DOI QR코드

DOI QR Code

Intelligent Video Surveillance Incubating Security Mechanism in Open Cloud Environments

개방형 클라우드 환경의 지능형 영상감시 인큐베이팅 보안 메커니즘 구조

  • 김진수 (강원대학교 대학원 정보통신공학전공.제주대학교 사이버보안인재교육원) ;
  • 박남제 (제주대학교 초등교육학과)
  • Received : 2019.02.08
  • Accepted : 2019.05.03
  • Published : 2019.05.31

Abstract

Most of the public and private buildings in Korea are installing CCTV for crime prevention and follow-up action, insider security, facility safety, and fire prevention, and the number of installations is increasing each year. In the questionnaire conducted on the increasing CCTV, many reactions were positive in terms of the prevention of crime that could occur due to the installation, rather than negative views such as privacy violation caused by CCTV shooting. However, CCTV poses a lot of privacy risks, and when the image data is collected using the cloud, the personal information of the subject can be leaked. InseCam relayed the CCTV surveillance video of each country in real time, including the front camera of the notebook computer, which caused a big issue. In this paper, we introduce a system to prevent leakage of private information and enhance the security of the cloud system by processing the privacy technique on image information about a subject photographed through CCTV.

국내 대다수의 공공장소 및 사유건물은 범죄 예방 및 사후 조치, 내부자 보안, 시설안전 및 화재 예방 등을 위해 CCTV(Closed Circuit Television)를 설치하고 있으며, 매년 설치 대수는 늘어나는 추세이다. 늘어나는 CCTV에 대하여 진행된 설문에서는 다수의 반응이 CCTV의 촬영으로 인한 프라이버시 침해 등의 부정적 시선보다 설치로 인해 발생할 수 있는 범죄의 예방적 측면에서 긍정적으로 보고 있다. 하지만 CCTV는 프라이버시 측면에서 많은 위험성을 내포하고 있으며, 클라우드를 이용하여 영상 데이터를 수집할 경우 피사체의 개인정보가 유출될 수 있다. 인세캠은 각국의 CCTV 감시 영상을 실시간으로 중계하였으며, 중계 대상에는 노트북의 전면카메라까지 포함되어 큰 이슈를 불러일으켰다. 본 논문에서는 CCTV를 통해 영상정보에 대한 프라이버시 기법 처리를 통한 개인정보 유출 방지 및 클라우드 시스템 보안성 강화를 위한 시스템을 소개하기로 한다.

Keywords

References

  1. Jin Su Kim, Min-Gu Kim, and Sung Bum Pan, "A Study on Optimization of Intelligent Video Surveillance System based on Embedded Modul", Journal of Smart Media, Vol. 7, No. 2, pp. 40-46, Jun. 2018.
  2. Hyeon-in Cha, Gwangho Song, and Yoosung Kim, "A Recognition of Violence Using Mobile Sensor Fusion in Intelligent Video Surveillance Systems", Journal of KIISE, Vol. 45, No. 6, pp. 533-544, 2018. https://doi.org/10.5626/jok.2018.45.6.533
  3. Jinsu Kim, Sangchoon Kim, and Namje Park, "Openstack Security Techniques of Cloud Service", Conference of JCITPE, pp. 57-59, Aug. 2018.
  4. "Data encryption", Openstack, https://docs.openstack.org/security-guide/tenant-data/data-encryption.html.[accessed: Jan. 29, 2019]
  5. "Authentication procedure of open stack keystone", Zetawiki, https://zetawiki. com/wiki/%EC%98%A4%ED%94%88%EC%8A%A4%ED%83%9D_%ED%82%A4%EC%8A%A4%ED%86%A4_%EC%9D%B8%EC%A6%9D%EC%A0%88%EC%B0%A8. [accessed: Jan. 29, 2019]
  6. "Role-Based Access Control Overview", Openstack, https://docs.openstack.org/patrole/latest/rbac-overview. html. [accessed: Jan. 29, 2019]
  7. Donghyeok Lee and Namje Park, "CCTV Video Data Security Scheme for Open Distributed Cloud Environment", Conference of KSII, Vol. 19, No. 1, pp. 113-114, Apr. 2018.
  8. Top Threats to cloud computing, Cloud Security Alliance, pp. 8-36, 2017.
  9. Donghyeok Lee and Namje Park, "Proposal of Technol ogy and Policy Post-Security Management Framew ork for Secure IoT Environment", Journal of KIIT, Vol. 15, No. 4, pp. 127-138, Apr. 2017.
  10. OWASP, The Open Web Application Security Project, pp. 6-16, 2017.
  11. Tae-hwan Park, Ga-ram Lee, and Ho-won Kim, "Survey and Prospective on Privacy Protection Methods on Cloud Platform Environment", Journal of KIISC, Vol. 27, No. 5, pp. 1149- 1155, Oct. 2017.
  12. "IBM Bluemix", IBM, https://www.ibm.com/cloud-computing/bluemix/ko [accessed: Jan. 28, 2019]
  13. "Microsoft Azure", Microsoft, https://docs.microsoft.com/ko-kr/azure/security/ azure-security. [accessed: Jan. 28, 2019]
  14. "Amazon Web Sevice", Amazon, https://aws.amazon.com/ko/security/ [accessed: Jan. 28, 2019]
  15. "Paas-Ta", PaaS-Ta, https://www.paas-ta.kr/intro/forwarding_result. [accessed: Jan. 28, 2019]
  16. Hyeog Jang, Taehyeon Hwang, Hunjun Yang, "Highway Incident Detection and Classification Algorithms using Multi-Channel CCTV", Journal of IEIE, Vol. 51, No. 2, pp. 23-30, 2014.
  17. Donghyeok Lee, Namje Park, "Similarity-based Virtual Facial Generation Method for Privacy Protection of Intelligent CCTV Environment", Journal of CISC 2017, Jun. 2017.
  18. Namje Park, "Privacy Enhanced CCTV Video Security Framework using Metadata Deidentification", Journal of ICICT, pp. 199-200, 2018.
  19. Donghyeok Lee, Namje Park, Geonwoo Kim, and Seunghun Jin, "De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment", International Journal of Peer-to-Peer Networking and Applications, Vol. 11, No. 6, pp. 1299-1308, Nov. 2018.
  20. Donghyeok Lee and Namje Park, "ROI-based efficient video data processing for large-scale cloud storage in intelligent CCTV environment", International Journal of Engineering and Technology, Vol. 7, No. 2.33, pp. 151-154, Mar. 2018.

Cited by

  1. Block Chain Based CCTV Image Forgery · Modulation Verification Mechanism vol.17, pp.8, 2019, https://doi.org/10.14801/jkiit.2019.17.8.107
  2. Role Based Access Control based File Access Control Mechanism with Smart Contract vol.17, pp.9, 2019, https://doi.org/10.14801/jkiit.2019.17.9.113
  3. CCTV Video Privacy Protection Scheme Based on Edge Blockchain vol.17, pp.10, 2019, https://doi.org/10.14801/jkiit.2019.17.10.101
  4. Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System vol.17, pp.12, 2019, https://doi.org/10.14801/jkiit.2019.17.12.125
  5. Blockchain-Based Data-Preserving AI Learning Environment Model for AI Cybersecurity Systems in IoT Service Environments vol.10, pp.14, 2020, https://doi.org/10.3390/app10144718