Towards a Trustworthy Privacyin Pervasive Video Surveillance SystemsAntoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Pu...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
UNESCO Chair in Data Privacy    Universal Declaration of Human Rights (1948)      – “No one shall be subjected to arbitrar...
UNESCO Chair in Data Privacy    Unfortunately…      – Lack of awareness of the population on the existing        privacy t...
UNESCO Chair in Data Privacy    Chair aims and goals      – Promote the adoption of privacy-preserving        technologies...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
Privacy in Video Surveillance    Example scenario                                                                         ...
Privacy in Video Surveillance    Pervasive technology scenario                                                            ...
Privacy in Video Surveillance    Typical “privacy” technologies in VS      – Face/people detection      – Blurring/Encrypt...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
Trustworthy ICT?    The goal of VS is security    Security vs privacy...      – Is people happy while being monitored?    ...
Trustworthy ICT?    Is technology reliable?      – “The degree to which a trustor has a justifiable belief        that the...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
(I) Technology: algorithms and platform    Trusted Platform Module chips      – Can be used to build a plethora of trustab...
(I) Technology: algorithms and platform    In the case of VS, computer vision techniques...      – Must work in real time....
(I) Technology: algorithms and platform    Fortunately...      – There are techniques to detect ROIs in realtime      – An...
(I) Technology: algorithms and platform    The platform must fulfil some properties, namely      – Confidentiality, authen...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
Law enforcement    Directive 95/46/EC on the protection of individuals    with regard to the processing of personal data a...
Law enforcement    Spanish legislation      – Surveillance must be advertised      – The owner must take the necessary pre...
Law enforcement    A trust score for VS                       IMAGE PROTECTION                                 DATA ACCESS...
Law enforcement                         IMAGE PROTECTION LOW                         DATA ACCESS HIGH                     ...
Content    UNESCO Chair in Data Privacy    Privacy in Video Surveillance    Trustworthy ICT?    (I) Technology: algorithms...
User collaboration    User collaboration is natural in state-of-art internet    services:      – Collaborative recommendat...
User collaboration    Smartphone and web application         surveillance           camera                                ...
User collaboration    Smartphone and web applicationTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
DISCUSSIONTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
Upcoming SlideShare
Loading in …5
×

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

553 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
553
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

