Enhancing Video Surveillance with Usage Control and

Privacy-Preserving Solutions

Enrico Carniani1, Gianpiero Costantino1, Francesco Marino2, Fabio Martinelli1
+, and Paolo Mori1

 

1Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G. Moruzzi 1, Pisa, Italy

{enrico.carniani, gianpiero.costantino, fabio.martinelli, paolo.mori}@iit.cnr.it

2Scuola Superiore Sant’Anna, NoES-TeCIP, Pisa, Italy

fr.marino@sssup.it

 

 

Abstract

Nowadays, the use of video surveillance systems for protecting critical environment is becoming more and more popular. On the one hand, video surveillance systems should be able to detect the presence of unauthorized people in the monitored environments to provide effective physical security. On the other hand, video surveillance systems should be also able to preserve the privacy of authorized people. Moreover, some scenarios require that the right of a person to stay in a monitored room depends on dynamic factors that change over time. To consider these aspects, our paper proposes a video surveillance framework based on the Usage Control model. This framework enforces security policies which continuously control that the people who enter the monitored environment have the permission to stay there. Then, we present two solutions to make our video surveillance framework privacy-preserving. The first solution considers that when the security policy is violated, the video surveillance system records the video stream captured by the video cameras installed in the monitored environment. The second solution uses the Secure-Two party Computation technique to identify the people in the monitored environment in a privacy-preserving way. In this paper, we present the architecture of the proposed framework, we provide an example of Usage Control policy in a real scenario and we describe the main details of our two implementations.

Keywords: Video Surveillance, Privacy, Usage Control, Secure Two-party Computation

 

+: Corresponding author: Fabio Martinelli
Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G.

Moruzzi 1, Pisa, Italy, Tel: +39-050-3153425

 

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
Vol. 7, No. 4, pp. 20-40, December 2016 [pdf]