Privacy-Preserving Multibiometric Authentication in Cloud

Slides:



Advertisements
Similar presentations
Overview of biometric technology. Contents: 1. What is Biometrics The term “biometrics” is derived from the Greek words “bio” (life) and “metrics” (to.
Advertisements

1 Vipul Goyal Abhishek Jain UCLA On the Round Complexity of Covert Computation.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Security Prospects through Cloud Computing by Adopting Multiple Clouds Meiko Jensen, Jorg Schwenk Jens-Matthias Bohli, Nils Gruschka Luigi Lo Iacono Presented.
SPREADSHEETS IN EDUCATION OF LOGISTICS MANAGERS AT FACULTY OF ORGANIZATIONAL SCIENCES: AN EXAMPLE OF INVENTORY DYNAMICS SIMULATION L. Djordjevic, D. Vasiljevic.
Information Fusion in Multibiometric Systems
Biometrics & Security Tutorial (a) Why multi-biometrics? (P13: 3-6)
1 Preview of the self service airport R edesign P assenger P rocess (RPP) Club of Amsterdam, 1 Maart 2006.
Biometrics II CUBS, University at Buffalo
Mulitmodal Biometric Systems Munir Bandukwala Rajesh Subramanian.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Integrating Information Dr. Pushkin Kachroo. Integration Matcher 1 Matcher 2 Integration Decision Match No Match B1B1 B2B2.
1 Linking creativity and culture for an innovative local development Rovereto, Italy, 28 November 2005 Mr. Alain Dupeyras, Head of the CFE Tourism Programme.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
DIRC PA6: Security and Privacy in Computer-Based Systems Peter Ryan School of Computing Science University of Newcastle
Exploiting super peers for large- scale peer-to-peer Wi-Fi roaming Efstratios G. Dimopoulos, Pantelis A. Frangoudis and George.C.Polyzos.
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
UI and Data Entry UI and Data Entry Front-End Business Logic Mid-Tier Data Store Back-End.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
User Authentication Using Keystroke Dynamics Jeff Hieb & Kunal Pharas ECE 614 Spring 2005 University of Louisville.
Keystroke Authentication It’s All in How You Type John C. Checco BiometriTech 2003 bioChec™
Free Powerpoint Templates Page 1 Free Powerpoint Templates FP7 – Secure Enterprise Remote Banking System (SERBS) Small or medium scale focused research.
BioSecure : A Network of Excellence on Biometric identity authentication B. Dorizzi, GET-INT, France G. Chollet, GET-ENST, Paris.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Privacy Considerations for Internet Protocols Alissa Cooper 1.
Interoperability from the e-Science Perspective Yannis Ioannidis Univ. Of Athens and ATHENA Research Center
Soft Biometrics 苏毅婧. Outline Introduction Application Case study.
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
m-Privacy for Collaborative Data Publishing
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
MULTI-BIOMETRIC SYSTEM Chris Chiffriller, Chris George, Gabriel Dos Santos, Subah Sachdeva.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
Information Management System Ali Saeed Khan 29 th April, 2016.
SMARTIE Area of Activity: Framework Programme 7Framework Programme 7 ICT Objective 1.4 IoT (Smart Cities) Period:1 st September st August 2016.
TEMPLATE DESIGN © Automatic Classification of Parameters and Cookies Ali Reza Farid Amin 1, Gregor v. Bochmann 1, Guy-Vincent.
Unobtrusive Mobile User Recognition Patent by Seal Mobile ID Presented By: Aparna Bharati & Ashrut Bhatia.
Cybersecurity and People: Challenges in Predicting User Actions Joachim Meyer Dept. of Industrial Engineering Fleischman School of Engineering Tel Aviv.
Contribution of the European Research Infrastructures (RI) to Open Science Strengthening and Widening the European Infrastructure for Social Sciences.
2nd GEO Data Providers workshop (20-21 April 2017, Florence, Italy)
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Professor Tzong-Chen Wu
2nd IEEE European Symposium on Security and Privacy
TriggerScope: Towards Detecting Logic Bombs in Android Applications
COMPUTER SECURITY CONCEPTS
Federated IdM Across Heterogeneous Clouding Environment
Private and Secure Biometric User Authentication in the Web Master Thesis Defense Zaki Alsubhi Department of Computer Science University of Colorado.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
Cloud Security Research Based On The Internet of Things
Privacy Preserving Ranked Multi-Keyword
Inside Job: Applying Traffic Analysis to Measure Tor from Within
Security Protection Goals
PLUG-N-HARVEST ID: H2020-EU
دانشگاه شهیدرجایی تهران
تعهدات مشتری در کنوانسیون بیع بین المللی
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
Atelier Progress Report
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
Exam 1 review CS 360 Lecture 20.
Privacy Protection for E-Health Systems by
Definition Of Computer Security
Overview of Computer system
Presentation transcript:

Privacy-Preserving Multibiometric Authentication in Cloud FACULTY OF ENGINEERING COSIC Privacy-Preserving Multibiometric Authentication in Cloud Authors: Christina-Angeliki Toli, Abdelrahaman Aly and Bart Preneel KU Leuven, ESAT/COSIC and imec Euro S&P 2017 2nd IEEE European Symposium on Security and Privacy Paris, France 27 April 2017

Motivation Cloud-based biometric applications Privacy-by-design approaches Link the pattern recognition area with applied crypto Biometrics integration is still an “open problem” Addressing the topic from a multimodal perspective, taking into account impacts on performance Secure Multiparty Computation (MPC)

Layout Figure: Multimodal Biometric Authentication in Cloud Environment

Contribution Re-use the prior stored unimodal templates, avoiding the auxiliary temporary or permanent storage A user-specific performance-dependent weighted score level fusion strategy MPC protocols for cloud in a privacy-preserving decentralized manner Threats from parties with competing interest, collusion models, security and privacy perspectives Entity learns only the {0,1} value of the final result

Resutls Authentication/identification by setting up a FAR or FRR-dependent fusion The operation is dynamic Stored templates, matching, normalized and fusion scores are inaccessible Privacy of user's information from the output party Limitation: Identification is time-consuming processes Future work: Fusion accuracy, computational and communication complexity and efficiency

Thank you for your attention ! Contact : Thank you for your attention ! http://www.esat.kuleuven.be/cosic/ Christina-Angeliki Toli ctoli@esat.kuleuven.be