skip to main content
10.1145/3556548.3559635acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

EPC: a video analytics system with efficient edge-side privacy control

Authors Info & Claims
Published:17 October 2022Publication History

ABSTRACT

Edge-cloud video analytics systems capture video streams by edge cameras and send the video streams to the cloud for analytics to support applications like video surveillance, VR/AR, autonomous driving, etc. Video streams captured at the edge may contain sensitive objects, e.g., a human being. Existing studies propose adding noise to the intermediate video analytics results, encrypting video frames, etc. In this paper, we take an orthogonal approach where we remove, a.k.a. denaturing, the sensitive objects at the edge side before sending a video frame to the cloud.

Edge devices are highly resource-constrained, and the denaturing operation has non-trivial computation costs. More specifically, before denaturing, one needs to locate the sensitive objects by object detection; such object detection computation is resource intensive. In this paper, we propose EPC, an edge-cloud video analytics system that leverages a trajectory prediction model to locate sensitive objects in video frames. We formally analyze EPC and show that EPC can guarantee privacy. We evaluate EPC with two applications, person counting and vehicle detection. Evaluation results show that EPC can prevent privacy leakage under visual data attack with 95% video analytics accuracy and a 4x speedup compared to existing privacy control mechanisms.

References

  1. Alexandre Alahi, Kratarth Goel, Vignesh Ramanathan, et al. 2016. Social LSTM: Human Trajectory Prediction in Crowded Spaces. In Proc. of IEEE/CVF CVPR '16. Las Vegas, NV, USA.Google ScholarGoogle ScholarCross RefCross Ref
  2. Holger Caesar et al. 2020. nuScenes: A Multimodal Dataset for Autonomous Driving. In Proc. of IEEE/CFV CVPR '20. Virtual Event.Google ScholarGoogle Scholar
  3. S. Cass. 2019. Taking AI to the edge: Google's TPU now comes in a maker-friendly package. IEEE Spectrum 56, 5 (2019), 16--17.Google ScholarGoogle ScholarCross RefCross Ref
  4. Sandeep D'souza, Victor Bahl, et al. 2020. Amadeus: Scalable, Privacy-Preserving Live Video Analytics. arXiv:2011.05163 (2020).Google ScholarGoogle Scholar
  5. A. Elnagar. 2001. Prediction of moving objects in dynamic environments using Kalman filters. In Proc. of CIRA '01. Banff, Canada.Google ScholarGoogle ScholarCross RefCross Ref
  6. Junru Gu et al. 2021. DenseTNT: End-to-end Trajectory Prediction from Dense Goal Sets. In Proc. of IEEE/CVF ICCV '21. Virtual Event.Google ScholarGoogle Scholar
  7. Leal-Taixé et al. 2015. MOTChallenge 2015: Towards a Benchmark for Multi-Target Tracking. arXiv:1504.01942 (2015).Google ScholarGoogle Scholar
  8. Yuanqi Li et al. 2020. Reducto: On-Camera Filtering for Resource-Efficient Real-Time Video Analytics. In Proc. of ACM SIGCOMM '20. Virtual Event.Google ScholarGoogle Scholar
  9. Francesco Marchetti, Federico Becattini, Lorenzo Seidenari, and Alberto Del Bimbo. 2020. MANTRA: Memory Augmented Networks for Multiple Trajectory Prediction. In Proc. of IEEE/CFV CVPR '20. Virtual Event.Google ScholarGoogle ScholarCross RefCross Ref
  10. Fatemehsadat Mireshghallah, Mohammadkazem Taram, et al. 2020. Shredder: Learning Noise Distributions to Protect Inference Privacy. In Proc. of ACM ASPLOS '20. Lausanne, Switzerland.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Andrey Rudenko, Luigi Palmieri, et al. 2020. Human Motion Trajectory Prediction: A Survey. IJRR 39, 8 (2020), 895--935.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Liushuai Shi, Le Wang, Chengjiang Long, Sanping Zhou, et al. 2021. SGCN: Sparse Graph Convolution Network for Pedestrian Trajectory Prediction. In Proc. of IEEE/CVF CVPR '21. Virtual Event.Google ScholarGoogle Scholar
  13. Pieter Simoens et al. 2013. Scalable Crowd-sourcing of Video from Mobile Devices. In Proc. of ACM MobiSys '13. Taipei, Taiwan.Google ScholarGoogle Scholar
  14. Kimia Tajik, Akshith Gunasekaran, Rhea Dutta, et al. 2019. Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption. In Proc. of NDSS Symposium '19. San Diego, CA, USA.Google ScholarGoogle ScholarCross RefCross Ref
  15. J. Wang et al. 2017. A scalable and privacy-aware IoT service for live video analytics. In Proc. of ACM MMSys '17. Taipei, Taiwan.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hao Wu, Xuejin Tian, et al. 2021. PECAM: Privacy-Enhanced Video Streaming and Analytics via Securely-Reversible Transformation. In Proc. of ACM MobiCom '21. New Orleans, LA, USA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Chenxin Xu, Weibo Mao, Wenjun Zhang, and Siheng Chen. 2022. Remember Intentions: Retrospective-Memory-based Trajectory Prediction. In Proc. of IEEE/CFV CVPR '22. New Orleans, LA, USA.Google ScholarGoogle ScholarCross RefCross Ref
  18. Guangsheng Zhang, Bo Liu, Tianqing Zhu, Andi Zhou, and Wanlei Zhou. 2022. Visual privacy attacks and defenses in deep learning: a survey. Artificial Intelligence Review 55, 6 (01 Aug 2022), 4347--4401.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bolei Zhou et al. 2016. Learning Deep Features for Discriminative Localization. In Proc. of IEEE/CFV CVPR '16. Las Vegas, NV, USA.Google ScholarGoogle Scholar

Index Terms

  1. EPC: a video analytics system with efficient edge-side privacy control

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiArch '22: Proceedings of the 17th ACM Workshop on Mobility in the Evolving Internet Architecture
      October 2022
      69 pages
      ISBN:9781450395182
      DOI:10.1145/3556548

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate47of92submissions,51%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader