{"title":"一种安全的基于云的视频记录和共享方案,用于家庭安全应用","authors":"A. Jabbari, Carol Fung","doi":"10.1109/ZINC58345.2023.10174147","DOIUrl":null,"url":null,"abstract":"Security and privacy in the Internet of things (IoT) ecosystems are very serious concerns for significant applications. Today, the use of video surveillance systems to oversee and increase the security of homes and other premises has become widespread. In many of these systems, a copy of the captured videos is transmitted to the cloud storage server, where it is archived and stored. However, the data collected by these systems can be very sensitive and private, so that the owners may not want to trust the cloud in terms of video access. In some applications, such as smart home security, homeowners need to give access to several trusted users to retrieve stored videos from the cloud server in an emergency. How to manage the video access control without trusting the cloud service is a challenging problem.In order to solve the above challenge, we present a secure scheme which allows users to encrypt video footage and securely store it on the cloud server. Furthermore, by employing this scheme, a user can add other users to the system to share recorded videos with them. Moreover, the user can remove other users’ access to the videos whenever he/she wants without trusting the cloud service provider. Our security assessment shows that the proposed scheme is robust and resists various malicious attacks. Furthermore, we demonstrate that the proposed protocol is efficient and well-designed through performance analysis.","PeriodicalId":383771,"journal":{"name":"2023 Zooming Innovation in Consumer Technologies Conference (ZINC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Secure Cloud-Based Video Recording and Sharing Scheme for Home Security Applications\",\"authors\":\"A. Jabbari, Carol Fung\",\"doi\":\"10.1109/ZINC58345.2023.10174147\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security and privacy in the Internet of things (IoT) ecosystems are very serious concerns for significant applications. Today, the use of video surveillance systems to oversee and increase the security of homes and other premises has become widespread. In many of these systems, a copy of the captured videos is transmitted to the cloud storage server, where it is archived and stored. However, the data collected by these systems can be very sensitive and private, so that the owners may not want to trust the cloud in terms of video access. In some applications, such as smart home security, homeowners need to give access to several trusted users to retrieve stored videos from the cloud server in an emergency. How to manage the video access control without trusting the cloud service is a challenging problem.In order to solve the above challenge, we present a secure scheme which allows users to encrypt video footage and securely store it on the cloud server. Furthermore, by employing this scheme, a user can add other users to the system to share recorded videos with them. Moreover, the user can remove other users’ access to the videos whenever he/she wants without trusting the cloud service provider. Our security assessment shows that the proposed scheme is robust and resists various malicious attacks. Furthermore, we demonstrate that the proposed protocol is efficient and well-designed through performance analysis.\",\"PeriodicalId\":383771,\"journal\":{\"name\":\"2023 Zooming Innovation in Consumer Technologies Conference (ZINC)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 Zooming Innovation in Consumer Technologies Conference (ZINC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ZINC58345.2023.10174147\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 Zooming Innovation in Consumer Technologies Conference (ZINC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ZINC58345.2023.10174147","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Cloud-Based Video Recording and Sharing Scheme for Home Security Applications
Security and privacy in the Internet of things (IoT) ecosystems are very serious concerns for significant applications. Today, the use of video surveillance systems to oversee and increase the security of homes and other premises has become widespread. In many of these systems, a copy of the captured videos is transmitted to the cloud storage server, where it is archived and stored. However, the data collected by these systems can be very sensitive and private, so that the owners may not want to trust the cloud in terms of video access. In some applications, such as smart home security, homeowners need to give access to several trusted users to retrieve stored videos from the cloud server in an emergency. How to manage the video access control without trusting the cloud service is a challenging problem.In order to solve the above challenge, we present a secure scheme which allows users to encrypt video footage and securely store it on the cloud server. Furthermore, by employing this scheme, a user can add other users to the system to share recorded videos with them. Moreover, the user can remove other users’ access to the videos whenever he/she wants without trusting the cloud service provider. Our security assessment shows that the proposed scheme is robust and resists various malicious attacks. Furthermore, we demonstrate that the proposed protocol is efficient and well-designed through performance analysis.