Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption

被引:6
作者
Rabieh, Khaled [1 ]
Mercan, Suat [2 ]
Akkaya, Kemal [2 ]
Baboolal, Vashish [2 ]
Aygun, Ramazan S. [3 ]
机构
[1] Metropolitan State Univ, Dept Comp Sci, St Paul, MN 55106 USA
[2] Florida Int Univ, Dept Elec & Comp Engn, Miami, FL 33199 USA
[3] Kennesaw State Univ, Dept Comp Sci, Marietta, GA USA
来源
2020 IEEE 21ST INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2020) | 2020年
关键词
Drones; privacy preserving; streaming; video transmission; proxy re-encryption;
D O I
10.1109/IRI49571.2020.00015
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream videos. One interesting application is the Intelligent Transportation Systems (ITS) and public safety applications where drones record videos and send them to a control center for further analysis. These videos are shared by various clients such as law enforcement or emergency personnel. In such cases, the recording might include faces of civilians or other sensitive information that might pose privacy concerns. While the video can be encrypted and stored in the cloud that way, it can still be accessed once the keys are exposed to third parties which is completely insecure. To prevent such insecurity, in this paper, we propose proxy re-encryption based sharing scheme to enable third parties to access only limited videos without having the original encryption key. The costly pairing operations in proxy re-encryption are not used to allow rapid access and delivery of the surveillance videos to third parties. The key management is handled by a trusted control center, which acts as the proxy to re-encrypt the data. We implemented and tested the approach in a realistic simulation environment using different resolutions under ns-3. The implementation results and comparisons indicate that there is an acceptable overhead while it can still preserve the privacy of drivers and passengers.
引用
收藏
页码:45 / 52
页数:8
相关论文
共 25 条
  • [1] [Anonymous], 2019, INT WORKSH CYB PHYS, P1
  • [2] [Anonymous], Multiprecision Integer and Rational Arithmetic C/C++ Library
  • [3] [Anonymous], 2017, NS 3 NETWORK SIMULAT
  • [4] [Anonymous], 2016, EXTRACTING KINEMATIC
  • [5] Barmpounakis E. N., 2016, International Journal of Transportation Science and Technology, V5, P111, DOI [DOI 10.1016/J.IJTST.2017.02.001, 10. 1016/j.ijtst.2017.02.001]
  • [6] Wi-Fly? : Detecting Privacy Invasion Attacks by Consumer Drones
    Birnbach, Simon
    Baker, Richard
    Martinovic, Ivan
    [J]. 24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017), 2017,
  • [7] Cao XC, 2014, 2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), P607, DOI 10.1109/ChinaSIP.2014.6889315
  • [8] "Spiders in the Sky": User Perceptions of Drones, Privacy, and Security
    Chang, Victoria
    Chundury, Pramod
    Chetty, Marshini
    [J]. PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 6765 - 6776
  • [10] Deng RH, 2008, LECT NOTES COMPUT SC, V5339, P1, DOI 10.1007/978-3-540-89641-8_1