120 likes | 345 Views
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations. Marina Blanton and Yihua Zhang, Keith B. Frikken. The Issue.
E N D
Secure and Verifiable Outsourcing of Large-Scale Biometric Computations Marina Blanton and Yihua Zhang, Keith B. Frikken
The Issue "The cloud provider can be incentivized to delete rarely accessed data or skip some of the computations to conserve resources, which is especially true for volunteer-based computational clouds."
Requirements • Clients should be able to verify the result of an outsourced task • The client should not have to run all of the computations that were outsourced to verify a task
Why biometrics? • The large amount of computation required to analyze a biometric • Biometric scans are sensitive in nature so require protection • The outcome of the computation needs to be accurate and verifiable
Outsourced Method 1 Process the distance between each pair of processed biometrics -Hamming Distance (iris) -Euclidean Distance (face and others) -Set Intersection cardinality (fingerprints) 2 Gather the distribution to determine imposter or authentic user
Outsourced Method cont. • Partitioning of data/computation to multiple servers • Server may perform task or cheat • Tasks may be multiparty for added security
Assumptions • “The computation is assumed to be carried out on protected data,…” • The servers are unable to learn information about the data it handles • “…we assume that the server computes fraction p of its task…and attempts..to make the client believe that it computed its task…”
Analysis Method • Have servers collect statistics on distance values in the matrix -Record counts of individual distance values appearing among the computed distances -List of all possible distances and increment that distance if found.
Example Code [d] := dist([x],[y]): for i =0,…, v-1 <--All possible values [bi] := ([d] ==[di]); [ci] := [ci] + [bi];
Client Side Verification • Hamming Distance • Client introduces fake items with a set distance away from actual items • Compares the server’s statistics with its known ranges
Cont. • Euclidean Distance • Square the values and have the server perform the operation on the squared values • Insert fake distances as done with Hamming • Intersection Cardinality • Insert fake distances as with the other two methods
Comments • Adds overhead computation on both client and cloud servers • Minimal for client • Cloud side processing of pairs can double in work for hamming • Cloud-Requires additional space for secure increment list