Protecting Privacy from Continuous High-resolution Satellite Surveillance

نویسندگان

  • Soon Ae Chun
  • Vijayalakshmi Atluri
چکیده

Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a byproduct of the use of information technologies. This paper argues that the high resolution geospatial images of our earth’s surface, produced from the earth observing satellites, can make a person visually exposed, resulting in a technological invasion of personal privacy. We propose a suitable authorization model for geospatial data (GSAM) where controlled access can be specified based on the region covered by an image with privilege modes that include view, zoom-in, overlay and identify. We demonstrate how access control can be efficiently enforced using a spatial indexing structure, called MX-RS quadtree, a variant of the MX-CIF quadtree.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Object-Oriented Method for Automatic Extraction of Road from High Resolution Satellite Images

As the information carried in a high spatial resolution image is not represented by single pixels but by meaningful image objects, which include the association of multiple pixels and their mutual relations, the object based method has become one of the most commonly used strategies for the processing of high resolution imagery. This processing comprises two fundamental and critical steps towar...

متن کامل

رعایت «حریم بیماران» توسط تیم درمان و ارتباط آن با رضایتمندی بیماران در بخش اورژانس بیمارستان

Background & Objective: Privacy is a basic humanity principle. Protecting patients;apos privacy is a necessity in health care organizations and along with the patients;apos satisfaction, is one of the main indicators of quality of care. The objective of this study was to assess patients;apos privacy protecting by medical staff and its relation to patients;apos satisfaction.Methods & Materials: ...

متن کامل

The Death of Privacy?

The rapid deployment of privacy-destroying technologies by governments and businesses threatens to make informational privacy obsolete. The first part of this article describes a range of current technologies to which the law has yet to respond effectively. These include: routine collection of transactional data, growing automated surveillance in public places, deployment of facial recognition ...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000