IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Youssef Khazbak, Junpeng Qiu, Tianxiang Tan, Guohong Cao
{"title":"TargetFinder","authors":"Youssef Khazbak, Junpeng Qiu, Tianxiang Tan, Guohong Cao","doi":"10.1145/3375878","DOIUrl":null,"url":null,"abstract":"With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find interested targets (e.g., crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity of IoT cameras such as dash mounted and phone cameras, the crowdsourced videos have much better spatial coverage compared to only using surveillance cameras, and, thus, can significantly improve the effectiveness of target search. However, this may raise privacy concerns when workers (owners of IoT cameras) are provided with photos of the target. Also, the videos captured by the workers may be misused to track bystanders. To address this problem, we design and implement TargetFinder, a privacy preserving system for target search through IoT cameras. By exploiting homomorphic encryption techniques, the server can search for the target on encrypted information. We also propose techniques to allow the requester (e.g., the police) to receive images that include the target, while all other captured images of the bystanders are not revealed. Moreover, the target’s face image is not revealed to the server and the participating workers. Due to the high computation overhead of the cryptographic primitives, we develop optimization techniques in order to run our privacy preserving protocol on mobile devices. We also formulate and solve a worker selection problem to maximize the probability of finding the target under some budget constraint. A real-world demo and extensive evaluations demonstrate the effectiveness of TargetFinder.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"1 1","pages":"1 - 23"},"PeriodicalIF":3.5000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3375878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 8

摘要

随着物联网摄像头的普及,可以使用众包视频来帮助找到感兴趣的目标(例如,犯罪嫌疑人、丢失的孩子、丢失的车辆)。由于物联网摄像头(如仪表板摄像头和手机摄像头)无处不在,众包视频与仅使用监控摄像头相比具有更好的空间覆盖范围,因此可以显着提高目标搜索的有效性。然而,当工作人员(物联网摄像头的所有者)提供目标的照片时,这可能会引起隐私问题。此外,工作人员拍摄的视频可能会被滥用来追踪旁观者。为了解决这个问题,我们设计并实现了TargetFinder,这是一个通过物联网摄像头进行目标搜索的隐私保护系统。通过利用同态加密技术,服务器可以在加密信息上搜索目标。我们还提出了一些技术,允许请求者(例如警察)接收包含目标的图像,而不显示所有其他捕获的旁观者图像。此外,目标的面部图像不向服务器和参与工作人员透露。由于加密原语的高计算开销,我们开发了优化技术,以便在移动设备上运行我们的隐私保护协议。在一定的预算约束下,构造并求解了一个工人选择问题,使找到目标的概率最大化。一个真实世界的演示和广泛的评估证明了TargetFinder的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
TargetFinder
With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find interested targets (e.g., crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity of IoT cameras such as dash mounted and phone cameras, the crowdsourced videos have much better spatial coverage compared to only using surveillance cameras, and, thus, can significantly improve the effectiveness of target search. However, this may raise privacy concerns when workers (owners of IoT cameras) are provided with photos of the target. Also, the videos captured by the workers may be misused to track bystanders. To address this problem, we design and implement TargetFinder, a privacy preserving system for target search through IoT cameras. By exploiting homomorphic encryption techniques, the server can search for the target on encrypted information. We also propose techniques to allow the requester (e.g., the police) to receive images that include the target, while all other captured images of the bystanders are not revealed. Moreover, the target’s face image is not revealed to the server and the participating workers. Due to the high computation overhead of the cryptographic primitives, we develop optimization techniques in order to run our privacy preserving protocol on mobile devices. We also formulate and solve a worker selection problem to maximize the probability of finding the target under some budget constraint. A real-world demo and extensive evaluations demonstrate the effectiveness of TargetFinder.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.20
自引率
3.70%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信