Abstract
Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.
Similar content being viewed by others
References
Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: Application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041
Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357–383
Samer Atawneh, Ammar Almomani et al. (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl. Springer
Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. Ratio 80(1024):160–223
Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Alessandro Scotti (2010) Privacy-preserving fingercode authentication. Proc 12th ACM Workshop Multimed Sec, 231–240
Vinayak Ashok Bharadi and Godson Michael DSilva (2015) Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud. Proc IEEE Int Conf Comput Commun Contrl Automation (ICCUBEA), 65–72
Marina Blanton and Paolo Gasti (2011) Secure and Efficient Protocols for Iris and Fingerprint Identification. In Computer security–ESORICS2011, 190–209
Bringer J, Chabanne H, Kindarji B (2011) Identification with encrypted Biometrics data. Sec Commun Netw 4:548–562
Julien Bringer, Herve Chabanne, Alain Patey (2013) Practical identification with encrypted Biometrics data using oblivious ram. Proc IEEE Int Conf Biomet (ICB), 1–8
Julien Bringer, Hervé Chabanne, Alain Patey (2013) SHADE: Secure hamming distance computation from oblivious transfer. Fin Cryptograph Data Sec, 164–176. Springer
Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner (2014) GSHADE: Faster privacy-preserving distance computation and Biometrics identification. Proc 2nd ACM Workshop Inform Hiding Multimed Sec, 187–198
Ivan Damgård, and Mats Jurik (2001) A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proc 4th Int Workshop Pract Theory Publ Key Cryptograph: Public Key Cryptograph, 119–136
Daugman JG (1993) High confidence visual recognition of persons by test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161
Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft (2009) Privacy-preserving face recognition, In Privacy enhancing technologies, 5672 of the series Lecture Notes in Computer Science, 235–253. Springer
Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170
B. Ferreira; J. Rodrigues; J. Leitao; H. Domingos Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput (99), 1. doi: 10.1109/TCC.2017.2669999
Z. Fu; F. Huang; K. Ren; J. Weng; C. Wang Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inform Forensics Sec (99), 1
Gupta BB, Agrawal DP et al (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global Publisher, USA
Haghighata M, Zonouzb S, Abdel-Mottaleba M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst Appl 42(21):7905–7916
Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business Media
A. N. Jaber and Mohamad Fadli Bin Zolkipli (2013) Use of cryptography in cloud computing, Control System, Computing and Engineering (ICCSCE). IEEE Int Conf, Mindeb, 179–184
Jain AK, Pankanti S, Prabhakar Karthikeyan S, Lin H, Ross A (2004) Biometrics: a grand challenge. Proc 17th IEEE Int Conf Pattern Recognitn (ICPR) 2:935–942
Anil K. Jain, Arun Ross and Sharath Pankanti Biometrics: A tool for information security. IEEE Trans Inform Forensics Sec, 1, 125–143, 2006
Anil K. Jain, Arun A. Ross, Karthik Nandakumar (2011) Introduction to Biometrics, Springer Science & Business Media
P. Jain, D. Rane and S. Patidar (2011) A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment, Information and Communication Technologies (WICT), 2011 World Congress on, Mumbai, 456–461
Jegede A, Udzir NI, Abdullah A, Mahmod R (2015) Face Recognition and Template Protection with Shielding Function. International Journal of Security and Its Applications 9(12):149–164
Jianzhong Li (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. Springer
Li J, Liu Z et al (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26
Jin Li, Hongyang Yan, et al., Location-Sharing Systems with Enhanced Privacy in Mobile Online Social Networks, IEEE Systems Journal. DOI: 10.1109/JSYST.2015.2415835
Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987
Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich (2013) System for secure face identification (SCIFI) and methods useful in conjunction therewith. U.S. Patent No. 8,542,886
Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa (2014) On the leakage of information in Biometrics authentication. Progress Cryptol (INDOCRYPT2014), 265–280. Springer
Pascal Paillier (1999) Public-key cryptosystems based on composite degree residuosity classes. Adv Cryptol (EUROCRYPT99), 223–238. Springer
Philip J, Bharadi VA (2016) Dr., Signature Verification SaaS Implementation on Microsoft Azure Cloud. Proc Int Conf Communication, Comput Virtual (ICCCV) 2016 79:410–418
Phillips PJ, Moon H, Rauss PJ, Rizvi S (2000) The FERET evaluation methodology for face recognition algorithm. IEEE Trans Pattern Anal Mach Intell 22(10):1090–1104
Li Ping, Tong Li, Zheng-An Yao, Chun-Ming Tang, Jin Li (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput, 1–11
Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg (2009) Efficient privacy-preserving face recognition. Inform, Sec Cryptol (ICISC-2009), 229–244
Lorenz Schauer, Florian Dorfmeister, Florian Wirth (2016) Analyzing passive Wi-Fi fingerprinting for privacy-preserving indoor-positioning. Proc IEEE Int Conf Local GNSS (ICL-GNSS), 1–6
Shu T, Chen Y, Yang J (2015) Protecting Multi-Lateral Localization Privacy in Pervasive Environments. IEEE/ACM Trans Network (TON) 23(5):1688–1701
Sowmya R, Ezhilarasu P, Satheesh Kumar D, Manoj Prabhakar J (2015) A Survey on Data Security Using Identity Based Encryption in Cloud Computing. Int J Appl Inform Commun Eng 1(11):3–4
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Sun Y, Wen Q, Zhang Y, Li W (2014) Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Computational and Mathematical Methods in Medicine 2014:1–9
Suryadevara S, Kapoor S, Dhatterwal S, Naaz R, Sharma A. (2011) Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security. Int Conf Inform Network Technol 4
Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environment. IEEE Sec Privacy 8(6):24–31
M. A. Turk, A. Pentland (1991) Face recognition using eigenfaces. Proc IEEE Comput Soc Conf Comput Vision Pattern Recogn (CVPR), 586–591
Turk MA, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3:71–86
Víctor GM, Luis HE, Carmen SÁ, Katiyar V, Dutta K, Gupta S (2010) A survey on elliptic curve cryptography for pervasive computing environment. J Comput Sci Eng 2(2):7–13
Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision, 1 57(2):137–154
Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148
Xiaoshan Wang; Yao Liu; Zhiqiang Shi; Xiang Lu; Limin Sun (2015) A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. Proc IEEE Int Conf Global Commun Conf (GLOBECOM), 1–6
Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Europ Symp Res Comput Sec, 186–205. Springer International Publishing
Wang Y, Wu Q, Qin B, Tang S, Susilo W (2017) Online/Offline Provable Data Possession. IEEE Trans Inform Forensics Sec 12:1182–1194 ISSN 1556-6013
Zhihua Xia, et al, A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inform Forensics Sec, vol. 11, no. 11, pp. 2594–2608, 2016
Xia Z et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962
Yu Y et al (2017) Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans Inform Forensics Sec 12(4):767–778. doi:10.1109/TIFS.2016.2615853
Jiawei Yuan, and Shucheng Yu (2013) Efficient privacy-preserving biometric identification in cloud computing. Proc IEEE Int Conf INFOCOM, 2652–2660
Youwen Zhu, Zhikuan Wang, Yue Zhang (2016) Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. Pacific-Asia Conf Knowledge Discov Data Mining, 401–414. Springer International Publishing
Zhu Y, Huang Z, Takagi T (2016) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kumar, S., Singh, S.K., Singh, A.K. et al. Privacy preserving security using biometrics in cloud computing. Multimed Tools Appl 77, 11017–11039 (2018). https://doi.org/10.1007/s11042-017-4966-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-017-4966-5