The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication…
The purpose of this paper is to determine the effectiveness of using fully homomorphic encryption (FHE) to preserve the privacy of biometric data in an authentication system. Biometrics offers higher accuracy for personal recognition than traditional methods because of its properties. Biometric data are permanently linked with an individual and cannot be revoked or cancelled, especially when biometric data are compromised, leading to privacy issues.
By reviewing current approaches, FHE is considered as a promising solution for the privacy issue because of its ability to perform computations in the encrypted domain. The authors studied the effectiveness of FHE in biometric authentication systems. In doing so, the authors undertake the study by implementing a protocol for biometric authentication system using iris.
The security analysis of the implementation scheme demonstrates the effectiveness of FHE to protect the privacy of biometric data, as unlimited operations can be performed in the encrypted domain, and the FHE secret key is not shared with any other party during the authentication protocol.
The use of malicious model in the design of the authentication protocol to improve the privacy, packing methods and use of low-level programming language to enhance performance of the system needs to be further investigated.
The main contributions of this paper are the implementation of a privacy-preserving iris biometric authentication protocol adapted to lattice-based FHE and a sound security analysis of authentication and privacy.
The continuous advancements in wearable sensing technologies enable the easy collection and publishing of visual lifelog data. The widespread adaptation of visual lifelog technologies would have the potential to pose challenges for ensuring the personal privacy of subjects and bystanders in lifelog data. This paper presents preliminary findings from a study of lifeloggers with the aim of better understanding their concerns regarding privacy in lifelog data.
In this study, we have collected a visual dataset of 64,837 images from 25 lifelogging participants over a period of two days each, and we conducted an interactive session (face to face conversation) with each participant in order to capture their concerns when sharing the lifelog data across three specified categories (i.e. Private (Only for Me), Semi-Private (Family/Friends) and Public).
In general, we found that participants tend to err on the side of conservative privacy settings and that there is a noticeable difference in what different participants are willing to share. In summary, we found that the categories of images that the participants wished to be kept private included personally identifiable information and professional information; categories of images that could be shared with family/friends include family moments or content related to daily routine lifestyle, and other visual lifelog data could potentially be made public).
We analysed the potential differences in the willingness of 25 participants to share data. In addition, reasons for being a volunteer to collect lifelog data and how the lifelogging device affected the lifestyle of the lifelogger are analysed. Based on the findings of this study, we propose a set of challenges for the anonymisation of lifelog data that should be solved when supporting lifelog data sharing.
In this chapter, the post-disaster handling of the British Petroleum Oil Spill in the Gulf of Mexico is analyzed according to the concept of “Public Reserve.” Public…
In this chapter, the post-disaster handling of the British Petroleum Oil Spill in the Gulf of Mexico is analyzed according to the concept of “Public Reserve.” Public Reserve extends the theory of privacy from the individual into the context of corporate behavior and environmental regulation and management by government. Secrecy is viewed as a form of privacy.
Recognizing that crowding in a restaurant waiting area forms a first impression of service and sets service expectations, the purpose of this study is to investigate the…
Recognizing that crowding in a restaurant waiting area forms a first impression of service and sets service expectations, the purpose of this study is to investigate the impact of crowding in the effective control of the waiting environment. The study seeks to examine the impact of crowding on customers' emotions and approach‐avoidance responses and to examine the mediating role of emotion and the moderating role of desired privacy in the relationship between crowding and approach‐avoidance responses.
Using real‐scale, interactive virtual reality (VR) technology that allows high‐fidelity representations of real environments, the authors created a navigable, photo‐realistic three‐dimensional model of a restaurant waiting area. Through an experimental study which manipulated crowding levels in the VR restaurant, they surveyed the subjects' responses toward crowding conditions.
The study found significant effects of crowding on emotions including arousal and dominance, but not pleasure, and on approach‐avoidance responses. The impact of crowding on approach‐avoidance responses was more direct than indirect, without having emotion as a mediator. It was also found that the desire for privacy as a psychological trait moderated the relationship between crowding and affiliation.
The findings of this study offer restaurant managers insights toward the effective management of the pre‐process service environment during the waiting state that minimizes the negative consequences of waiting/crowding. This study provides three courses of management actions that can make unavoidable crowding in the restaurant waiting situation more enjoyable and comfortable.
By using VR simulation, this study adds a new approach for crowding studies. Theoretically, this study broadened the scope of crowding studies by adding a potential mediating variable, emotions, and a moderating variable, desired privacy, in examining the relationship between crowding and approach‐avoidance responses. Also, by focusing on a restaurant waiting area, the authors were able to explore the pre‐process service expectations.