POSTER: Towards privacy-preserving biometric identification in cloud computing

Changhee Hahn, Junbeom Hur

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)

    Abstract

    Wang et al. recently proposed a privacy-preserving biometric identification scheme. However, the security assumption of the scheme does not capture practical aspects of real world attacks. In this paper, we consider a practical attack model which results in the leakage of biometric data in Wang et al.'s scheme. We first show the feasibility of our attack model and demonstrate how an attacker is able to recover the biometric data. Then, we propose a new biometric identification scheme that is secure against the attack model.

    Original languageEnglish
    Title of host publicationCCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
    PublisherAssociation for Computing Machinery
    Pages1826-1828
    Number of pages3
    ISBN (Electronic)9781450341394
    DOIs
    Publication statusPublished - 2016 Oct 24
    Event23rd ACM Conference on Computer and Communications Security, CCS 2016 - Vienna, Austria
    Duration: 2016 Oct 242016 Oct 28

    Publication series

    NameProceedings of the ACM Conference on Computer and Communications Security
    Volume24-28-October-2016
    ISSN (Print)1543-7221

    Conference

    Conference23rd ACM Conference on Computer and Communications Security, CCS 2016
    Country/TerritoryAustria
    CityVienna
    Period16/10/2416/10/28

    Bibliographical note

    Funding Information:
    This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MSIP) (No. 2016R1A2A2A05005402).

    Keywords

    • Biometric identification
    • Cloud
    • Privacy

    ASJC Scopus subject areas

    • Software
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'POSTER: Towards privacy-preserving biometric identification in cloud computing'. Together they form a unique fingerprint.

    Cite this