Volume 7 - Issue 4
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions
- Enrico Carniani
Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G. Moruzzi 1, Pisa, Italy
enrico.carniani@iit.cnr.it
- Gianpiero Costantino
Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G. Moruzzi 1, Pisa, Italy
gianpiero.costantino@iit.cnr.it
- Francesco Marino
Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G. Moruzzi 1, Pisa, Italy
fr.marino@sssup.it
- Fabio Martinelli
Scuola Superiore Sant’Anna, NoES-TeCIP, Pisa, Italy
fabio.martinelli@iit.cnr.it
- Paolo Mori
Istituto di Informatica e Telematica, Consiglio Nazionale delle Ricerche via G. Moruzzi 1, Pisa, Italy
paolo.mori@iit.cnr.it
Keywords: Video Surveillance, Privacy, Usage Control, Secure Two-party Computation.
Abstract
Nowadays, the use of video surveillance systems for protecting critical environment is becoming
more and more popular. On the one hand, video surveillance systems should be able to detect the
presence of unauthorized people in the monitored environments to provide effective physical security.
On the other hand, video surveillance systems should be also able to preserve the privacy of
authorized people. Moreover, some scenarios require that the right of a person to stay in a monitored
room depends on dynamic factors that change over time. To consider these aspects, our paper proposes
a video surveillance framework based on the Usage Control model. This framework enforces
security policies which continuously control that the people who enter the monitored environment
have the permission to stay there. Then, we present two solutions to make our video surveillance
framework privacy-preserving. The first solution considers that when the security policy is violated,
the video surveillance system records the video stream captured by the video cameras installed in
the monitored environment. The second solution uses the Secure-Two party Computation technique
to identify the people in the monitored environment in a privacy-preserving way. In this paper, we
present the architecture of the proposed framework, we provide an example of Usage Control policy
in a real scenario and we describe the main details of our two implementations.