Preserving Privacy of Drone Videos using Proxy Re-encryption Technique

被引:4
作者
Baboolal, Vashish [1 ]
Akkaya, Kemal [1 ]
Saputro, Nico [1 ]
Rabieh, Khaled [2 ]
机构
[1] Florida Int Univ, Dept ECE, Miami, FL 33174 USA
[2] Sam Houston State Univ, Dept Comp Sci, Huntsville, TX 77341 USA
来源
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19) | 2019年
关键词
Drone; privacy; video transmission; proxy re-encryption;
D O I
10.1145/3317549.3326319
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream video. One of such applications is the Intelligent Transportation Systems (ITS) where drones may need to record videos and send a control center to be shared by various clients such as law enforcement or emergency personnel. In such cases, the recording might include faces of civilians or other sensitive information that might pose privacy concerns. While the video can be encrypted and stored in the cloud that way, it can still be accessed once the keys are exposed to third parties. To prevent such cases, in this paper, we propose a proxy re-encryption technique that will provide a key to third parties that can be used only once to access the videos. The key management is handled by a trusted control center. The implementation results indicate that there is almost no additional overhead with the approach while it can still preserve the privacy.
引用
收藏
页码:336 / 337
页数:2
相关论文
共 6 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
Cao XC, 2014, 2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), P607, DOI 10.1109/ChinaSIP.2014.6889315
[3]  
Dodis Y., 2003, Network and Distributed System Security Symposium
[4]   An efficient privacy protection scheme for data security in video surveillance [J].
Du, Ling ;
Zhang, Wei ;
Fu, Huazhu ;
Ren, Wenqi ;
Zhang, Xinpeng .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2019, 59 :347-362
[5]  
Itseez, 2015, Open source computer vision library
[6]   UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges [J].
Menouar, Hamid ;
Guvenc, Ismail ;
Akkaya, Kemal ;
Uluagac, A. Selcuk ;
Kadri, Abdullah ;
Tuncer, Adem .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) :22-28