Multimodal biometric authentication for mobile edge computing

Abstract In this paper, we describe a novel Privacy Preserving Biometric Authentication (PPBA) system designed for Mobile Edge Computing (MEC) and multimodal biometrics. We focus on hill climbing attacks that reveal biometric templates to insider adversaries despite the encrypted storage in the cloud. First, we present an impossibility result on the existence of two-party PPBA systems that are resistant to these attacks. To overcome this negative result, we add a non-colluding edge server for detecting hill climbing attacks both in semi-honest and malicious model. The edge server that stores each user’s secret parameters enables to outsource the biometric database to the cloud and perform matching in the encrypted domain. The proposed system combines Set Overlap and Euclidean Distance metrics using score level fusion. Here, both the cloud and edge servers cannot learn the fused matching score. Moreover, the edge server is prevented from accessing any partial score. The efficiency of the crypto-primitives employed for each biometric modality results in linear computation and communication overhead. Under different MEC scenarios, the new system is found to be most efficient with a 2-tier architecture, which achieves %75 lower latency compared to mobile cloud computing.

[1]  Qing Yang,et al.  Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones , 2016, IEEE Transactions on Information Forensics and Security.

[2]  Julian Fiérrez,et al.  Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..

[3]  Philip Ogunbona,et al.  Private Fingerprint Matching , 2012, ACISP.

[4]  Wendi B. Heinzelman,et al.  Cloud-Vision: Real-time face recognition using a mobile-cloudlet-cloud acceleration architecture , 2012, 2012 IEEE Symposium on Computers and Communications (ISCC).

[5]  Katherine Guo,et al.  Cachier: Edge-Caching for Recognition Applications , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[6]  Jason P. Jue,et al.  All One Needs to Know about Fog Computing and Related Edge Computing Paradigms , 2019 .

[7]  Benny Pinkas,et al.  Efficient Set Intersection with Simulation-Based Security , 2014, Journal of Cryptology.

[8]  David Pointcheval,et al.  Functional Encryption with Oblivious Helper , 2017, AsiaCCS.

[9]  Neyire Deniz Sarier Privacy Preserving Multimodal Biometric Authentication in the Cloud , 2017, GPC.

[10]  Angelo De Caro,et al.  Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..

[11]  Keke Gai,et al.  An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments , 2021, IEEE Transactions on Computers.

[12]  Hai Jin,et al.  Computation Offloading Toward Edge Computing , 2019, Proceedings of the IEEE.

[13]  M. Shamim Hossain,et al.  Edge-centric multimodal authentication system using encrypted biometric templates , 2018, Future Gener. Comput. Syst..

[14]  Julien Bringer,et al.  A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.

[15]  Xiaomin Liu,et al.  Fast Secure Computation of Set Intersection , 2010, SCN.

[16]  Neyire Deniz Sarier Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management , 2021, Comput. Secur..

[17]  Keke Gai,et al.  Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing , 2016, J. Netw. Comput. Appl..

[18]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[19]  Tie Qiu,et al.  Fog Computing Based Face Identification and Resolution Scheme in Internet of Things , 2017, IEEE Transactions on Industrial Informatics.

[20]  Neyire Deniz Sarier Private Minutia-Based Fingerprint Matching , 2015, WISTP.

[21]  Yong Meng Teo,et al.  Towards Analyzing the Performance of Hybrid Edge-Cloud Processing , 2019, 2019 IEEE International Conference on Edge Computing (EDGE).

[22]  WADOOD ABDUL,et al.  Biometric Security Through Visual Encryption for Fog Edge Computing , 2017, IEEE Access.

[23]  Qian Wang,et al.  Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.

[24]  Sébastien Marcel,et al.  The 2013 speaker recognition evaluation in mobile environment , 2013, 2013 International Conference on Biometrics (ICB).

[25]  Feng Li,et al.  Outsourceable two-party privacy-preserving biometric authentication , 2014, AsiaCCS.

[26]  Keke Gai,et al.  Energy-aware task assignment for mobile cyber-enabled applications in heterogeneous cloud computing , 2018, J. Parallel Distributed Comput..

[27]  Neyire Deniz Sarier Efficient biometric-based identity management on the Blockchain for smart industrial applications , 2021, Pervasive Mob. Comput..

[28]  Zhihui Lu,et al.  Fusion of Cognitive Wireless Networks and Edge Computing , 2019, IEEE Wireless Communications.

[29]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[30]  Adlen Ksentini,et al.  On Using Edge Computing for Computation Offloading in Mobile Network , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[31]  Satoshi Obana,et al.  Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks , 2015, SAC.

[32]  Patrizio Campisi,et al.  Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.