Abstract
Cloud computing has been one of the critical solutions to reduce heavy storage and computation burden of biometric identification. To protect the privacy of biometric data against untrusted cloud servers, outsourced biometric databases are usually encrypted by users. Performing biometric identification over encrypted data without revealing privacy to cloud servers attracts more and more attention. Several secure biometric identification solutions have been proposed to solve this challenging problem. However, these schemes still suffer from various limitations, such as low search efficiency and heavy computation burden on users. In this paper, we propose a novel cloud-assisted biometric identification scheme based on the asymmetric scalar-product preserving encryption (ASPE) and spatial data structures such as the R-tree index, which simultaneously achieves sub-linear search efficiency and low computation burden on users. Specifically, we construct an R-tree index on the biometric dataset and encrypt the index with ASPE. Then we modify the original search algorithm in the R-tree index and design a secure search algorithm based on ASPE to find the nearest neighbor result over the encrypted R-tree index. Through theoretical analysis and extensive experiments, we demonstrate the effectiveness and efficiency of our proposed approach.
Similar content being viewed by others
References
Akyildiz IF, Melodia T, Chowdhury KR (2007) A survey on wireless multimedia sensor networks. Comput Netw 51(4):921–960
Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18(9):509–517
Bertolacci IJ, Strout MM, Riley J, Guzik SM, Davis EC, Olschanowsky C (2019) Using the loop chain abstraction to schedule across loops in existing code. Int J High Perform Comput Netw 13(1):86–104
Blanton M, Gasti P (2011) Secure and efficient protocols for iris and fingerprint identification. In: European symposium on research in computer security. Springer, pp 190–209
Boldyreva A, Chenette N, Lee Y, O’neill A (2009) Order-preserving symmetric encryption. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 224–241
Chun H, Elmehdwi Y, Li F, Bhattacharya P, Jiang W (2014) Outsourceable two-party privacy-preserving biometric authentication. In: Proceedings of the 9th ACM symposium on information, computer and communications security. ACM, pp 401–412
Curtmola R, Garay J, Kamara S, Ostrovsky R (2011) Searchable symmetric encryption: improved definitions and efficient constructions. J Comput Secur 19(5):895–934
Elmehdwi Y, Samanthula BK, Jiang W (2014) Secure k-nearest neighbor query over encrypted data in outsourced environments. In: IEEE 30th international conference on data engineering (ICDE). IEEE, pp 664–675
Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey
Gupta S, Gupta BB (2017) Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: present and future challenges. Int J Cloud Appl Comput IJCAC 7(3):1–43
Guttman A (1984) R-trees: a dynamic index structure for spatial searching. ACM, New York
Hossain K, Rahman M, Roy S (2019) Iot data compression and optimization techniques in cloud storage: current prospects and future directions. Int J Cloud Appl Comput IJCAC 9(2):43–59
Hossain MS, Muhammad G, Abdul W, Song B, Gupta B (2018) Cloud-assisted secure video transmission and sharing framework for smart cities. Future Gener Comput Syst 83:596–606
Hu S, Li M, Wang Q, Chow SS, Du M (2018) Outsourced biometric identification with privacy. IEEE Trans Inf Forensics Secur 13(10):2448–2463
Huang Y, Malka L, Evans D, Katz J (2011) Efficient privacy-preserving biometric identification. In: Proceedings of the 17th conference network and distributed system security symposium, pp 130–150
Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859
Kim HI, Kim HJ, Chang JW (2017) A secure kNN query processing algorithm using homomorphic encryption on outsourced database. In: Chen PP (ed) Data & knowledge engineering. Elsevier, Amsterdam. https://doi.org/10.1016/j.datak.2017.07.005
Li J, Liu Z, Chen X, Xhafa F, Tan X, Wong DS (2015) L-EncDB: a lightweight framework for privacy-preserving data queries in cloud computing. Knowl Based Syst 79:18–26
Li X, Zhu Y, Wang J (2016) Secure naïve Bayesian classification over encrypted data in cloud. In: International conference on provable security. Springer, pp 130–150
Li X, Zhu Y, Wang J (2017) Efficient encrypted data comparison through a hybrid method. J Inf Sci Eng 33(4):953–964
Li B, Huang Y, Liu Z, Li J, Tian Z, Yiu SM (2018a) Hybridoram: practical oblivious cloud storage with constant bandwidth. In: Pedrycz W (ed) Information sciences. Elsevier, Amsterdam. https://doi.org/10.1016/j.ins.2018.02.019
Li J, Chen X, Chow SS, Huang Q, Wong DS, Liu Z (2018b) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96
Li J, Sun L, Yan Q, Li Z, Srisa-an W, Ye H (2018c) Significant permission identification for machine learning based android malware detection. IEEE Trans Ind Inform 14(7):3216–3225
Li X, Zhu Y, Wang J, Liu Z, Liu Y, Zhang M (2018d) On the soundness and security of privacy-preserving SVM for outsourcing data classification. IEEE Trans Dependable Secure Comput 15(5):906–912
Li X, Zhu Y, Wang J, Zhang J (2019) Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J Parallel Distrib Comput 131(5):44–54
Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An ID-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640
