• DocumentCode
    65782
  • Title

    Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones

  • Author

    Sedenka, Jaroslav ; Govindarajan, Sathya ; Gasti, Paolo ; Balagani, Kiran S.

  • Author_Institution
    New York Inst. of Technol., New York, NY, USA
  • Volume
    10
  • Issue
    2
  • fYear
    2015
  • fDate
    Feb. 2015
  • Firstpage
    384
  • Lastpage
    396
  • Abstract
    We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean verifiers, secure against malicious clients and honest-but-curious server. We then augment our protocols with principal component analysis (PCA), which can help to improve authentication accuracy. We evaluate the performance of our protocols on an emerging application-namely, continuous authentication of smartphone users. We compare the performance of protocols secure under the malicious client model, with three protocols secure in the honest-but-curious model. We report tradeoffs between computation overhead, communication cost, and authentication accuracy. Our key observations are: 1) scaled Manhattan without PCA gives the best tradeoff between security, accuracy, and overhead and 2) with PCA, memory availability on current smartphones limits the number of features that can be used with scaled Manhattan, and prevents the scaled Euclidean protocol from running. Our extended evaluation on a laptop client shows that PCA with both scaled Manhattan and scaled Euclidean verifiers is feasible given sufficient memory.
  • Keywords
    cryptographic protocols; principal component analysis; smart phones; Euclidean protocol; PCA; continuous authentication; honest-but-curious model; malicious client model; principal component analysis; privacy-preserving protocols; secure outsourced biometric authentication; smartphone users; Authentication; Encryption; Principal component analysis; Protocols; Servers; Privacy-preserving authentication; behavioral biometrics; cryptographic protocols; garbled circuits; homomorphic encryption; secure multiparty computation;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2014.2375571
  • Filename
    6971118