Uda, 2020 - Google Patents

Data protection method with blockchain against fabrication of video by surveillance cameras

Uda, 2020

Document ID
10420556053113877306
Author
Uda R
Publication year
Publication venue
Proceedings of the 2020 2nd International Conference on Blockchain Technology

External Links

Snippet

In this paper, I propose a method for detecting violation of a regulation or an illegal action by surveillance cameras and for preventing fabrication of video records by the cameras. In this method, message digests of video records are signed and chained by blockchain for the …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
CN110087099B (en) Monitoring method and system for protecting privacy
US10592639B2 (en) Blockchain-based shadow images to facilitate copyright protection of digital content
Liu et al. A data preservation method based on blockchain and multidimensional hash for digital forensics
Uda Data protection method with blockchain against fabrication of video by surveillance cameras
CN102215109A (en) Method for dynamically storing and validating digital evidences based on computer forensics
Myneni et al. SCVS: On AI and edge clouds enabled privacy-preserved smart-city video surveillance services
Chang et al. Smartdog: Real-time detection of smartphone theft
Vaciago Cloud computing and data jurisdiction: a new challenge for digital forensics
CN110008655B (en) Infringement information identification system and method based on distributed network
Sokolov et al. Countering Cyberattacks During Information Operations
Wallace et al. Peeling Back the Onion of Cyber Espionage After Tallinn 2.0
Ottakath et al. Enhanced computer vision applications with blockchain: A review of applications and opportunities
KR102130782B1 (en) method and apparatus for storing image using block chain
Li et al. Security analysis of cyber-physical system
US20230155987A1 (en) Blockchain network system
CN112448916B (en) Privacy protection method for preventing GAN model attack and protecting CDL training information
Kheraifia et al. Blockchain-Driven Adaptive Streaming for IoT: Redefining Security in Video Delivery
Srisakthi et al. Cybersecurity: Protecting Information in a Digital World
Rani et al. Internet of Things (IoT) Characteristics, Applications, and Digital Forensics Investigation Process: A Review
Sangle et al. Data security system in cloud by using fog computing and data mining
Byrd Cybersecurity merely an afterthought in sports venue network infrastructures
Wang et al. BSVMS: novel autonomous trustworthy scheme for video monitoring
Bin Moshiur et al. Blockchain-based traffic surveillance footage authenticity detection system
Fitwi Privacy-Preserving Surveillance as an Edge Service
Nicolazzo et al. Anonymous Access Monitoring of Indoor Areas