Browse > Article
http://dx.doi.org/10.15207/JKCS.2020.11.3.077

Security Framework for Intelligent Predictive Surveillance Systems  

Park, Jeonghun (Dept. of Conv. Infor. Security, Graduate Sch., Jeju Natl. University)
Park, Namje (Dept. of Computer Education, Teachers College, Jeju Natl. University)
Publication Information
Journal of the Korea Convergence Society / v.11, no.3, 2020 , pp. 77-83 More about this Journal
Abstract
Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.
Keywords
Predictive Surveillance System; Security Framework; Cloud System; CCTV; Intelligent Surveillance;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Lin, C. F., Yuan, S. M., Leu, M. C. & Tsai, C. T. (2012). A framework for scalable cloud video recorder system in surveillance environment. In Ubiquitous intelligence & computing and 9th international conference on autonomic & trusted computing (UIC/ATC), IEEE, 655-660.
2 M. Anwar Hossain. (2014). Framework for a cloud-based multimedia surveillance system. International Journal of Distributed Sensor Networks, 10(5), 1-11.
3 D. Lee & N. Park. (2017). Geocasting-based synchronization of Almanac on the maritime cloud for distributed smart surveillance. The Journal of Supercomputing, 73(3), 1103-1118.   DOI
4 J. Kim, N. Park, G. Kim & S. Jin. (2019). CCTV video processing metadata security scheme using character order preserving transformation in the emerging multimedia. Electronics, 8(4), 412.   DOI
5 D. Lee. (2018). A Privacy Enhanced Video Surveillance Framework using Metadata De-identification, Doctoral dissertation. Jeju National University, Korea.
6 N. Park, B. G. Kim & J. S. Kim. (2019). A Mechanism of Masking Identification Information Regarding Moving Objects Recorded on Visual Surveillance Systems by Differentially Implementing Access Permission. Electronics, 8(7), 735.   DOI
7 D. Lee, N. Park, G. Kim & S. Jin. (2018). De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. Peer-To-Peer Networking and Applications, 11(6), 1299-1308.   DOI
8 N. Park, H. Hu & Q. Jin. (2016). Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT). International Distributed Sensor Networks [Online], https://doi.org/10.1155/2016/2965438
9 N. Park, J. Kwak, S. Kim, D. Won & H. Kim. (2006). WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. Advanced Web and Network Technologies, and Applications, LNCS, 741-748.
10 D. Lee & N. Park. (2018). Electronic Identity Information Hiding Methods Using a Secret Sharing Scheme in Multimedia-centric Internet of Things Environment. Personal and Ubiquitous Computing, 22(1), 3-10.   DOI
11 N. Park & N. Kang. (2015). Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle. Sensors, 16(1), 1-16.   DOI
12 N. Park, Y. Sung, Y. Jeong, S. B. Shin & C. Kim. (2018). The Analysis of the Appropriateness of Information Education Curriculum Standard Model for Elementary School in Korea. International Conference on Computer and Information Science, 791, 1-15.
13 J. Kim & N. Park. (2019). Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing. Personal and Ubiquitous Computing, 1-9.
14 N. Park & M. Kim. (2014). Implementation of load management application system using smart grid privacy policy in energy management service environment. Cluster Computing, 17(3), 653-664.   DOI
15 M. G. Ball, B. Qela & S. Wesolkowski. (2016). A review of the use of computational intelligence in the design of military surveillance networks. Recent Advances in Computational Intelligence in Defense and Security, Springer, 663-693.
16 Kokkonis. George et al. (2017). Real-time wireless multisensory smart surveillance with 3D-HEVC streams for internet-of-things (IoT). The Journal of Supercomputing, 73(3), 1044-1062.   DOI
17 Sathishkumar. M. & S. Rajini. (2015). Smart surveillance system using pir sensor network and gsm. International Journal of Advnced Research in Computer Engineering & Technology, 4(1), 70-74.
18 Nagothu. Deeraj et al. (2018). A microservice-enabled architecture for smart surveillance using blockchain technology. IEEE International Smart Cities Conference (ISC2), IEEE, 1-4.
19 Campbell, Dan et al. (2016). Command and Control, Cyber, Communications, Intelligence, Surveillance and Reconnaissance (CRISR) and Cyber Tactical Measures. GEORGIA TECH RESEARCH INSTITUTE (GTRI), AFRL-RI-RS-TR-2016-209, Atlanta United States.