Skip to main content

Enforcing Semantics-Aware Security in Multimedia Surveillance

  • Chapter
Journal on Data Semantics II

Part of the book series: Lecture Notes in Computer Science ((JODS,volume 3360))

Abstract

Continuous audio-visual surveillance is utilized to ensure the physical safety of critical infrastructures such as airports, nuclear power plants and national laboratories. In order to do so, traditional surveillance systems place cameras, microphones and other sensory input devices in appropriate locations [Sch99]. These facilities are arranged in a hierarchy of physical zones reflecting the secrecy of the guarded information. Guards in these facilities carry clearances that permit them only in appropriate zones of the hierarchy, and monitor the facilities by using devices such as hand-held displays that send streaming media of the guarded zones possibly with some instructions. The main security constraint applicable to this model is that any guard can see streams emanating from locations with secrecy levels equal to or lower than theirs, but not higher. We show how to model these surveillance requirements using the synchronized multimedia integration language (SMIL) [Aya01] with appropriate security enhancements. Our solution consists of imposing a multi-level security model on SMIL documents to specify surveillance requirements. Our access control model ensures that a multimedia stream can only be displayed on a device if the security clearance of the display device dominates the security clearance of the monitored zone. Additionally, we pre-process a set of cover stories that can be released during emergency situations that allow using the services of guards with lower clearances without disclosing data with higher sensitive levels. For this, we create a view for each level, and show that these views are semantically coherent and comply with specified security polices.

This work was partially supported by the National Science Foundation under grants CCS-0113515 and IIS-0237782.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ayars, J.: Synchronized Multimedia Integration Language. W3C Recommendation (2001), http://www.w3.org/TR/2001/REC-smil20-20010807

  2. Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-x: A java-based system for XML data protection. In: IFIP Workshop on Database Security, pp. 15–26 (2000)

    Google Scholar 

  3. Bertino, E., Hammad, M., Aref, W., Elmagarmid, A.: An access control model for video database systems. In: Conferece on Information and Knowledge Management (2002)

    Google Scholar 

  4. Bulterman, D.: Grins: A graphical interface for creating and playing smil documents. In: Proc. of Seventh Int’l World Wide Web Conf. (WWW7). Elsevier Science, New York (1998)

    Google Scholar 

  5. Damiani, E., de Vimercati, S.D.C.: Securing xml based multimedia content. In: 18th IFIP International Information Security Conference (2003)

    Google Scholar 

  6. Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–122. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine grained access control system for xml documents. In: ACM Transactions on Information and System Security, vol. 5 (2002)

    Google Scholar 

  8. Ekudden, E., Horn, U., Melander, M., Olin, J.: On-demand mobile mediaa rich service experience for mobile users

    Google Scholar 

  9. Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu, D.: An XML-based quality of service enabling language for the web (2001)

    Google Scholar 

  10. Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)

    Article  MATH  Google Scholar 

  11. Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)

    Google Scholar 

  12. Kodali, N., Wijesekera, D.: Regulating access to SMIL formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)

    Google Scholar 

  13. Kodali, N., Wijesekera, D., Michael, J.B.: SPUTERS: a secure traffic surveillance and emergency response architecture. In: Submission to the Journal of Intelligent Transportaion Systems (2003)

    Google Scholar 

  14. Lowe, G.: Defining information flow (1999)

    Google Scholar 

  15. Mulmuley, K.: Full abstraction and semantic equivalence. MIT Press, Cambridge (1987)

    Google Scholar 

  16. Mobile Internet Toolkit: Nokia, http://www.nokia.com

  17. Osborn, S.: Mandatory access control and role-based access control revisited. pp. 31–40

    Google Scholar 

  18. Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform smil player. In: International Conference on Communications, Internet and Information Technology (2002)

    Google Scholar 

  19. L. Rutledge, L. Hardman, and J. Ossenbruggen. The use of smil: Multimedia research currently applied on a global scale, 1999.

    Google Scholar 

  20. Rutledge, L., van Ossenbruggen., J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks (Amsterdam, Netherlands: 1999) 31(11-16), 1421–1430 (1999)

    Google Scholar 

  21. Sandhu, R.S.: Lattice-based access control models. IEEE Computer 26(11), 9–19 (1993)

    Google Scholar 

  22. Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. Technical Report No CSL-TR-99-781, Stanford Computer Science Department (1999)

    Google Scholar 

  23. Stoica, A., Farkas, C.: Secure XML views. In: Proc. IFIP 11.3 Working Conference on Database Security (2002)

    Google Scholar 

  24. Spymake. Integrated surveillance tools, http://www.spymakeronline.com/

  25. Mobile VCMS. Field data collection system, http://www.acrcorp.com

  26. VSAM. Video surveilance and monitoring webpage, at http://www-2.cs.cmu.edu/vsam/

  27. Wijesekera, D., Srivastava, J.: Quality of service QoS metrics for continuous media. Multimedia Tools and Applications 3(2), 127–166 (1996)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Kodali, N., Farkas, C., Wijesekera, D. (2005). Enforcing Semantics-Aware Security in Multimedia Surveillance. In: Spaccapietra, S., et al. Journal on Data Semantics II. Lecture Notes in Computer Science, vol 3360. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30567-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30567-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24208-6

  • Online ISBN: 978-3-540-30567-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics