Abstract
Continuous audio-visual surveillance is utilized to ensure the physical safety of critical infrastructures such as airports, nuclear power plants and national laboratories. In order to do so, traditional surveillance systems place cameras, microphones and other sensory input devices in appropriate locations [Sch99]. These facilities are arranged in a hierarchy of physical zones reflecting the secrecy of the guarded information. Guards in these facilities carry clearances that permit them only in appropriate zones of the hierarchy, and monitor the facilities by using devices such as hand-held displays that send streaming media of the guarded zones possibly with some instructions. The main security constraint applicable to this model is that any guard can see streams emanating from locations with secrecy levels equal to or lower than theirs, but not higher. We show how to model these surveillance requirements using the synchronized multimedia integration language (SMIL) [Aya01] with appropriate security enhancements. Our solution consists of imposing a multi-level security model on SMIL documents to specify surveillance requirements. Our access control model ensures that a multimedia stream can only be displayed on a device if the security clearance of the display device dominates the security clearance of the monitored zone. Additionally, we pre-process a set of cover stories that can be released during emergency situations that allow using the services of guards with lower clearances without disclosing data with higher sensitive levels. For this, we create a view for each level, and show that these views are semantically coherent and comply with specified security polices.
This work was partially supported by the National Science Foundation under grants CCS-0113515 and IIS-0237782.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ayars, J.: Synchronized Multimedia Integration Language. W3C Recommendation (2001), http://www.w3.org/TR/2001/REC-smil20-20010807
Bertino, E., Braun, M., Castano, S., Ferrari, E., Mesiti, M.: Author-x: A java-based system for XML data protection. In: IFIP Workshop on Database Security, pp. 15–26 (2000)
Bertino, E., Hammad, M., Aref, W., Elmagarmid, A.: An access control model for video database systems. In: Conferece on Information and Knowledge Management (2002)
Bulterman, D.: Grins: A graphical interface for creating and playing smil documents. In: Proc. of Seventh Int’l World Wide Web Conf. (WWW7). Elsevier Science, New York (1998)
Damiani, E., de Vimercati, S.D.C.: Securing xml based multimedia content. In: 18th IFIP International Information Security Conference (2003)
Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Securing XML documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–122. Springer, Heidelberg (2000)
Damiani, E., de Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine grained access control system for xml documents. In: ACM Transactions on Information and System Security, vol. 5 (2002)
Ekudden, E., Horn, U., Melander, M., Olin, J.: On-demand mobile mediaa rich service experience for mobile users
Gu, X., Nahrstedt, K., Yuan, W., Wichadakul, D., Xu, D.: An XML-based quality of service enabling language for the web (2001)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)
Kodali, N., Farkas, C., Wijesekera, D.: Enforcing integrity in multimedia surveillance. In: IFIP 11.5 Working Conference on Integrity and Internal Control in Information Systems (2003)
Kodali, N., Wijesekera, D.: Regulating access to SMIL formatted pay-per-view movies. In: 2002 ACM Workshop on XML Security (2002)
Kodali, N., Wijesekera, D., Michael, J.B.: SPUTERS: a secure traffic surveillance and emergency response architecture. In: Submission to the Journal of Intelligent Transportaion Systems (2003)
Lowe, G.: Defining information flow (1999)
Mulmuley, K.: Full abstraction and semantic equivalence. MIT Press, Cambridge (1987)
Mobile Internet Toolkit: Nokia, http://www.nokia.com
Osborn, S.: Mandatory access control and role-based access control revisited. pp. 31–40
Pihkala, K., Cesar, P., Vuorimaa, P.: Cross platform smil player. In: International Conference on Communications, Internet and Information Technology (2002)
L. Rutledge, L. Hardman, and J. Ossenbruggen. The use of smil: Multimedia research currently applied on a global scale, 1999.
Rutledge, L., van Ossenbruggen., J., Hardman, L., Bulterman, D.C.A.: Anticipating SMIL 2.0: the developing cooperative infrastructure for multimedia on the Web. Computer Networks (Amsterdam, Netherlands: 1999) 31(11-16), 1421–1430 (1999)
Sandhu, R.S.: Lattice-based access control models. IEEE Computer 26(11), 9–19 (1993)
Schmidt, B.K.: An architecture for distributed, interactive, multi-stream, multi-participant audio and video. Technical Report No CSL-TR-99-781, Stanford Computer Science Department (1999)
Stoica, A., Farkas, C.: Secure XML views. In: Proc. IFIP 11.3 Working Conference on Database Security (2002)
Spymake. Integrated surveillance tools, http://www.spymakeronline.com/
Mobile VCMS. Field data collection system, http://www.acrcorp.com
VSAM. Video surveilance and monitoring webpage, at http://www-2.cs.cmu.edu/vsam/
Wijesekera, D., Srivastava, J.: Quality of service QoS metrics for continuous media. Multimedia Tools and Applications 3(2), 127–166 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Kodali, N., Farkas, C., Wijesekera, D. (2005). Enforcing Semantics-Aware Security in Multimedia Surveillance. In: Spaccapietra, S., et al. Journal on Data Semantics II. Lecture Notes in Computer Science, vol 3360. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30567-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-30567-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24208-6
Online ISBN: 978-3-540-30567-5
eBook Packages: Computer ScienceComputer Science (R0)