Cloud Services with A Biometric Authentication Method And Privacy Protection



In recent years, biometric identification has grown in popularity. With the rise of cloud computing, database owners are compelled to outsource huge amounts of biometric data and identification chores to the cloud in order to save money on storage and processing, but this poses a risk to users' privacy. We provide a biometric identification outsourcing method that is both efficient and private. Biometric information is encrypted and sent to a cloud server. The database owner encrypts the query data before sending it to the cloud to perform biometric identification. The cloud conducts ID operations over the encrypted database and provides the results to the owner of the database. A careful security analysis shows that the approach suggested is safe even if attackers can make identity requests and collaborate with the cloud. The suggested system provides higher performance in both preparation and identification operations in comparison with the prior protocols.


Cloud Computing; Data Outsourcing; Privacy-Preserving;


X. Du and H. H. Chen, “Security in wireless sensor networks,” IEEE Wireless Communications Magazine, vol. 15, no. 4, pp. 60-66, 2008.

R. Allen, P. Sankar and S. Prabhakar, “Fingerprint identification technology,” Biometric Systems, pp. 22-61, 2005.

J. de Mira, H. Neto, E. Neves, et al., “Biometric-oriented Iris Identification Based on Mathematical Morphology,” Journal of Signal Processing Systems, vol. 80, no. 2, pp. 181-195, 2015.

S. Romdhani, V. Blanz and T. Vetter, “Face identification by fitting a 3d morphable model using linear shape and texture error functions,” in European Conference on Computer Vision, pp. 3-19, 2002.

S. Pan, S. Yan, and W. Zhu, “Security analysis on privacy-preserving cloud aided biometric identification schemes,” in Australasian Conference on Information Security and Privacy, pp. 446-453, 2016.

C. Zhang, L. Zhu and C. Xu, “PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud,” Information Sciences, vol. 409, pp. 56-67, 2017.

Full Text: PDF


  • There are currently no refbacks.

Copyright © 2012 - 2023, All rights reserved.|

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at