References
- Jin Su Kim, Min-Gu Kim, and Sung Bum Pan, "A Study on Optimization of Intelligent Video Surveillance System based on Embedded Modul", Journal of Smart Media, Vol. 7, No. 2, pp. 40-46, Jun. 2018.
- Hyeon-in Cha, Gwangho Song, and Yoosung Kim, "A Recognition of Violence Using Mobile Sensor Fusion in Intelligent Video Surveillance Systems", Journal of KIISE, Vol. 45, No. 6, pp. 533-544, 2018. https://doi.org/10.5626/jok.2018.45.6.533
- Jinsu Kim, Sangchoon Kim, and Namje Park, "Openstack Security Techniques of Cloud Service", Conference of JCITPE, pp. 57-59, Aug. 2018.
- "Data encryption", Openstack, https://docs.openstack.org/security-guide/tenant-data/data-encryption.html.[accessed: Jan. 29, 2019]
- "Authentication procedure of open stack keystone", Zetawiki, https://zetawiki. com/wiki/%EC%98%A4%ED%94%88%EC%8A%A4%ED%83%9D_%ED%82%A4%EC%8A%A4%ED%86%A4_%EC%9D%B8%EC%A6%9D%EC%A0%88%EC%B0%A8. [accessed: Jan. 29, 2019]
- "Role-Based Access Control Overview", Openstack, https://docs.openstack.org/patrole/latest/rbac-overview. html. [accessed: Jan. 29, 2019]
- Donghyeok Lee and Namje Park, "CCTV Video Data Security Scheme for Open Distributed Cloud Environment", Conference of KSII, Vol. 19, No. 1, pp. 113-114, Apr. 2018.
- Top Threats to cloud computing, Cloud Security Alliance, pp. 8-36, 2017.
- Donghyeok Lee and Namje Park, "Proposal of Technol ogy and Policy Post-Security Management Framew ork for Secure IoT Environment", Journal of KIIT, Vol. 15, No. 4, pp. 127-138, Apr. 2017.
- OWASP, The Open Web Application Security Project, pp. 6-16, 2017.
- Tae-hwan Park, Ga-ram Lee, and Ho-won Kim, "Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment", Journal of KIISC, Vol. 27, No. 5, pp. 1149- 1155, Oct. 2017.
- "IBM Bluemix", IBM, https://www.ibm.com/cloud-computing/bluemix/ko [accessed: Jan. 28, 2019]
- "Microsoft Azure", Microsoft, https://docs.microsoft.com/ko-kr/azure/security/ azure-security. [accessed: Jan. 28, 2019]
- "Amazon Web Sevice", Amazon, https://aws.amazon.com/ko/security/ [accessed: Jan. 28, 2019]
- "Paas-Ta", PaaS-Ta, https://www.paas-ta.kr/intro/forwarding_result. [accessed: Jan. 28, 2019]
- Hyeog Jang, Taehyeon Hwang, Hunjun Yang, "Highway Incident Detection and Classification Algorithms using Multi-Channel CCTV", Journal of IEIE, Vol. 51, No. 2, pp. 23-30, 2014.
- Donghyeok Lee, Namje Park, "Similarity-based Virtual Facial Generation Method for Privacy Protection of Intelligent CCTV Environment", Journal of CISC 2017, Jun. 2017.
- Namje Park, "Privacy Enhanced CCTV Video Security Framework using Metadata Deidentification", Journal of ICICT, pp. 199-200, 2018.
- Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", International Journal of Peer-to-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, Nov. 2018.
- Donghyeok Lee and Namje Park, "ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment", International Journal of Engineering and Technology, Vol. 7, No. 2.33, pp. 151-154, Mar. 2018.
Cited by
- Block Chain Based CCTV Image Forgery · Modulation Verification Mechanism vol.17, pp.8, 2019, https://doi.org/10.14801/jkiit.2019.17.8.107
- Role Based Access Control based File Access Control Mechanism with Smart Contract vol.17, pp.9, 2019, https://doi.org/10.14801/jkiit.2019.17.9.113
- CCTV Video Privacy Protection Scheme Based on Edge Blockchain vol.17, pp.10, 2019, https://doi.org/10.14801/jkiit.2019.17.10.101
- Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System vol.17, pp.12, 2019, https://doi.org/10.14801/jkiit.2019.17.12.125
- Blockchain-Based Data-Preserving AI Learning Environment Model for AI Cybersecurity Systems in IoT Service Environments vol.10, pp.14, 2020, https://doi.org/10.3390/app10144718