POSTER: Towards privacy-preserving biometric identification in cloud computing

Changhee Hahn, Junbeom Hur

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.

Original languageEnglish
Title of host publicationCCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages1826-1828
Number of pages3
ISBN (Electronic)9781450341394
DOIs
Publication statusPublished - 2016 Oct 24
Event23rd ACM Conference on Computer and Communications Security, CCS 2016 - Vienna, Austria
Duration: 2016 Oct 242016 Oct 28

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
Volume24-28-October-2016
ISSN (Print)1543-7221

Conference

Conference23rd ACM Conference on Computer and Communications Security, CCS 2016
CountryAustria
CityVienna
Period16/10/2416/10/28

Keywords

  • Biometric identification
  • Cloud
  • Privacy

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'POSTER: Towards privacy-preserving biometric identification in cloud computing'. Together they form a unique fingerprint.

  • Cite this

    Hahn, C., & Hur, J. (2016). POSTER: Towards privacy-preserving biometric identification in cloud computing. In CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 1826-1828). (Proceedings of the ACM Conference on Computer and Communications Security; Vol. 24-28-October-2016). Association for Computing Machinery. https://doi.org/10.1145/2976749.2989048