Liu X, Lu R, Ma J, Chen L, Qin B (2016) Privacy-preserving patient-centric clinical decision support system on naïve Bayesian classification. IEEE J Biomed Health Inform 20(2):655–668
Liu X, Choo KR, Deng RH, Lu R, Weng J (2018a) Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27–39
Liu Z, Huang Y, Li J, Cheng X, Shen C (2018b) DivORAM: towards a practical oblivious RAM with variable block size. Inf Sci 447:1–11
Manolopoulos Y, Nanopoulos A, Papadopoulos AN, Theodoridis Y (2010) R-trees: theory and applications. Springer, Berlin
Negi P, Mishra A, Gupta B (2013) Enhanced CBF packet filtering method to detect DDoS attack in cloud computing environment. Int J Comput Sci Issues IJCSI 10(2 Part 1):142
Plageras AP, Psannis KE, Stergiou C, Wang H, Gupta BB (2018) Efficient IoT-based sensor big data collection-processing and analysis in smart buildings. Future Gener Comput Syst 82:349–357
Preparata FP, Shamos MI (2012) Computational geometry: an introduction. Springer, Berlin
Sambrekar K, Rajpurohit VS (2019) Fast and efficient multiview access control mechanism for cloud based agriculture storage management system. Int J Cloud Appl Comput IJCAC 9(1):33–49
Shen J, Gui Z, Ji S, Shen J, Tan H, Tang Y (2018a) Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J Netw Comput Appl 106:117–123
Shen J, Wang C, Li T, Chen X, Huang X, Zhan Z (2018b) Secure data uploading scheme for a smart home system. Inf Sci 453:186–197
Shen J, Zhou T, Chen X, Li J, Susilo W (2018c) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925
Stergiou C, Psannis KE, Kim BG, Gupta B (2018) Secure integration of IoT and cloud computing. Future Gener Comput Syst 78:964–975
Wang Q, Hu S, Ren K, He M, Du M, Wang Z (2015) CloudBI: practical privacy-preserving outsourcing of biometric identification in the cloud. In: European symposium on research in computer security. Springer, pp 186–205
Wang B, Hou Y, Li M (2016) Practical and secure nearest neighbor search on encrypted large-scale data. In: The annual IEEE international conference on computer communications. IEEE, pp 1–9
Wang Z, Ye J, Wang J (2018) An efficient traceable data sharing scheme in cloud computing for mobile devices. Int J High Perform Comput Netw 12(2):156–165
Wong WK, Cheung DWl, Kao B, Mamoulis N (2009) Secure kNN computation on encrypted databases. In: Proceedings of the ACM SIGMOD international conference on management of data. ACM, pp 139–152
Wu Z, Liang B, You L, Jian Z, Li J (2016a) High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia. Soft Comput 20(12):4907–4918
Wu Z, Tian L, Li P, Wu T, Jiang M, Wu C (2016b) Generating stable biometric keys for flexible cloud computing authentication using finger vein. Inf Sci 433:431–447
Xiang C, Tang C, Cai Y, Xu Q (2016) Privacy-preserving face recognition with outsourced computation. Soft Comput 20(9):3735–3744
Xu J, Wei L, Zhang Y, Wang A, Zhou F, Cz Gao (2018) Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J Netw Comput Appl 107:113–124
Yang L, Han Z, Huang Z, Ma J (2018) A remotely keyed file encryption scheme under mobile cloud computing. J Netw Comput Appl 106:90–99
Yao B, Li F, Xiao X (2013) Secure nearest neighbor revisited. In: IEEE 29th international conference on data engineering (ICDE). IEEE, pp 733–744
Yuan J, Yu S (2013) Efficient privacy-preserving biometric identification in cloud computing. In: The annual IEEE international conference on computer communications. IEEE, pp 2652–2660
Zhang C, Zhu L, Xu C (2017a) PTBI: an efficient privacy-preserving biometric identification based on perturbed term in the cloud. Inf Sci 409:56–67
Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017b) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61
Zhang X, Tan Y, Li J (2018) A covert channel over volte via adjusting silence periods. IEEE Access 6:9292–9302
Zhu Y, Xu R, Takagi T (2013a) Secure k-NN computation on encrypted cloud data without sharing key with query users. In: Proceedings of the 2013 international workshop on security in cloud computing. ACM, pp 55–60
Zhu Y, Xu R, Takagi T (2013b) Secure k-NN query on encrypted cloud database without key-sharing. Int J Electron Secur Digit Forensics 5(3–4):201–217
Zhu Y, Huang Z, Takagi T (2016a) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12
Zhu Y, Wang Z, Wang J (2016b) Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited. In: International symposium on quality of service (IWQoS). IEEE, pp 1–6
Acknowledgements
This work is partly supported by the National Key Research and Development Program of China (No. 2017YFB0802300), the Natural Science Foundation of China (No. 61602240), the Natural Science Foundation of Jiangsu Province of China (No. BK20150760), Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201723) and the Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. KYCX18_0305).
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Informed consent
Informed consent was obtained from all individual participants included in the study.
Additional information
Communicated by B. B. Gupta.
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhu, Y., Li, X., Wang, J. et al. Cloud-assisted secure biometric identification with sub-linear search efficiency. Soft Comput 24, 5885–5896 (2020). https://doi.org/10.1007/s00500-019-04401-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-019-04401-9