Skip to main content
Log in

Cloud-assisted secure biometric identification with sub-linear search efficiency

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Cloud computing has been one of the critical solutions to reduce heavy storage and computation burden of biometric identification. To protect the privacy of biometric data against untrusted cloud servers, outsourced biometric databases are usually encrypted by users. Performing biometric identification over encrypted data without revealing privacy to cloud servers attracts more and more attention. Several secure biometric identification solutions have been proposed to solve this challenging problem. However, these schemes still suffer from various limitations, such as low search efficiency and heavy computation burden on users. In this paper, we propose a novel cloud-assisted biometric identification scheme based on the asymmetric scalar-product preserving encryption (ASPE) and spatial data structures such as the R-tree index, which simultaneously achieves sub-linear search efficiency and low computation burden on users. Specifically, we construct an R-tree index on the biometric dataset and encrypt the index with ASPE. Then we modify the original search algorithm in the R-tree index and design a secure search algorithm based on ASPE to find the nearest neighbor result over the encrypted R-tree index. Through theoretical analysis and extensive experiments, we demonstrate the effectiveness and efficiency of our proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  • Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960

    Article  Google Scholar 

  • Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18(9):509–517

    Article  MathSciNet  MATH  Google Scholar 

  • Bertolacci IJ, Strout MM, Riley J, Guzik SM, Davis EC, Olschanowsky C (2019) Using the loop chain abstraction to schedule across loops in existing code. Int J High Perform Comput Netw 13(1):86–104

    Article  Google Scholar 

  • Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European symposium on research in computer security. Springer, pp 190–209

  • Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order-preserving symmetric encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 224–241

  • Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, pp 401–412

  • Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934

    Article  Google Scholar 

  • Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th international conference on data engineering (ICDE). IEEE, pp 664–675

  • Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey

    Book  Google Scholar 

  • Gupta S, Gupta BB (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput IJCAC 7(3):1–43

    Google Scholar 

  • Guttman A (1984) R-trees: a dynamic index structure for spatial searching. ACM, New York

    Google Scholar 

  • Hossain K, Rahman M, Roy S (2019) Iot data compression and optimization techniques in cloud storage: current prospects and future directions. Int J Cloud Appl Comput IJCAC 9(2):43–59

    Google Scholar 

  • Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:596–606

    Article  Google Scholar 

  • Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inf Forensics Secur 13(10):2448–2463

    Article  Google Scholar 

  • Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the 17th conference network and distributed system security symposium, pp 130–150

  • Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859

    Article  Google Scholar 

  • Kim HI, Kim HJ, Chang JW (2017) A secure kNN query processing algorithm using homomorphic encryption on outsourced database. In: Chen PP (ed) Data & knowledge engineering. Elsevier, Amsterdam. https://doi.org/10.1016/j.datak.2017.07.005

    Chapter  Google Scholar 

  • Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26

    Article  Google Scholar 

  • Li X, Zhu Y, Wang J (2016) Secure naïve Bayesian classification over encrypted data in cloud. In: International conference on provable security. Springer, pp 130–150

  • Li X, Zhu Y, Wang J (2017) Efficient encrypted data comparison through a hybrid method. J Inf Sci Eng 33(4):953–964

    MathSciNet  Google Scholar 

  • Li B, Huang Y, Liu Z, Li J, Tian Z, Yiu SM (2018a) Hybridoram: practical oblivious cloud storage with constant bandwidth. In: Pedrycz W (ed) Information sciences. Elsevier, Amsterdam. https://doi.org/10.1016/j.ins.2018.02.019

    Chapter  Google Scholar 

  • Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018b) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96

    Article  Google Scholar 

  • Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018c) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform 14(7):3216–3225

    Article  Google Scholar 

  • Li X, Zhu Y, Wang J, Liu Z, Liu Y, Zhang M (2018d) On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Trans Dependable Secure Comput 15(5):906–912

