Security analysis on privacy-preserving cloud aided biometric identification schemes

15Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Biometric identification (BI) is the task of searching a preestablished biometric database to find a matching record for an enquiring biometric trait sampled from an unknown individual of interest. This has recently been aided with cloud computing, which brings a lot of convenience but simultaneously arouses new privacy concerns. Two cloud aided BI schemes pursuing privacy preserving have recently been proposed by Wang et al. in ESORICS '15. In this paper, we propose several elaborately designed attacks to reveal the security breaches in these two schemes. Theoretical analysis is given to validate our proposed attacks, which indicates that via such attacks the cloud server can accurately infer the outsourced database and the identification request.

Cite

CITATION STYLE

APA

Pan, S., Yan, S., & Zhu, W. T. (2016). Security analysis on privacy-preserving cloud aided biometric identification schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9723, pp. 446–453). Springer Verlag. https://doi.org/10.1007/978-3-319-40367-0_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free