Privacy preserving security using biometrics in cloud computing

  • Santosh Kumar
  • Sanjay Kumar Singh
  • Amit Kumar Singh
  • Shrikant Tiwari
  • Ravi Shankar Singh


Cloud computing and the efficient storage provide new paradigms and approaches designed at efficiently utilization of resources through computation and many alternatives to guarantee the privacy preservation of individual user. It also ensures the integrity of stored cloud data, and processing of stored data in the various data centers. However, to provide better protection and management of sensitive information (data) are big challenge to maintain the confidentiality and integrity of data in the cloud computation. Thus, there is an urgent need for storing and processing the data in the cloud environment without any information leakage. The sensitive data require the storing and processing mechanism and techniques to assurance the privacy preservation of individual user, to maintain the data integrity, and preserve confidentiality. Face recognition has recently achieved advancements in the unobtrusive recognition of individuals to maintain the privacy-preservation in the cloud computing. This paper emphasizes on cloud security and privacy issues and provides the solution using biometric face recognition. We propose a biometrics face recognition approach for security and privacy preservation of cloud users during their access to cloud resources. The proposed approach has three steps: (1) acquisition of face images (2) preprocessing and extraction of facial feature (3) recognition of individual using encrypted biometric feature. The experimental results establish that our proposed recognition approach can ensure the privacy and security of biometrics data.


Cloud computing Security Privacy Preservation Face recognition Biometrics identification Encrypted Biometrics Elliptical encryption 


