Verifiable Delegation of Computation in the Setting of Privacy-Preserving Biometric Authentication Master of Science Thesis in Computer Systems and Networks

نویسنده

  • JING LIU
چکیده

Cloud computing has gained popularity due to the growth of internet and the number of devices. Although outsourcing computation tasks to the remote cloud come with great convenience, there are increasing concerns regarding data privacy and computation integrity since the cloud providers are external third parties. Verifiable computation (VC) is a mechanism to let the client verify the computation result returned by the cloud as an integrity guarantee, which can be widely applied in various scenarios of computation outsourcing. In this thesis work we focus specifically on the setting of biometric authentication systems, where a user is granted access to some service based on biometric templates matching. It is very important to preserve the privacy of these templates as they contain many private information. Privacy-preserving can be achieved by homomorphic encryption, where the computation server only stores and performs computations on encrypted templates. Yasuda et al. proposed a biometric authentication scheme based on such mechanism [3]. However, a template recovery attack was discovered in the scheme as a result of malicious computation server and lack of integrity check [4]. The goal of this theory-oriented thesis is to choose a suitable VC scheme and integrate it into the biometric authentication scheme by Yasuda et al. in order to counter the aforementioned attack. The outcome is a new scheme BVC that allows the client to verify the correctness of the result returned by the computation server while preserving the authentication functionalities and templates privacy. We provided a general scheme description, a protocol description showing the interaction of different parties, and more importantly the actual construction of BVC with security and correctness analyses. In addition, we reflected on the template recovery attack and showed that the order combining a VC and homomorphic encryption is very critical. We presented an attack algorithm for malicious cloud to comprise the privacy of the computation outcome if the order is done in a wrong way.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

On Privacy-Preserving Biometric Authentication

Biometric authentication is becoming increasingly popular as a convenient authentication method. However, the privacy and security issues associated with biometric authentication are very serious. Privacy-preserving biometric authentication addresses privacy concerns associated with the use of biometrics and offers a secure solution for user authentication. Given the tremendous expansion of wir...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Efficient Verifiable Computation of XOR for Biometric Authentication

This work addresses the security and privacy issues in remote biometric authentication by proposing an efficient mechanism to verify the correctness of the outsourced computation in such protocols. In particular, we propose an efficient verifiable computation of XORing encrypted messages using an XOR linear message authentication code (MAC) and we employ the proposed scheme to build a biometric...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015