An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing

0
1316
An Efficient and Privacy Preserving Biometric Identification Scheme in Cloud Computing

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing

Abstract

In recent years, biometric identification has become increasingly popular. With the development of cloud computing, database owners are motivated to outsource the large size of biometric data and identification tasks to the cloud to get rid of the expensive storage and computation costs, which however brings potential threats to the privacy of users. In this An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing paper, we propose an outsourcing scheme for biometric identification that is efficient and safeguarding privacy.

Introduction

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing has increasingly attracted attention as it provides a promising way to identify users. In a biometric identification system, database owner such as the FBI responsible for managing the national fingerprint database may want to outsource huge biometric data to the cloud server (e.g., Amazon) to get rid of expensive storage and computation costs.

System Configuration

H/W System Configuration
Speed                   : 1.1 GHz
RAM                      : 256 MB(min)
Hard Disk              : 20 GB
Floppy Drive          : 1.44 MB
Key Board             : Standard Windows Keyboard
Mouse                  : Two or Three Button Mouse
Monitor                : SVGA
S/W System Configuration

Platform                     :  cloud computing

Operating system       : Windows Xp,7,
Server                       : WAMP/Apache
Working on                : Browser Like Firefox, IE

Conclusion

We proposed a novel privacy-preserving biometric identification scheme in cloud computing in this paper. We have designed a new encryption algorithm and cloud authentication certification to realize the efficiency and secure requirements. The detailed analysis shows the potential attacks can be resisted. In addition, through performance evaluations, we further demonstrated that the proposed scheme meets well the need for efficiency.