    Article  Google Scholar 

  • Li X, Zhu Y, Wang J, Zhang J (2019) Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel Distrib Comput 131(5):44–54

    Article  Google Scholar 

  • Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640

    Article  Google Scholar 

  • Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J Biomed Health Inform 20(2):655–668

    Article  Google Scholar 

  • Liu X, Choo KR, Deng RH, Lu R, Weng J (2018a) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39

    Article  Google Scholar 

  • Liu Z, Huang Y, Li J, Cheng X, Shen C (2018b) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11

    Article  Google Scholar 

  • Manolopoulos Y, Nanopoulos A, Papadopoulos AN, Theodoridis Y (2010) R-trees: theory and applications. Springer, Berlin

    MATH  Google Scholar 

  • Negi P, Mishra A, Gupta B (2013) Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. Int J Comput Sci Issues IJCSI 10(2 Part 1):142

    Google Scholar 

  • Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357

    Article  Google Scholar 

  • Preparata FP, Shamos MI (2012) Computational geometry: an introduction. Springer, Berlin

    MATH  Google Scholar 

  • Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput IJCAC 9(1):33–49

    Google Scholar 

  • Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018a) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123

    Article  Google Scholar 

  • Shen J, Wang C, Li T, Chen X, Huang X, Zhan Z (2018b) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197

    Article  Google Scholar 

  • Shen J, Zhou T, Chen X, Li J, Susilo W (2018c) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925

    Article  Google Scholar 

  • Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975

    Article  Google Scholar 

  • Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: European symposium on research in computer security. Springer, pp 186–205

  • Wang B, Hou Y, Li M (2016) Practical and secure nearest neighbor search on encrypted large-scale data. In: The annual IEEE international conference on computer communications. IEEE, pp 1–9

  • Wang Z, Ye J, Wang J (2018) An efficient traceable data sharing scheme in cloud computing for mobile devices. Int J High Perform Comput Netw 12(2):156–165

    Article  Google Scholar 

  • Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 139–152

  • Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918

    Article  Google Scholar 

  • Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2016b) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433:431–447

    Google Scholar 

  • Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744

    Article  Google Scholar 

  • Xu J, Wei L, Zhang Y, Wang A, Zhou F, Cz Gao (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124

    Article  Google Scholar 

  • Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99

    Article  Google Scholar 

  • Yao B, Li F, Xiao X (2013) Secure nearest neighbor revisited. In: IEEE 29th international conference on data engineering (ICDE). IEEE, pp 733–744

  • Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: The annual IEEE international conference on computer communications. IEEE, pp 2652–2660

  • Zhang C, Zhu L, Xu C (2017a) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67

    Article  Google Scholar 

  • Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017b) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Article  MATH  Google Scholar 

  • Zhang X, Tan Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access 6:9292–9302

    Article  Google Scholar 

  • Zhu Y, Xu R, Takagi T (2013a) Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 55–60

  • Zhu Y, Xu R, Takagi T (2013b) Secure k-NN query on encrypted cloud database without key-sharing. Int J Electron Secur Digit Forensics 5(3–4):201–217

    Article  Google Scholar 

  • Zhu Y, Huang Z, Takagi T (2016a) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12

    Article  Google Scholar 

  • Zhu Y, Wang Z, Wang J (2016b) Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. In: International symposium on quality of service (IWQoS). IEEE, pp 1–6

Download references

Acknowledgements

This work is partly supported by the National Key Research and Development Program of China (No. 2017YFB0802300), the Natural Science Foundation of China (No. 61602240), the Natural Science Foundation of Jiangsu Province of China (No. BK20150760), Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201723) and the Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. KYCX18_0305).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xingxin Li or Jian Wang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed consent

Informed consent was obtained from all individual participants included in the study.

Additional information

Communicated by B. B. Gupta.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhu, Y., Li, X., Wang, J. et al. Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24, 5885–5896 (2020). https://doi.org/10.1007/s00500-019-04401-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-019-04401-9

Keywords

Navigation