publication . Preprint . Article . 2017

Protection de la vie privée dès la phase de conception: application à la vérification de propriétés d'architectures de systèmes biométriques

Bringer, Julien; Chabanne, Hervé; Le Métayer, Daniel; Lescuyer, Roch;
Open Access English
  • Published: 22 Dec 2017
  • Publisher: HAL CCSD
  • Country: France
Abstract
This work aims to show the applicability, and how, of privacy by design approach to biometric systems and the benefit of using formal methods to this end. Starting from a general framework that has been introduced at STM in 2014, that enables to define privacy architectures and to formally reason about their properties, we explain how it can be adapted to biometrics. The choice of particular techniques and the role of the components (central server, secure module, biometric terminal, smart card, etc.) in the architecture have a strong impact on the privacy guarantees provided by a biometric system. In the literature, some architectures have already been analysed...
Subjects
free text keywords: data protection, regulation, Privacy by design, formal methods, verification, biometric systems, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.6: Regulation, [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], Computer Science - Cryptography and Security, Computer Science - Logic in Computer Science
Funded by
ANR| BIOPRIV
Project
BIOPRIV
BIOMETRIC SYSTEMS PRIVATE BY DESIGN
  • Funder: French National Research Agency (ANR) (ANR)
  • Project Code: ANR-12-INSE-0013
,
EC| PRIPARE
Project
PRIPARE
PReparing Industry to Privacy-by-design by supporting its Application in REsearch
  • Funder: European Commission (EC)
  • Project Code: 610613
  • Funding stream: FP7 | SP1 | ICT
45 references, page 1 of 3

[1] Mart´ın Abadi and Ce´dric Fournet. Mobile values, new names, and secure communication. In ACM Symposium on Principles of Programming Languages - POPL'01, pages 104-115. ACM Press, 2001.

[2] Thibaud Antignac and Daniel Le Me´tayer. Privacy architectures: Reasoning about data minimisation and integrity. In Security and Trust Management - STM'14, volume 8743 of LNCS, pages 17-32. Springer, 2014.

[3] Thibaud Antignac and Daniel Le Me´tayer. Trust driven strategies for privacy by design. In Trust Management - IFIP-TM'15, volume 454 of IFIP, pages 60-75. Springer, 2015.

[4] Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. Privacy and contextual integrity: Framework and applications. In IEEE Symposium on Security and Privacy - S&P'06, pages 184-198. IEEE Computer Society, 2006.

[5] Moritz Y. Becker, Alexander Malkis, and Laurent Bussard. S4P: A generic language for specifying privacy preferences and policies. Technical report, Microsoft Research / IMDEA Software / EMIC, 2010.

[6] BioPriv. Biometric systems Private by design. French ANR research project ANR12-INSE-0013, 2013. http://www.agence-nationale-recherche.fr/?Project= ANR-12-INSE-0013.

[7] Marina Blanton and Paolo Gasti. Secure and efficient protocols for iris and fingerprint identification. In European Symposium on Research in Computer Security - ESORICS'11, volume 6879 of LNCS, pages 190-209. Springer, 2011.

[8] Julien Bringer, Herve´ Chabanne, Malika Izabache`ne, David Pointcheval, Qiang Tang, and Se´bastien Zimmer. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In Australasian Conference on Information Security and Privacy - ACISP'07, volume 4586 of LNCS, pages 96-106. Springer, 2007.

[9] Julien Bringer, Herve´ Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending matchon-card to local biometric identification. In Conference on Biometric ID Management and Multimodal Communication, BioID MultiComm'09, volume 5707 of LNCS, pages 178-186. Springer, 2009.

[10] Julien Bringer, Herve´ Chabanne, Daniel Le Me´tayer, and Roch Lescuyer. Privacy by design in practice: Reasoning about privacy properties of biometric system architectures. In Formal Methods - FM'15, volume 9109 of LNCS, pages 90-107. Springer, 2015.

[11] Julien Bringer, Herve´ Chabanne, Daniel Le Me´tayer, and Roch Lescuyer. Reasoning about privacy properties of biometric systems architectures in the presence of information leakage (Best Paper Award). In Information Security Conference - ISC'15, volume 9290 of LNCS, pages 493-510. Springer, 2015.

[12] Julien Bringer, Herve´ Chabanne, and Koen Simoens. Blackbox security of biometrics (invited paper). In Conference on Intelligent Information Hiding and Multimedia Signal Processing - IIHMSP'10, pages 337-340. IEEE Computer Society, 2010.

[13] Ste´phanie Delaune, Steve Kremer, and Mark Ryan. Verifying privacy-type properties of electronic voting protocols: A taster. In Towards Trustworthy Elections, New Directions in Electronic Voting, volume 6000 of LNCS, pages 289-309. Springer, 2010.

[14] Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT'04, volume 3027 of LNCS, pages 523-540. Springer, 2004. [OpenAIRE]

[15] Cynthia Dwork. Differential privacy. In International Colloquium on Automata, Languages and Programming - ICALP'06, Part II, volume 4052 of LNCS, pages 1-12. Springer, 2006.

