An Efficient And Privacy Preserving Biometric Identification Scheme In Cloud Computing

K. R.Manasa Bindu, K. Charan Theja

Abstract


Biometric identification has become increasingly popular in recent years. With the developmentof cloud computing, database owners are motivated to outsource the large size of biometric data andidentification tasks to the cloud to get rid of the expensive storage and computation costs, which howeverbrings potential threats to users’ privacy. In this work, we propose an efficient and privacy-preservingbiometric identification outsourcing scheme. Specifically, the biometric data is encrypted and outsourcedto the cloud server. To execute a biometric identification, the database owner encrypts the query data andsubmits it to the cloud. The cloud performs identification operations over the encrypted database and returnsthe result to the database owner. A thorough security analysis indicates the proposed scheme is secure evenif attackers can forge identification requests and collude with the cloud. Compared with previous protocols,experimental results show the proposed scheme achieves a better performance in both preparation andidentification procedures.

 

Biometric identification has become increasingly popular in recent years. With the developmentof cloud computing, database owners are motivated to outsource the large size of biometric data andidentification tasks to the cloud to get rid of the expensive storage and computation costs, which howeverbrings potential threats to users’ privacy. In this work, we propose an efficient and privacy-preservingbiometric identification outsourcing scheme. Specifically, the biometric data is encrypted and outsourcedto the cloud server. To execute a biometric identification, the database owner encrypts the query data andsubmits it to the cloud. The cloud performs identification operations over the encrypted database and returnsthe result to the database owner. A thorough security analysis indicates the proposed scheme is secure evenif attackers can forge identification requests and collude with the cloud. Compared with previous protocols,experimental results show the proposed scheme achieves a better performance in both preparation andidentification procedures.

 

INTRODUCTION

What is cloud computing?

Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The name comes from the common use of a cloud-shaped symbol as an abstraction for the complex infrastructure it contains in system diagrams. Cloud computing entrusts remote services with a user's data, software and computation. Cloud computing consists of hardware and software resources made available on the Internet as managed third-party services. These services typically provide access to advanced software applications and high-end networks of server computers.






Copyright (c) 2019 Edupedia Publications Pvt Ltd

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

 

All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 


Paper submission: ijr@pen2print.org