et al (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26

    Article  Google Scholar 

  29. Jin Li, Hongyang Yan, et al., Location-Sharing Systems with Enhanced Privacy in Mobile Online Social Networks, IEEE Systems Journal. DOI: 10.1109/JSYST.2015.2415835

  30. Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987

    Article  MATH  Google Scholar 

  31. Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich (2013) System for secure face identification (SCIFI) and methods useful in conjunction therewith. U.S. Patent No. 8,542,886

  32. Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa (2014) On the leakage of information in Biometrics authentication. Progress Cryptol (INDOCRYPT2014), 265–280. Springer

  33. Pascal Paillier (1999) Public-key cryptosystems based on composite degree residuosity classes. Adv Cryptol (EUROCRYPT99), 223–238. Springer

  34. Philip J, Bharadi VA (2016) Dr., Signature Verification SaaS Implementation on Microsoft Azure Cloud. Proc Int Conf Communication, Comput Virtual (ICCCV) 2016 79:410–418

    Google Scholar 

  35. Phillips PJ, Moon H, Rauss PJ, Rizvi S (2000) The FERET evaluation methodology for face recognition algorithm. IEEE Trans Pattern Anal Mach Intell 22(10):1090–1104

    Article  Google Scholar 

  36. Li Ping, Tong Li, Zheng-An Yao, Chun-Ming Tang, Jin Li (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput, 1–11

  37. Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg (2009) Efficient privacy-preserving face recognition. Inform, Sec Cryptol (ICISC-2009), 229–244

  38. Lorenz Schauer, Florian Dorfmeister, Florian Wirth (2016) Analyzing passive Wi-Fi fingerprinting for privacy-preserving indoor-positioning. Proc IEEE Int Conf Local GNSS (ICL-GNSS), 1–6

  39. Shu T, Chen Y, Yang J (2015) Protecting Multi-Lateral Localization Privacy in Pervasive Environments. IEEE/ACM Trans Network (TON) 23(5):1688–1701

    Article  Google Scholar 

  40. Sowmya R, Ezhilarasu P, Satheesh Kumar D, Manoj Prabhakar J (2015) A Survey on Data Security Using Identity Based Encryption in Cloud Computing. Int J Appl Inform Commun Eng 1(11):3–4

    Google Scholar 

  41. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  42. Sun Y, Wen Q, Zhang Y, Li W (2014) Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Computational and Mathematical Methods in Medicine 2014:1–9

    MATH  Google Scholar 

  43. Suryadevara S, Kapoor S, Dhatterwal S, Naaz R, Sharma A. (2011) Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security. Int Conf Inform Network Technol 4

  44. Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environment. IEEE Sec Privacy 8(6):24–31

    Article  Google Scholar 

  45. M. A. Turk, A. Pentland (1991) Face recognition using eigenfaces. Proc IEEE Comput Soc Conf Comput Vision Pattern Recogn (CVPR), 586–591

  46. Turk MA, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3:71–86

    Article  Google Scholar 

  47. Víctor GM, Luis HE, Carmen SÁ, Katiyar V, Dutta K, Gupta S (2010) A survey on elliptic curve cryptography for pervasive computing environment. J Comput Sci Eng 2(2):7–13

    Google Scholar 

  48. Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision, 1 57(2):137–154

    Article  Google Scholar 

  49. Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148

    Article  Google Scholar 

  50. Xiaoshan Wang; Yao Liu; Zhiqiang Shi; Xiang Lu; Limin Sun (2015) A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. Proc IEEE Int Conf Global Commun Conf (GLOBECOM), 1–6

  51. Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Europ Symp Res Comput Sec, 186–205. Springer International Publishing

  52. Wang Y, Wu Q, Qin B, Tang S, Susilo W (2017) Online/Offline Provable Data Possession. IEEE Trans Inform Forensics Sec 12:1182–1194 ISSN 1556-6013

    Article  Google Scholar 

  53. Zhihua Xia, et al, A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inform Forensics Sec, vol. 11, no. 11, pp. 2594–2608, 2016

  54. Xia Z et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962

    Article  Google Scholar 

  55. Yu Y et al (2017) Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans Inform Forensics Sec 12(4):767–778. doi:10.1109/TIFS.2016.2615853

    Article  MathSciNet  Google Scholar 

  56. Jiawei Yuan, and Shucheng Yu (2013) Efficient privacy-preserving biometric identification in cloud computing. Proc IEEE Int Conf INFOCOM, 2652–2660

  57. Youwen Zhu, Zhikuan Wang, Yue Zhang (2016) Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. Pacific-Asia Conf Knowledge Discov Data Mining, 401–414. Springer International Publishing

  58. Zhu Y, Huang Z, Takagi T (2016) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Kumar Singh.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, S., Singh, S.K., Singh, A.K. et al. Privacy preserving security using biometrics in cloud computing. Multimed Tools Appl 77, 11017–11039 (2018). https://doi.org/10.1007/s11042-017-4966-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4966-5

Keywords

Navigation