Research Article

A Privacy Protection Scheme for Facial Recognition and Resolution Based on Edge Computing

Algorithm 1

The encryption scheme in facial recognition.
 Begin
 Step 1: TA inputs the security parameter to generate the public key and the master key of the CP-ABE algorithm. TA inputs the security parameter to generate the symmetric key by the AES symmetric key algorithm. Then, TA assigns and to RS.
 Step 2: RS inputs attribute set to construct access policy by CP-ABE attribute encryption algorithm. RS uses the symmetric key of the AES algorithm to encrypt the data , which binds the face identifier and the serial number. Then, TA generates data ciphertext . Based on the public key and the access policy , RS uses the CP-ABE algorithm to encrypt the data ciphertext into the ciphertext associated with . Then, ciphertext data generates the signature . is the root of the constructed MHT, and is the signature private key.
 Step 3: The session key agreement algorithm between RS and MS is executed according to Algorithm 1. It verifies the identity of FN and MS and generates the session key
 Step 4: RS firstly uses the SHA-1 hash algorithm to calculate , and FN uploads to .
 Step 5: After MS receives the message, it calculates the for comparison with . If , it has the data integrity and sends to data center. Finally, it returns the successful registration flag.
 End