  1. 1. Towards a Trustworthy Privacyin Pervasive Video Surveillance SystemsAntoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Puig, Antonia Paniza Universitat Rovira i Virgili Universitat de les Illes Balears
  2. 2. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  3. 3. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  4. 4. UNESCO Chair in Data Privacy Universal Declaration of Human Rights (1948) – “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks” Data privacy technologies are about technically enforcing the above right in the information societyTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  5. 5. UNESCO Chair in Data Privacy Unfortunately… – Lack of awareness of the population on the existing privacy threats (profiling, tracking, etc.) – Large companies and the “Big Brother” effect – Lack of comprehensive legislationTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  6. 6. UNESCO Chair in Data Privacy Chair aims and goals – Promote the adoption of privacy-preserving technologies by governments and private sectors (telecoms, banks, etc.) – Raise the public awareness of the need and the right to preserve the privacy of the individuals – Promote cross-national research on privacy technologies We are mainly focused on technologiesTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  7. 7. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  8. 8. Privacy in Video Surveillance Example scenario Pre surveillance processing camera Identification Video Processing Module Content protection Information System Security Management Module User Trusted ManagerTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  9. 9. Privacy in Video Surveillance Pervasive technology scenario surveillance Pre processing camera Pre surveillance processing camera Identification Identification Video Processing Module Video Processing Module Content Content protection protection surveillance Pre Information System Information System processing camera Security Management Module Identification Video Processing Module Security Management Module Content User protection Information System Trusted Manager Security Management Module User Trusted Manager User Trusted Manager Pre surveillance processing camera Pre surveillance processing camera Identification Video Processing Module Identification Content protection Video Processing Module Information System Content protection Information System Pre surveillance processing Security Management Module camera Security Management Module Identification User Video Processing Module Trusted Manager User Content protection Information System Trusted Manager Security Management Module User Trusted ManagerTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  10. 10. Privacy in Video Surveillance Typical “privacy” technologies in VS – Face/people detection – Blurring/Encryption But… – Are people notified they are being recorded? – Is the access to the raw/encrypted data correctly managed? – Do the video processing techniques really ensure privacy of individuals?Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  11. 11. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  12. 12. Trustworthy ICT? The goal of VS is security Security vs privacy... – Is people happy while being monitored? – Does people feel safe while being under surveillance?Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  13. 13. Trustworthy ICT? Is technology reliable? – “The degree to which a trustor has a justifiable belief that the trustee will provide the expected function or service” Technology problems? Owner misbehaviors? – Are individuals protected by the law? Lack of legislation can certainly slow down the social acceptance of ICT Social acceptance vs. User collaboration – Web 2.0 trust is based on collaboration of usersTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  14. 14. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  15. 15. (I) Technology: algorithms and platform Trusted Platform Module chips – Can be used to build a plethora of trustable devices – For instance, trustworthy cameras – But they could be hacked... Pre surveillance processing camera Identification Video Processing Module Content protection Information SystemTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  16. 16. (I) Technology: algorithms and platform In the case of VS, computer vision techniques... – Must work in real time. If the technique needs some temporary storage of the raw video, a security leak of the information system can compromise the privacy of the individuals. – Must perform well in terms of accuracy. (i) Must detect ALL the ROIs (e.g. Faces). (ii) Should not need human supervision.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  17. 17. (I) Technology: algorithms and platform Fortunately... – There are techniques to detect ROIs in realtime – And capable of detecting them correctly! But... – Camera conditions are essential: fixed cameras, good illumination conditions, etc. – Some of the literature does not tackle these issues! – Some of the proposals blur ROIs in the pixel domain and raw video is stored and accessible to authorized users.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  18. 18. (I) Technology: algorithms and platform The platform must fulfil some properties, namely – Confidentiality, authenticity, integrity – Security Access Symmetric Encryption Public Key Cryptography Video Processing Module Information System Trusted Certification Authorities Security Management Module Secure Logging User Trusted ManagerTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  19. 19. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  20. 20. Law enforcement Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and on the free movement of such data – Any information relating to an identified or identifiable natural person can be seen as personal data – A picture can be considered personal data if it allows identification of individualsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  21. 21. Law enforcement Spanish legislation – Surveillance must be advertised – The owner must take the necessary precautions to ensure the safety of the images and prevent alteration, loss or unauthorized access – Data cannot be released to third parties Does the owner behave properly?Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  22. 22. Law enforcement A trust score for VS IMAGE PROTECTION DATA ACCESS High trust + notification High trust. ROIs are In case of identification hidden, no supervision / no real time High trust. Anyone accesses the protected data, auhorized users access original data. Low trust. ROIs are hidden, Low trust. Only but human supervision is authorized users can needed / no real time access ALL THE DATA No trust. ROIs are not No trust. Anyone can hidden access the original dataTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  23. 23. Law enforcement IMAGE PROTECTION LOW DATA ACCESS HIGH Data is protected and sent to SECURITAS. Original data is only available to police.Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  24. 24. Content UNESCO Chair in Data Privacy Privacy in Video Surveillance Trustworthy ICT? (I) Technology: algorithms and platform (II) Law enforcement (III) User collaboration DiscussionTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  25. 25. User collaboration User collaboration is natural in state-of-art internet services: – Collaborative recommendation systems – Collaborative privacy techniques: Instead of trusting a third party, users collaborate to gain privacy. It is interesting that users are informed upon being recorded by VS systemsTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  26. 26. User collaboration Smartphone and web application surveillance camera Tag Validate Server Database User Application Inform web Web interface browserTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  27. 27. User collaboration Smartphone and web applicationTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems
  28. 28. DISCUSSIONTowards a Trustworthy Privacy in Pervasive Video Surveillance Systems

×