[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Privacy preserving security using biometrics in cloud computing

Published: 01 May 2018 Publication History

Abstract

Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.

References

[1]
Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: Application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037---2041
[2]
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357---383
[3]
Samer Atawneh, Ammar Almomani et al. (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl. Springer
[4]
Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. Ratio 80(1024):160---223
[5]
Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Alessandro Scotti (2010) Privacy-preserving fingercode authentication. Proc 12th ACM Workshop Multimed Sec, 231---240
[6]
Vinayak Ashok Bharadi and Godson Michael DSilva (2015) Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud. Proc IEEE Int Conf Comput Commun Contrl Automation (ICCUBEA), 65---72
[7]
Marina Blanton and Paolo Gasti (2011) Secure and Efficient Protocols for Iris and Fingerprint Identification. In Computer security---ESORICS2011, 190---209
[8]
Bringer J, Chabanne H, Kindarji B (2011) Identification with encrypted Biometrics data. Sec Commun Netw 4:548---562
[9]
Julien Bringer, Herve Chabanne, Alain Patey (2013) Practical identification with encrypted Biometrics data using oblivious ram. Proc IEEE Int Conf Biomet (ICB), 1---8
[10]
Julien Bringer, Hervé Chabanne, Alain Patey (2013) SHADE: Secure hamming distance computation from oblivious transfer. Fin Cryptograph Data Sec, 164---176. Springer
[11]
Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner (2014) GSHADE: Faster privacy-preserving distance computation and Biometrics identification. Proc 2nd ACM Workshop Inform Hiding Multimed Sec, 187---198
[12]
Ivan Damgård, and Mats Jurik (2001) A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proc 4th Int Workshop Pract Theory Publ Key Cryptograph: Public Key Cryptograph, 119---136
[13]
Daugman JG (1993) High confidence visual recognition of persons by test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148---1161
[14]
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft (2009) Privacy-preserving face recognition, In Privacy enhancing technologies, 5672 of the series Lecture Notes in Computer Science, 235---253. Springer
[15]
Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113---170
[16]
B. Ferreira; J. Rodrigues; J. Leitao; H. Domingos Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput (99), 1.
[17]
Z. Fu; F. Huang; K. Ren; J. Weng; C. Wang Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inform Forensics Sec (99), 1
[18]
Gupta BB, Agrawal DP et al (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global Publisher, USA
[19]
Haghighata M, Zonouzb S, Abdel-Mottaleba M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst Appl 42(21):7905---7916
[20]
Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
[21]
A. N. Jaber and Mohamad Fadli Bin Zolkipli (2013) Use of cryptography in cloud computing, Control System, Computing and Engineering (ICCSCE). IEEE Int Conf, Mindeb, 179---184
[22]
Jain AK, Pankanti S, Prabhakar Karthikeyan S, Lin H, Ross A (2004) Biometrics: a grand challenge. Proc 17th IEEE Int Conf Pattern Recognitn (ICPR) 2:935---942
[23]
Anil K. Jain, Arun Ross and Sharath Pankanti Biometrics: A tool for information security. IEEE Trans Inform Forensics Sec, 1, 125---143, 2006
[24]
Anil K. Jain, Arun A. Ross, Karthik Nandakumar (2011) Introduction to Biometrics, Springer Science & Business Media
[25]
P. Jain, D. Rane and S. Patidar (2011) A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment, Information and Communication Technologies (WICT), 2011 World Congress on, Mumbai, 456---461
[26]
Jegede A, Udzir NI, Abdullah A, Mahmod R (2015) Face Recognition and Template Protection with Shielding Function. International Journal of Security and Its Applications 9(12):149---164
[27]
Jianzhong Li (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. Springer
[28]
Li J, Liu Z et al (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18---26
[29]
Jin Li, Hongyang Yan, et al., Location-Sharing Systems with Enhanced Privacy in Mobile Online Social Networks, IEEE Systems Journal.
[30]
Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971---987
[31]
Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich (2013) System for secure face identification (SCIFI) and methods useful in conjunction therewith. U.S. Patent No. 8,542,886
[32]
Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa (2014) On the leakage of information in Biometrics authentication. Progress Cryptol (INDOCRYPT2014), 265---280. Springer
[33]
Pascal Paillier (1999) Public-key cryptosystems based on composite degree residuosity classes. Adv Cryptol (EUROCRYPT99), 223---238. Springer
[34]
Philip J, Bharadi VA (2016) Dr., Signature Verification SaaS Implementation on Microsoft Azure Cloud. Proc Int Conf Communication, Comput Virtual (ICCCV) 2016 79:410---418
[35]
Phillips PJ, Moon H, Rauss PJ, Rizvi S (2000) The FERET evaluation methodology for face recognition algorithm. IEEE Trans Pattern Anal Mach Intell 22(10):1090---1104
[36]
Li Ping, Tong Li, Zheng-An Yao, Chun-Ming Tang, Jin Li (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput, 1---11
[37]
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg (2009) Efficient privacy-preserving face recognition. Inform, Sec Cryptol (ICISC-2009), 229---244
[38]
Lorenz Schauer, Florian Dorfmeister, Florian Wirth (2016) Analyzing passive Wi-Fi fingerprinting for privacy-preserving indoor-positioning. Proc IEEE Int Conf Local GNSS (ICL-GNSS), 1---6
[39]
Shu T, Chen Y, Yang J (2015) Protecting Multi-Lateral Localization Privacy in Pervasive Environments. IEEE/ACM Trans Network (TON) 23(5):1688---1701
[40]
Sowmya R, Ezhilarasu P, Satheesh Kumar D, Manoj Prabhakar J (2015) A Survey on Data Security Using Identity Based Encryption in Cloud Computing. Int J Appl Inform Commun Eng 1(11):3---4
[41]
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1---11
[42]
Sun Y, Wen Q, Zhang Y, Li W (2014) Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Computational and Mathematical Methods in Medicine 2014:1---9
[43]
Suryadevara S, Kapoor S, Dhatterwal S, Naaz R, Sharma A. (2011) Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security. Int Conf Inform Network Technol 4
[44]
Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environment. IEEE Sec Privacy 8(6):24---31
[45]
M. A. Turk, A. Pentland (1991) Face recognition using eigenfaces. Proc IEEE Comput Soc Conf Comput Vision Pattern Recogn (CVPR), 586---591
[46]
Turk MA, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3:71---86
[47]
Víctor GM, Luis HE, Carmen SÁ, Katiyar V, Dutta K, Gupta S (2010) A survey on elliptic curve cryptography for pervasive computing environment. J Comput Sci Eng 2(2):7---13
[48]
Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision, 1 57(2):137---154
[49]
Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136---148
[50]
Xiaoshan Wang; Yao Liu; Zhiqiang Shi; Xiang Lu; Limin Sun (2015) A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. Proc IEEE Int Conf Global Commun Conf (GLOBECOM), 1---6
[51]
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Europ Symp Res Comput Sec, 186---205. Springer International Publishing
[52]
Wang Y, Wu Q, Qin B, Tang S, Susilo W (2017) Online/Offline Provable Data Possession. IEEE Trans Inform Forensics Sec 12:1182---1194 ISSN 1556-6013
[53]
Zhihua Xia, et al, A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inform Forensics Sec, vol. 11, no. 11, pp. 2594---2608, 2016
[54]
Xia Z et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947---1962
[55]
Yu Y et al (2017) Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans Inform Forensics Sec 12(4):767---778.
[56]
Jiawei Yuan, and Shucheng Yu (2013) Efficient privacy-preserving biometric identification in cloud computing. Proc IEEE Int Conf INFOCOM, 2652---2660
[57]
Youwen Zhu, Zhikuan Wang, Yue Zhang (2016) Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. Pacific-Asia Conf Knowledge Discov Data Mining, 401---414. Springer International Publishing
[58]
Zhu Y, Huang Z, Takagi T (2016) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1---12

