Techniques for Privacy Preservation

Journal Title: GRD Journal for Engineering - Year 2016, Vol 2, Issue 1

Abstract

A form of biometrics, also called Biometric Encryption or BioCryptics, in which the proves is protected against the misuse of template data by a dishonest verifier. Biometric identification requires that a verifier searches for matches in a data base that contains data about the entire population. This introduces the security and privacy threat that the verifier who steals biometric templates from some (or even all) persons in the data base can perform impersonation attacks. When a private verification system is used on a large scale, the reference data base has to be made available to many different verifiers, who, in general, cannot be trusted. Information stolen from a data base can be misused to construct artificial biometrics to impersonate people. Creation of artificial biometrics is possible even if only part of the template is available. To develop an insight in the security aspects of biometrics, one can distinguish between verification and private verification. In a typical verification situation, access to the reference template allows a malicious verifier to artificially construct measurement data that will pass the verification test, even if the prover has never exposed herself to a biometric measurement after the enrollment. In private verification, the reference data should not leak relevant information to allow the verifier to (effectively) construct valid measurement data. Such protection is common practice for storage of computer passwords. When a computer verifies a password, it does not compare the password typed by the user with a stored reference copy. Instead, the password is processed by a cryptographic one-way function F and the outcome is compared against a locally stored reference string F(y ). So y is only temporarily available on the system hardware, and no stored data allows calculation of y. This prevents attacks from the inside by stealing unencrypted or decrypt able secrets. Biometric verification is defined as the verification of a individual based on the physical, chemical or behavioural attributes of the person. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs).These PPBSs can be classified into Biometric encryption based schemes, Cancel able biometric based schemes, Multi-modal and hybrid based schemes, secure computation (SC) based schemes. There is a comparative study of PPBS and select the best one .On the bases of comparisons select the best PPBS is Biometric encryption based schemes.

Authors and Affiliations

Aswini Prasad

Keywords

Related Articles

Cloud Computing-Technologies, Architecture, Deployment and Service Models

Cloud computing can run our businesses in a better and unique way. Because cloud computing runs on a shared data center. In 1990s, some companies started offering “Virtual Private Network (VPN)” services at a lower cost....

Optimum Structural Configuration of Multi-Storey Building by Changing Shear Wall Location

A shear wall is a structural element used to resist horizontal forces parallel to the plane of the wall. Shear wall has highly in plane stiffness and strength which can be used simultaneously resisted large horizontal lo...

DNA Based Cryptography and Stegnography

The most common and widely used technique in the communication security and computer security fields is cryptography. Cryptography includes converting some data to incomprehensible format so that a non-intended recipient...

Replacement of Melt Densified Light Weight Plastic Aggregate With Natural Aggregate

Disposal of plastic waste in an environment is considered an important issue due to its very low biodegradability and presence in large quantities. Hence, recycled plastic is a major solution. Present investigation melt-...

Smart Fuel Level Indication System

In the recent times we are constantly hearing about petrol bunk frauds. Most of the petrol bunks today have manipulated the pumps such that it displays the amount as entered but the quantity of fuel filled in the custome...

Download PDF file
  • EP ID EP224301
  • DOI -
  • Views 103
  • Downloads 0

How To Cite

Aswini Prasad (2016). Techniques for Privacy Preservation. GRD Journal for Engineering, 2(1), 66-70. https://europub.co.uk/articles/-A-224301