Browse > Article
http://dx.doi.org/10.3745/KTCCS.2020.9.12.307

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service  

Kim, Jeongseok (서울시립대학교 전자전기컴퓨터공학부)
Lee, Jaeho (서울시립대학교 전자전기컴퓨터공학부)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.9, no.12, 2020 , pp. 307-314 More about this Journal
Abstract
The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.
Keywords
Blockchain; Privacy Protection; Video Surveillance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO/IEC 23001-7:2016, Part 7: Common encryption in ISO base media file format files In Information technology - MPEG systems technologies Retrieved from https://www.iso.org/standard/68042.html
2 Alka Vishwa and Farookh Hussain, "A blockchain based approach for multimedia privacy protection and provenance," In 2018 IEEE Symposium Series on Computational Intelligence (SSCI), pp.1941-1945, Nov. 2018.
3 R. Wang, J. He, C. Liu, Q. Li, W. Tsai, and E. Deng, "A privacy-aware PKI system based on permissioned blockchains," In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), pp.928-931, Nov. 2018.
4 A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, "Medrec: Using blockchain for medical data access and permission management," In 2016 2nd International Conference on Open and Big Data (OBD), pp.25-30, Aug. 2016.
5 X. Liang, S. Shetty, D. Tosh, C. Kamhoua, K. Kwiat, and L. Njilla, "Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability," In 2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID), pp.468-477, May 2017.
6 P. Patila, P. Narayankar, N. D G and M. S M, "A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish," Procedia Computer Science, Vol.78, pp.617-624, 2016.   DOI
7 Microsoft Stream Video Delivery and Network Overview [Internet], https://docs.microsoft.com/en-us/stream/network-overview
8 B. Barnes, M. Thomson, A. Pironti, and A. Langley, "Deprecating secure sockets layer version 3.0", RFC 7568, doi: 10.17487/RFC7568, June 2015, .   DOI
9 D. C. Latham, "Department of defense trusted computer system evaluation criteria. Department of Defense," 1986.
10 Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An overview of blockchain technology: Architecture, consensus, and future trends," 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, pp.557-564, 2017.
11 G. Zyskind, O. Nathan, and A. Pentland, "Decentralizing privacy: Using blockchain to protect personal data," In 2015 IEEE Security and Privacy Workshops, pp.180-184, May 2015.