Cited By

View all
  1. Privacy preserving security using biometrics in cloud computing

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Multimedia Tools and Applications
    Multimedia Tools and Applications  Volume 77, Issue 9
    May 2018
    1166 pages

    Publisher

    Kluwer Academic Publishers

    United States

    Publication History

    Published: 01 May 2018

    Author Tags

    1. Biometrics identification
    2. Cloud computing
    3. Elliptical encryption
    4. Encrypted Biometrics
    5. Face recognition
    6. Privacy Preservation
    7. Security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)S-method: secure multimedia encryption technique in cloud environmentMultimedia Tools and Applications10.1007/s11042-023-15600-w83:3(8295-8309)Online publication date: 1-Jan-2024
    • (2023)A two-stage chaotic encryption algorithm for color face image based on circular diffusionMultimedia Tools and Applications10.1007/s11042-023-14804-482:26(40009-40038)Online publication date: 30-Mar-2023
    • (2022)A novel model to enhance the data security in cloud environmentMultiagent and Grid Systems10.3233/MGS-22036118:1(45-63)Online publication date: 1-Jan-2022
    • (2022)Research on the Privacy Security of Face Recognition TechnologyComputational Intelligence and Neuroscience10.1155/2022/78822942022Online publication date: 25-Jan-2022
    • (2022)A New Data Model for the Privacy Protection of Medical ImagesComputational Intelligence and Neuroscience10.1155/2022/58672152022Online publication date: 1-Jan-2022
    • (2022)A Privacy-Preserving Biometric Recognition System with Visual CryptographyAdvances in Multimedia10.1155/2022/10571142022Online publication date: 1-Jan-2022
    • (2022)Toward Privacy Protection of Sensed Biometric Features with Extended Visual CryptographyMicroprocessors & Microsystems10.1016/j.micpro.2022.10454091:COnline publication date: 23-May-2022
    • (2022)Insider threat prevention in distributed database as a service cloud environmentComputers and Industrial Engineering10.1016/j.cie.2022.108278169:COnline publication date: 1-Jul-2022
    • (2022)Design on Face Recognition System with Privacy Preservation Based on Homomorphic EncryptionWireless Personal Communications: An International Journal10.1007/s11277-021-09311-4123:4(3737-3754)Online publication date: 1-Apr-2022
    • (2022)A Privacy Preserving Based Multi-Biometric System for Secure Identification in Cloud EnvironmentNeural Processing Letters10.1007/s11063-021-10630-754:1(303-325)Online publication date: 1-Feb-2022
    • Show More Cited By

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media