Enforcing Semantics-Aware Security in Multimedia Surveillance

نویسندگان

  • Naren Kodali
  • Csilla Farkas
  • Duminda Wijesekera
چکیده

Continuous audio-visual surveillance is utilized to ensure the physical safety of critical infrastructures such as airports, nuclear power plants and national laboratories. In order to do so, traditional surveillance systems place cameras, microphones and other sensory input devices in appropriate locations [Sch99]. These facilities are arranged in a hierarchy of physical zones reflecting the secrecy of the guarded information. Guards in these facilities carry clearances that permit them only in appropriate zones of the hierarchy, and monitor the facilities by using devices such as hand-held displays that send streaming media of the guarded zones possibly with some instructions. The main security constraint applicable to this model is that any guard can see streams emanating from locations with secrecy levels equal to or lower than theirs, but not higher. We show how to model these surveillance requirements using the synchronized multimedia integration language (SMIL) [Aya01] with appropriate security enhancements. Our solution consists of imposing a multi-level security model on SMIL documents to specify surveillance requirements. Our access control model ensures that a multimedia stream can only be displayed on a device if the security clearance of the display device dominates the security clearance of the monitored zone. Additionally, we pre-process a set of cover stories that can be released during emergency situations that allow using the services of guards with lower clearances without disclosing data with higher sensitive levels. For this, we create a view for each level, and show that these views are semantically coherent and comply with specified security polices.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MLS-SMIL for Electronic Surveillance of Facilities with Multi-Level Security Requirements

We propose a framework that provides controlled distribution of live multimedia data to display devices with different access permissions for physical surveillance of multi-level secure facilities. Our proposal uses cameras and microphones as input devices and handheld radio linked displays as output devices. The geographical location of an input device determines its security level and the cla...

متن کامل

SECRETS: A Secure Real-Time Multimedia Surveillance System

We propose a surveillance framework (SECRETS : SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and control centers, missile storage facilities of a military base, traffic controller units of airports and other high-volume public areas by providing controlled secure distribution of live multimedia data recorded on-...

متن کامل

Protecting People on the Move through Virtual Personal Security

Ensuring personal safety for people on the move is becoming a heightened priority in today’s uncertain environment. Traditional approaches are no longer adequate in meeting rising demands in personal security. In this paper, we describe VIRTUAL PERSONAL SECURITY, a research prototype that demonstrates how technologies, such as ubiquitous surveillance cameras, location-aware PDAs and cell phones...

متن کامل

Secure Surveillance using SMIL

The role of multimedia and user interactivity has increased in recent years. User interaction is an important component of emerging multimedia systems, and the methods of interaction will become increasingly complex as they are being used in more diverse applications. One such application is surveillance, both in the civil as well as the military domain. The real-time three-dimensional stereovi...

متن کامل

Mesh Based Multicast Routing Scheme for Enhancing Qos and Security While Routing in Mobile Ad Hoc Network

A Mobile Ad hoc network (MANET) is a self-configurable network connected by wireless links. This type of network is only suitable for temporary communication links as it is infrastructure-less and there is no centralized control. Providing QoS and security aware routing is a challenging task in this type of network due to dynamic topology and limited resources. The main purpose of QoS aware rou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Data Semantics

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2005