  1. 1.
    Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: Application to face recognition. IEEE Trans Pattern Anal Mach Intell 28(12):2037–2041CrossRefMATHGoogle Scholar
  2. 2.
    Ali M, Khan SU, Vasilakos AV (2015) Security in cloud computing: Opportunities and challenges. Inf Sci 305:357–383MathSciNetCrossRefGoogle Scholar
  3. 3.
    Samer Atawneh, Ammar Almomani et al. (2016) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl. SpringerGoogle Scholar
  4. 4.
    Martínez VG, Encinas LH, Ávila CS (2010) A survey of the elliptic curve integrated encryption scheme. Ratio 80(1024):160–223Google Scholar
  5. 5.
    Mauro Barni, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri, Fabio Alessandro Scotti (2010) Privacy-preserving fingercode authentication. Proc 12th ACM Workshop Multimed Sec, 231–240Google Scholar
  6. 6.
    Vinayak Ashok Bharadi and Godson Michael DSilva (2015) Online Signature Recognition Using Software as a Service (SaaS) Model on Public Cloud. Proc IEEE Int Conf Comput Commun Contrl Automation (ICCUBEA), 65–72Google Scholar
  7. 7.
    Marina Blanton and Paolo Gasti (2011) Secure and Efficient Protocols for Iris and Fingerprint Identification. In Computer security–ESORICS2011, 190–209Google Scholar
  8. 8.
    Bringer J, Chabanne H, Kindarji B (2011) Identification with encrypted Biometrics data. Sec Commun Netw 4:548–562CrossRefGoogle Scholar
  9. 9.
    Julien Bringer, Herve Chabanne, Alain Patey (2013) Practical identification with encrypted Biometrics data using oblivious ram. Proc IEEE Int Conf Biomet (ICB), 1–8Google Scholar
  10. 10.
    Julien Bringer, Hervé Chabanne, Alain Patey (2013) SHADE: Secure hamming distance computation from oblivious transfer. Fin Cryptograph Data Sec, 164–176. SpringerGoogle Scholar
  11. 11.
    Julien Bringer, Herve Chabanne, Melanie Favre, Alain Patey, Thomas Schneider, and Michael Zohner (2014) GSHADE: Faster privacy-preserving distance computation and Biometrics identification. Proc 2nd ACM Workshop Inform Hiding Multimed Sec, 187–198Google Scholar
  12. 12.
    Ivan Damgård, and Mats Jurik (2001) A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. Proc 4th Int Workshop Pract Theory Publ Key Cryptograph: Public Key Cryptograph, 119–136Google Scholar
  13. 13.
    Daugman JG (1993) High confidence visual recognition of persons by test of statistical independence. IEEE Trans Pattern Anal Mach Intell 15:1148–1161CrossRefGoogle Scholar
  14. 14.
    Zekeriya Erkin, Martin Franz, Jorge Guajardo, Stefan Katzenbeisser, Inald Lagendijk, Tomas Toft (2009) Privacy-preserving face recognition, In Privacy enhancing technologies, 5672 of the series Lecture Notes in Computer Science, 235–253. SpringerGoogle Scholar
  15. 15.
    Fernandes DAB, Soares LFB, Gomes JV, Freire MM, Inácio PRM (2014) Security issues in cloud environments: a survey. Int J Inf Secur 13(2):113–170CrossRefGoogle Scholar
  16. 16.
    B. Ferreira; J. Rodrigues; J. Leitao; H. Domingos Practical privacy-preserving content-based retrieval in cloud image repositories. IEEE Trans Cloud Comput (99), 1. doi: 10.1109/TCC.2017.2669999Google Scholar
  17. 17.
    Z. Fu; F. Huang; K. Ren; J. Weng; C. Wang Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data. IEEE Trans Inform Forensics Sec (99), 1Google Scholar
  18. 18.
    Gupta BB, Agrawal DP et al (2016) Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security. IGI Global Publisher, USACrossRefGoogle Scholar
  19. 19.
    Haghighata M, Zonouzb S, Abdel-Mottaleba M (2015) CloudID: trustworthy cloud-based and cross-enterprise biometric identification. Expert Syst Appl 42(21):7905–7916CrossRefGoogle Scholar
  20. 20.
    Hankerson D, Menezes AJ, Vanstone S (2006) Guide to elliptic curve cryptography. Springer Science & Business MediaGoogle Scholar
  21. 21.
    A. N. Jaber and Mohamad Fadli Bin Zolkipli (2013) Use of cryptography in cloud computing, Control System, Computing and Engineering (ICCSCE). IEEE Int Conf, Mindeb, 179–184Google Scholar
  22. 22.
    Jain AK, Pankanti S, Prabhakar Karthikeyan S, Lin H, Ross A (2004) Biometrics: a grand challenge. Proc 17th IEEE Int Conf Pattern Recognitn (ICPR) 2:935–942CrossRefGoogle Scholar
  23. 23.
    Anil K. Jain, Arun Ross and Sharath Pankanti Biometrics: A tool for information security. IEEE Trans Inform Forensics Sec, 1, 125–143, 2006Google Scholar
  24. 24.
    Anil K. Jain, Arun A. Ross, Karthik Nandakumar (2011) Introduction to Biometrics, Springer Science & Business MediaGoogle Scholar
  25. 25.
    P. Jain, D. Rane and S. Patidar (2011) A survey and analysis of cloud model-based security for computing secure cloud bursting and aggregation in renal environment, Information and Communication Technologies (WICT), 2011 World Congress on, Mumbai, 456–461Google Scholar
  26. 26.
    Jegede A, Udzir NI, Abdullah A, Mahmod R (2015) Face Recognition and Template Protection with Shielding Function. International Journal of Security and Its Applications 9(12):149–164CrossRefGoogle Scholar
  27. 27.
    Jianzhong Li (2017) Four-image encryption scheme based on quaternion Fresnel transform, chaos and computer generated hologram. Multimed Tools Appl. SpringerGoogle Scholar
  28. 28.
    Li J, Liu Z et al (2015) L-EncDB: A Lightweight Framework for Privacy-Preserving Data Queries in Cloud Computing. Knowl-Based Syst 79:18–26CrossRefGoogle Scholar
  29. 29.
    Jin Li, Hongyang Yan, et al., Location-Sharing Systems with Enhanced Privacy in Mobile Online Social Networks, IEEE Systems Journal. DOI:  10.1109/JSYST.2015.2415835
  30. 30.
    Ojala T, Pietikainen M, Maenpaa T (2002) Multiresolution gray-scale and rotation invariant texture classification with local binary patterns. IEEE Trans Pattern Anal Mach Intell 24(7):971–987CrossRefMATHGoogle Scholar
