Title | ||
---|---|---|
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. |
Abstract | ||
---|---|---|
Biometric identification BI is the task of searching a pre-established biometric database to find a matching record for an enquiring biometric trait sampled from an unknown individual of interest. This has recently been aided with cloud computing, which brings a lot of convenience but simultaneously arouses new privacy concerns. Two cloud aided BI schemes pursuing privacy preserving have recently been proposed by Wang et al. in ESORICS '15. In this paper, we propose several elaborately designed attacks to reveal the security breaches in these two schemes. Theoretical analysis is given to validate our proposed attacks, which indicates that via such attacks the cloud server can accurately infer the outsourced database and the identification request. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-319-40367-0_29 | ACISP |
Field | DocType | Citations |
Computer security,Computer science,Security analysis,Cloud computing security,Biometrics,Cloud computing | Conference | 3 |
PageRank | References | Authors |
0.39 | 10 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Shiran Pan | 1 | 3 | 0.73 |
Shen Yan | 2 | 3 | 1.07 |
Wen Tao Zhu | 3 | 394 | 28.62 |