45 references, page 1 of 3
Abstract
This work aims to show the applicability, and how, of privacy by design approach to biometric systems and the benefit of using formal methods to this end. Starting from a general framework that has been introduced at STM in 2014, that enables to define privacy architectures and to formally reason about their properties, we explain how it can be adapted to biometrics. The choice of particular techniques and the role of the components (central server, secure module, biometric terminal, smart card, etc.) in the architecture have a strong impact on the privacy guarantees provided by a biometric system. In the literature, some architectures have already been analysed...
Subjects
free text keywords: data protection, regulation, Privacy by design, formal methods, verification, biometric systems, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.6: Regulation, [INFO.INFO-CY]Computer Science [cs]/Computers and Society [cs.CY], Computer Science - Cryptography and Security, Computer Science - Logic in Computer Science
Funded by
ANR| BIOPRIV
Project
BIOPRIV
BIOMETRIC SYSTEMS PRIVATE BY DESIGN
  • Funder: French National Research Agency (ANR) (ANR)
  • Project Code: ANR-12-INSE-0013
,
EC| PRIPARE
Project
PRIPARE
PReparing Industry to Privacy-by-design by supporting its Application in REsearch
  • Funder: European Commission (EC)
  • Project Code: 610613
  • Funding stream: FP7 | SP1 | ICT
45 references, page 1 of 3

[1] Mart´ın Abadi and Ce´dric Fournet. Mobile values, new names, and secure communication. In ACM Symposium on Principles of Programming Languages - POPL'01, pages 104-115. ACM Press, 2001.

[2] Thibaud Antignac and Daniel Le Me´tayer. Privacy architectures: Reasoning about data minimisation and integrity. In Security and Trust Management - STM'14, volume 8743 of LNCS, pages 17-32. Springer, 2014.

[3] Thibaud Antignac and Daniel Le Me´tayer. Trust driven strategies for privacy by design. In Trust Management - IFIP-TM'15, volume 454 of IFIP, pages 60-75. Springer, 2015.

[4] Adam Barth, Anupam Datta, John C. Mitchell, and Helen Nissenbaum. Privacy and contextual integrity: Framework and applications. In IEEE Symposium on Security and Privacy - S&P'06, pages 184-198. IEEE Computer Society, 2006.

[5] Moritz Y. Becker, Alexander Malkis, and Laurent Bussard. S4P: A generic language for specifying privacy preferences and policies. Technical report, Microsoft Research / IMDEA Software / EMIC, 2010.

[6] BioPriv. Biometric systems Private by design. French ANR research project ANR12-INSE-0013, 2013. http://www.agence-nationale-recherche.fr/?Project= ANR-12-INSE-0013.

[7] Marina Blanton and Paolo Gasti. Secure and efficient protocols for iris and fingerprint identification. In European Symposium on Research in Computer Security - ESORICS'11, volume 6879 of LNCS, pages 190-209. Springer, 2011.

[8] Julien Bringer, Herve´ Chabanne, Malika Izabache`ne, David Pointcheval, Qiang Tang, and Se´bastien Zimmer. An application of the Goldwasser-Micali cryptosystem to biometric authentication. In Australasian Conference on Information Security and Privacy - ACISP'07, volume 4586 of LNCS, pages 96-106. Springer, 2007.

[9] Julien Bringer, Herve´ Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending matchon-card to local biometric identification. In Conference on Biometric ID Management and Multimodal Communication, BioID MultiComm'09, volume 5707 of LNCS, pages 178-186. Springer, 2009.

[10] Julien Bringer, Herve´ Chabanne, Daniel Le Me´tayer, and Roch Lescuyer. Privacy by design in practice: Reasoning about privacy properties of biometric system architectures. In Formal Methods - FM'15, volume 9109 of LNCS, pages 90-107. Springer, 2015.

[11] Julien Bringer, Herve´ Chabanne, Daniel Le Me´tayer, and Roch Lescuyer. Reasoning about privacy properties of biometric systems architectures in the presence of information leakage (Best Paper Award). In Information Security Conference - ISC'15, volume 9290 of LNCS, pages 493-510. Springer, 2015.

[12] Julien Bringer, Herve´ Chabanne, and Koen Simoens. Blackbox security of biometrics (invited paper). In Conference on Intelligent Information Hiding and Multimedia Signal Processing - IIHMSP'10, pages 337-340. IEEE Computer Society, 2010.

[13] Ste´phanie Delaune, Steve Kremer, and Mark Ryan. Verifying privacy-type properties of electronic voting protocols: A taster. In Towards Trustworthy Elections, New Directions in Electronic Voting, volume 6000 of LNCS, pages 289-309. Springer, 2010.

[14] Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Advances in Cryptology - EUROCRYPT'04, volume 3027 of LNCS, pages 523-540. Springer, 2004. [OpenAIRE]

[15] Cynthia Dwork. Differential privacy. In International Colloquium on Automata, Languages and Programming - ICALP'06, Part II, volume 4052 of LNCS, pages 1-12. Springer, 2006.

45 references, page 1 of 3
Any information missing or wrong?Report an Issue