  31. 31.
    Margarita Osadchy, Binyamin Pinkas, Ayman Jarrous, Boaz Moskovich (2013) System for secure face identification (SCIFI) and methods useful in conjunction therewith. U.S. Patent No. 8,542,886Google Scholar
  32. 32.
    Elena Pagnin, Christos Dimitrakakis, Aysajan Abidin, Aikaterini Mitrokotsa (2014) On the leakage of information in Biometrics authentication. Progress Cryptol (INDOCRYPT2014), 265–280. SpringerGoogle Scholar
  33. 33.
    Pascal Paillier (1999) Public-key cryptosystems based on composite degree residuosity classes. Adv Cryptol (EUROCRYPT99), 223–238. SpringerGoogle Scholar
  34. 34.
    Philip J, Bharadi VA (2016) Dr., Signature Verification SaaS Implementation on Microsoft Azure Cloud. Proc Int Conf Communication, Comput Virtual (ICCCV) 2016 79:410–418Google Scholar
  35. 35.
    Phillips PJ, Moon H, Rauss PJ, Rizvi S (2000) The FERET evaluation methodology for face recognition algorithm. IEEE Trans Pattern Anal Mach Intell 22(10):1090–1104CrossRefGoogle Scholar
  36. 36.
    Li Ping, Tong Li, Zheng-An Yao, Chun-Ming Tang, Jin Li (2016) Privacy-preserving outsourcing of image feature extraction in cloud computing. Soft Comput, 1–11Google Scholar
  37. 37.
    Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg (2009) Efficient privacy-preserving face recognition. Inform, Sec Cryptol (ICISC-2009), 229–244Google Scholar
  38. 38.
    Lorenz Schauer, Florian Dorfmeister, Florian Wirth (2016) Analyzing passive Wi-Fi fingerprinting for privacy-preserving indoor-positioning. Proc IEEE Int Conf Local GNSS (ICL-GNSS), 1–6Google Scholar
  39. 39.
    Shu T, Chen Y, Yang J (2015) Protecting Multi-Lateral Localization Privacy in Pervasive Environments. IEEE/ACM Trans Network (TON) 23(5):1688–1701CrossRefGoogle Scholar
  40. 40.
    Sowmya R, Ezhilarasu P, Satheesh Kumar D, Manoj Prabhakar J (2015) A Survey on Data Security Using Identity Based Encryption in Cloud Computing. Int J Appl Inform Commun Eng 1(11):3–4Google Scholar
  41. 41.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  42. 42.
    Sun Y, Wen Q, Zhang Y, Li W (2014) Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks. Computational and Mathematical Methods in Medicine 2014:1–9MATHGoogle Scholar
  43. 43.
    Suryadevara S, Kapoor S, Dhatterwal S, Naaz R, Sharma A. (2011) Tongue as a Biometric Visualizes New Prospects of Cloud Computing Security. Int Conf Inform Network Technol 4Google Scholar
  44. 44.
    Takabi H, Joshi JBD, Ahn G-J (2010) Security and privacy challenges in cloud computing environment. IEEE Sec Privacy 8(6):24–31CrossRefGoogle Scholar
  45. 45.
    M. A. Turk, A. Pentland (1991) Face recognition using eigenfaces. Proc IEEE Comput Soc Conf Comput Vision Pattern Recogn (CVPR), 586–591Google Scholar
  46. 46.
    Turk MA, Pentland A (1991) Eigenfaces for recognition. J Cogn Neurosci 3:71–86CrossRefGoogle Scholar
  47. 47.
    Víctor GM, Luis HE, Carmen SÁ, Katiyar V, Dutta K, Gupta S (2010) A survey on elliptic curve cryptography for pervasive computing environment. J Comput Sci Eng 2(2):7–13Google Scholar
  48. 48.
    Viola P, Jones MJ (2004) Robust real-time face detection. Int J Comput Vision, 1 57(2):137–154CrossRefGoogle Scholar
  49. 49.
    Wang W, Chen L, Zhang Q (2015) Outsourcing high-dimensional healthcare data to cloud with personalized privacy preservation. Comput Netw 88:136–148CrossRefGoogle Scholar
  50. 50.
    Xiaoshan Wang; Yao Liu; Zhiqiang Shi; Xiang Lu; Limin Sun (2015) A Privacy-Preserving Fuzzy Localization Scheme with CSI Fingerprint. Proc IEEE Int Conf Global Commun Conf (GLOBECOM), 1–6Google Scholar
  51. 51.
    Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang (2015) CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. Europ Symp Res Comput Sec, 186–205. Springer International PublishingGoogle Scholar
  52. 52.
    Wang Y, Wu Q, Qin B, Tang S, Susilo W (2017) Online/Offline Provable Data Possession. IEEE Trans Inform Forensics Sec 12:1182–1194 ISSN 1556-6013CrossRefGoogle Scholar
  53. 53.
    Zhihua Xia, et al, A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing. IEEE Trans Inform Forensics Sec, vol. 11, no. 11, pp. 2594–2608, 2016Google Scholar
  54. 54.
    Xia Z et al (2016) Steganalysis of LSB matching using differences between nonadjacent pixels. Multimed Tools Appl 75(4):1947–1962CrossRefGoogle Scholar
  55. 55.
    Yu Y et al (2017) Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans Inform Forensics Sec 12(4):767–778. doi: 10.1109/TIFS.2016.2615853 MathSciNetCrossRefGoogle Scholar
  56. 56.
    Jiawei Yuan, and Shucheng Yu (2013) Efficient privacy-preserving biometric identification in cloud computing. Proc IEEE Int Conf INFOCOM, 2652–2660Google Scholar
  57. 57.
    Youwen Zhu, Zhikuan Wang, Yue Zhang (2016) Secure k-NN Query on Encrypted Cloud Data with Limited Key-Disclosure and Offline Data Owner. Pacific-Asia Conf Knowledge Discov Data Mining, 401–414. Springer International PublishingGoogle Scholar
  58. 58.
    Zhu Y, Huang Z, Takagi T (2016) Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J Parallel Distrib Comput 89:1–12CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2017

Authors and Affiliations

  • Santosh Kumar
    • 1
  • Sanjay Kumar Singh
    • 2
  • Amit Kumar Singh
    • 3
  • Shrikant Tiwari
    • 4
  • Ravi Shankar Singh
    • 2
  1. 1.Computer Science & Engineering (CSE)IIIT Naya RaipurChhattisgarhIndia
  2. 2.Department of Computer Science and EngineeringIndian Institute of Technology (B.H.U)VaranasiIndia
  3. 3.Department of Computer Science and EngineeringJaypee University of Information TechnologySolanIndia
  4. 4.Department of Computer Science and EngineeringShri Shankaracharya Group of Institutions (SSGI)DurgIndia

Personalised recommendations