Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/41314' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Warning: pg_query(): Query failed: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 in /dati/webiit-old/includes/database.pgsql.inc on line 138 Warning: ERROR: missing chunk number 0 for toast value 29512337 in pg_toast_2619 query: SELECT data, created, headers, expire, serialized FROM cache_page WHERE cid = 'https://www-old.iit.cnr.it/node/41314' in /dati/webiit-old/includes/database.pgsql.inc on line 159 Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions | IIT - CNR - Istituto di Informatica e Telematica
IIT Home Page CNR Home Page

Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions

Nowadays, the use of video surveillance systems for protecting critical environment is becoming more and more popular. On the one hand, video surveillance systems should be able to detect the presence of unauthorized people in the monitored environments to provide effective physical security. On the other hand, video surveillance systems should be also able to preserve the privacy of authorized people. Moreover, some scenarios require that the right of a person to stay in a monitored room depends on dynamic factors that change over time. To consider these aspects, our paper proposes a video surveillance framework based on the Usage Control model. This framework enforces security policies which continuously control that the people who enter the monitored environment have the permission to stay there. Then, we present two solutions to make our video surveillance framework privacy-preserving. The first solution considers that when the security policy is violated, the video surveillance system records the video stream captured by the video cameras installed in the monitored environment. The second solution uses the Secure-Two party Computation technique to identify the people in the monitored environment in a privacy-preserving way. In this paper, we present the architecture of the proposed framework, we provide an example of Usage Control policy in a real scenario and we describe the main details of our two implementations.


Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 2016

Autori esterni: Francesco Marino (Scuola Superiore Sant’Anna, NoES-TeCIP)
Autori IIT:

Enrico Carniani

Foto di Enrico Carniani

Tipo: Contributo in rivista non ISI
Area di disciplina: Computer Science & Engineering

File: Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions.pdf

Attività: Sicurezza delle infrastrutture critiche