phat 19(18): e4

Research Article

Privacy Preserving Fingerprint Authentication at the Cloud Server for eHealth Services

Download977 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.162688,
        author={S Rajarajan and R Venkata Kausik and M Sree Charan and PLK. Priyadarsini},
        title={Privacy Preserving Fingerprint Authentication at the Cloud Server for eHealth Services},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology},
        volume={5},
        number={18},
        publisher={EAI},
        journal_a={PHAT},
        year={2019},
        month={5},
        keywords={Biometrics, Fingerprints, Privacy-preserving, Cancellable-biometrics, Cloud, Image feature extraction, SURF},
        doi={10.4108/eai.13-7-2018.162688}
    }
    
  • S Rajarajan
    R Venkata Kausik
    M Sree Charan
    PLK. Priyadarsini
    Year: 2019
    Privacy Preserving Fingerprint Authentication at the Cloud Server for eHealth Services
    PHAT
    EAI
    DOI: 10.4108/eai.13-7-2018.162688
S Rajarajan1,*, R Venkata Kausik1, M Sree Charan1, PLK. Priyadarsini1
  • 1: SASTRA Deemed to be University, India
*Contact email: srajarajan@cse.sastra.edu

Abstract

BACKGROUND: Restricting entry and access to highly sensitive systems like e-Health services is vital to protect the privacy and confidentiality of customers. User authentication is implemented predominantly done using Bio-metric schemes. But there is a challenge in securely storing the fingerprint templates. Since fingerprints are permanent, fingerprints getting stolen will be a serious issue.

OBJECTIVE: The objective of this paper is to design a scheme to carry out the fingerprint match at the cloud server that will not compromise the fingerprints.

METHODS: When users input their fingerprint, a unique key is generated and it is sent to the server for verification.

RESULTS: We evaluated our proposed scheme and ascertained that it generates unique Fingerprint Identification Number for different fingerprints and the false rejection rate of our proposed scheme is within acceptable limit.

CONCLUSION: The proposed scheme overcomes the security threats to the stored fingerprints of users.