Uda, 2020 - Google Patents
Data protection method with blockchain against fabrication of video by surveillance camerasUda, 2020
- Document ID
- 10420556053113877306
- Author
- Uda R
- Publication year
- Publication venue
- Proceedings of the 2020 2nd International Conference on Blockchain Technology
External Links
Snippet
In this paper, I propose a method for detecting violation of a regulation or an illegal action by surveillance cameras and for preventing fabrication of video records by the cameras. In this method, message digests of video records are signed and chained by blockchain for the …
- 238000004519 manufacturing process 0 title abstract description 19
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110087099B (en) | Monitoring method and system for protecting privacy | |
US10592639B2 (en) | Blockchain-based shadow images to facilitate copyright protection of digital content | |
Liu et al. | A data preservation method based on blockchain and multidimensional hash for digital forensics | |
Uda | Data protection method with blockchain against fabrication of video by surveillance cameras | |
CN102215109A (en) | Method for dynamically storing and validating digital evidences based on computer forensics | |
Myneni et al. | SCVS: On AI and edge clouds enabled privacy-preserved smart-city video surveillance services | |
Chang et al. | Smartdog: Real-time detection of smartphone theft | |
Vaciago | Cloud computing and data jurisdiction: a new challenge for digital forensics | |
CN110008655B (en) | Infringement information identification system and method based on distributed network | |
Sokolov et al. | Countering Cyberattacks During Information Operations | |
Wallace et al. | Peeling Back the Onion of Cyber Espionage After Tallinn 2.0 | |
Ottakath et al. | Enhanced computer vision applications with blockchain: A review of applications and opportunities | |
KR102130782B1 (en) | method and apparatus for storing image using block chain | |
Li et al. | Security analysis of cyber-physical system | |
US20230155987A1 (en) | Blockchain network system | |
CN112448916B (en) | Privacy protection method for preventing GAN model attack and protecting CDL training information | |
Kheraifia et al. | Blockchain-Driven Adaptive Streaming for IoT: Redefining Security in Video Delivery | |
Srisakthi et al. | Cybersecurity: Protecting Information in a Digital World | |
Rani et al. | Internet of Things (IoT) Characteristics, Applications, and Digital Forensics Investigation Process: A Review | |
Sangle et al. | Data security system in cloud by using fog computing and data mining | |
Byrd | Cybersecurity merely an afterthought in sports venue network infrastructures | |
Wang et al. | BSVMS: novel autonomous trustworthy scheme for video monitoring | |
Bin Moshiur et al. | Blockchain-based traffic surveillance footage authenticity detection system | |
Fitwi | Privacy-Preserving Surveillance as an Edge Service | |
Nicolazzo et al. | Anonymous Access Monitoring of Indoor Areas |