Paper
23 May 2017 Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment
Author Affiliations +
Abstract
The main problem associated with using symmetric/ asymmetric keys is how to securely store and exchange the keys between the parties over open networks particularly in the open environment such as cloud computing. Public Key Infrastructure (PKI) have been providing a practical solution for session key exchange for loads of web services. The key limitation of PKI solution is not only the need for a trusted third partly (e.g. certificate authority) but also the absent link between data owner and the encryption keys. The latter is arguably more important where accessing data needs to be linked with identify of the owner. Currently available key exchange protocols depend on using trusted couriers or secure channels, which can be subject to man-in-the-middle attack and various other attacks. This paper proposes a new protocol for Key Exchange using Biometric Identity Based Encryption (KE-BIBE) that enables parties to securely exchange cryptographic keys even an adversary is monitoring the communication channel between the parties. The proposed protocol combines biometrics with IBE in order to provide a secure way to access symmetric keys based on the identity of the users in unsecure environment. In the KE-BIOBE protocol, the message is first encrypted by the data owner using a traditional symmetric key before migrating it to a cloud storage. The symmetric key is then encrypted using public biometrics of the users selected by data owner to decrypt the message based on Fuzzy Identity-Based Encryption. Only the selected users will be able to decrypt the message by providing a fresh sample of their biometric data. The paper argues that the proposed solution eliminates the needs for a key distribution centre in traditional cryptography. It will also give data owner the power of finegrained sharing of encrypted data by control who can access their data.
© (2017) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Waleed K. Hassan and Hisham Al-Assam "Key exchange using biometric identity based encryption for sharing encrypted data in cloud environment", Proc. SPIE 10221, Mobile Multimedia/Image Processing, Security, and Applications 2017, 102210J (23 May 2017); https://doi.org/10.1117/12.2268472
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Biometrics

Clouds

Cryptography

Data storage

Computer security

Fuzzy logic

Feature extraction

RELATED CONTENT

Security analysis for fingerprint fuzzy vaults
Proceedings of SPIE (May 31 2013)
Cryptographic key generation using handwritten signature
Proceedings of SPIE (April 17 2006)
A palmprint-based cryptosystem using double encryption
Proceedings of SPIE (March 17 2008)
Secret sharing using biometric traits
Proceedings of SPIE (April 17 2006)

Back to Top