POSTER: Towards privacy-preserving biometric identification in cloud computing

Changhee Hahn, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.

Original languageEnglish
Title of host publicationCCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1826-1828
Number of pages3
ISBN (Electronic)9781450341394
DOIs
Publication statusPublished - 2016 Oct 24
Event23rd ACM Conference on Computer and Communications Security, CCS 2016 - Vienna, Austria
Duration: 2016 Oct 242016 Oct 28

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
Volume24-28-October-2016
ISSN (Print)1543-7221

Conference

Conference23rd ACM Conference on Computer and Communications Security, CCS 2016
CountryAustria
CityVienna
Period16/10/2416/10/28

Fingerprint

Biometrics
Cloud computing
Identification (control systems)

Keywords

  • Biometric identification
  • Cloud
  • Privacy

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Cite this

Hahn, C., & Hur, J. (2016). POSTER: Towards privacy-preserving biometric identification in cloud computing. In CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1826-1828). (Proceedings of the ACM Conference on Computer and Communications Security; Vol. 24-28-October-2016). Association for Computing Machinery. https://doi.org/10.1145/2976749.2989048

POSTER : Towards privacy-preserving biometric identification in cloud computing. / Hahn, Changhee; Hur, Junbeom.

CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2016. p. 1826-1828 (Proceedings of the ACM Conference on Computer and Communications Security; Vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hahn, C & Hur, J 2016, POSTER: Towards privacy-preserving biometric identification in cloud computing. in CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Proceedings of the ACM Conference on Computer and Communications Security, vol. 24-28-October-2016, Association for Computing Machinery, pp. 1826-1828, 23rd ACM Conference on Computer and Communications Security, CCS 2016, Vienna, Austria, 16/10/24. https://doi.org/10.1145/2976749.2989048
Hahn C, Hur J. POSTER: Towards privacy-preserving biometric identification in cloud computing. In CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery. 2016. p. 1826-1828. (Proceedings of the ACM Conference on Computer and Communications Security). https://doi.org/10.1145/2976749.2989048
Hahn, Changhee ; Hur, Junbeom. / POSTER : Towards privacy-preserving biometric identification in cloud computing. CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, 2016. pp. 1826-1828 (Proceedings of the ACM Conference on Computer and Communications Security).
@inproceedings{6d645af716bc4ac59989742f080d4271,
title = "POSTER: Towards privacy-preserving biometric identification in cloud computing",
abstract = "Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.",
keywords = "Biometric identification, Cloud, Privacy",
author = "Changhee Hahn and Junbeom Hur",
year = "2016",
month = "10",
day = "24",
doi = "10.1145/2976749.2989048",
language = "English",
series = "Proceedings of the ACM Conference on Computer and Communications Security",
publisher = "Association for Computing Machinery",
pages = "1826--1828",
booktitle = "CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security",

}

TY - GEN

T1 - POSTER

T2 - Towards privacy-preserving biometric identification in cloud computing

AU - Hahn, Changhee

AU - Hur, Junbeom

PY - 2016/10/24

Y1 - 2016/10/24

N2 - Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.

AB - Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.

KW - Biometric identification

KW - Cloud

KW - Privacy

UR - http://www.scopus.com/inward/record.url?scp=84995467639&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84995467639&partnerID=8YFLogxK

U2 - 10.1145/2976749.2989048

DO - 10.1145/2976749.2989048

M3 - Conference contribution

AN - SCOPUS:84995467639

T3 - Proceedings of the ACM Conference on Computer and Communications Security

SP - 1826

EP - 1828

BT - CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security

PB - Association for Computing Machinery

ER -