Techniques for Privacy Preservation

Aswini Prasad, Mount Zion College of Engineering

biometric encryption ,cancelable biometric, hybrid based, multimode, secure computation.

A form of biometrics, also called Biometric Encryption or BioCryptics, in which the proves is protected against the misuse of template data by a dishonest verifier. Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to impersonate people. Creation of artificial biometrics is possible even if only part of the template is available. To develop an insight in the security aspects of biometrics, one can distinguish between verification and private verification. In a typical verification situation, access to the reference template allows a malicious verifier to artificially construct measurement data that will pass the verification test, even if the prover has never exposed herself to a biometric measurement after the enrollment. In private verification, the reference data should not leak relevant information to allow the verifier to (effectively) construct valid measurement data. Such protection is common practice for storage of computer passwords. When a computer verifies a password, it does not compare the password typed by the user with a stored reference copy. Instead, the password is processed by a cryptographic one-way function F and the outcome is compared against a locally stored reference string F(y ). So y is only temporarily available on the system hardware, and no stored data allows calculation of y. This prevents attacks from the inside by stealing unencrypted or decrypt able secrets. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioural attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancel able biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes.
    [1] Iynkaran natgunanathan, abid nmehmood, yong xiang, (Senior dmember, IEEE),gleb beliakov, gsenior member, ieee), and john vbyearwoodGProtection of Privacy in BiometricDataSchool of Information Technology, Deakin University, HJGeelong, VIC 3220, AustraliaCorresponding author: Y. F) [2] JHandbook of Biometrics. A. K. Jain, P. Flynn, and A. A. Ross, New York,GNY, USA: Springer, 2008. [3] R. Belguechi, E. Cherrier, V. BNAlimi, P. Lacharme, and C. BNAn Overview on Privacy BNPreserving Biometrics. Rijeka, Croatia: InTech,2011. [4] N. K. Ratha, J. H. Connell, and R. M. Bolle, ``Enhancing security andprivacy in biometrics-basedVauthentication systems,'' IBM Syst. J., Bvol. 40,no. 3, pp. 614_634, Apr.2001 [5] C. Rathgeb and A. Uhl, ``A survey on biometric cryptosystems and cancelable biometrics''EURASIP J. Inf. Secur., p. 3, Sep. 2011 [6] S. Rane, Y. Wang, S. C. Draper, and P. Ishwar, ``Secure biometrics:Concepts, authentication architectures and challenges,'' IEEE Signal Process.Mag., vol. 30, no. 5, pp. 51_64, Sep. 2013. [7] J. Bringer, H. Chabanne, and A. Patey, ``Privacy-preserving biometricidentification using secure multiparty computation: An overview and recent trends,'' IEEE Signal Process. Mag., vol. 30, no. 2, pp. 42_52, Mar. 2013. [8] A. Cavoukian and A. Stoianov, ``Biometric encryption,'' Encyclopedia ofCryptography and Security. New York, NY, USA: Springer, 2009.
Paper ID: GRDJEV02I010043
Published in: Volume : 2, Issue : 1
Publication Date: 2017-01-01
Page(s): 66 - 70