Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

With the rapid development of the logistics industry and the continuous growth of e-commerce, effectively monitoring logistics warehouses has become increasingly important to ensure the security of goods and oversee activities within storage facilities. Although current surveillance systems provide a certain level of security for logistics warehouses, they still face issues such as data tampering, storage, and access management. These challenges can compromise the integrity of surveillance video data, making the system vulnerable to unauthorized access. To address these challenges, this paper proposes the implementation of blockchain-based security management and access control of video data in logistics warehouses. Specifically, the solution employs the Hyperledger Fabric consortium blockchain to execute smart contracts and store the hash values of video data, thereby detecting any tampering and enhancing the security and integrity of the data. Additionally, hybrid encryption technology is utilized to ensure the confidentiality of video data during transmission and storage. Furthermore, the solution leverages the InterPlanetary File System (IPFS) for distributed video storage. This not only increases the redundancy and accessibility of data storage but also reduces the risk of single-point failures. A Role-Based Access Control (RBAC) mechanism is also introduced to strictly manage access permissions to video data, ensuring that only authorized users can access the data, thereby effectively preventing unauthorized access and data breaches. Through a comprehensive analysis of computational and communication costs and the evaluation of blockchain performance at 100 transactions per second for different transaction volumes using Hyperledger Caliper, the results demonstrate the effectiveness and efficiency of the proposed method. Compared to current research, this solution exhibits higher security, providing a new approach for the secure management and access control of video data in logistics warehouses.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Data availability

No datasets were generated or analysed during the current study.

References

  1. Mentzer, J.T., Flint, D.J., Hult, G.T.M.: Logistics service quality as a segment-customized process. J. Mark. 65(4), 82–104 (2001). https://doi.org/10.1509/jmkg.65.4.82.18390

    Article  Google Scholar 

  2. Lee, S., Kang, Y., Prabhu, V.V.: Smart logistics: distributed control of green crowdsourced parcel services. Int. J. Prod. Res. 54(23), 6956–6968 (2016). https://doi.org/10.1080/00207543.2015.1132856

    Article  Google Scholar 

  3. Suma, S., Mehmood, R., Albugami, N., Katib, I., Albeshri, A.: Enabling next generation logistics and planning for smarter societies. Procedia Comput. Sci. 109, 1122–1127 (2017). https://doi.org/10.1016/j.procs.2017.05.440

    Article  Google Scholar 

  4. Kawa, A.: Smart logistics chain. In: Intelligent Information and Database Systems: 4th Asian Conference, ACIIDS 2012, Kaohsiung, Taiwan, March 19–21, 2012, Proceedings, Part I 4, pp. 432–438 (2012). Springer. https://doi.org/10.1007/978-3-642-28487-8_45

  5. Li, J.-Q., Yu, F.R., Deng, G., Luo, C., Ming, Z., Yan, Q.: Industrial internet: a survey on the enabling technologies, applications, and challenges. IEEE Commun. Surv. Tutor. 19(3), 1504–1526 (2017). https://doi.org/10.1109/comst.2017.2691349

    Article  Google Scholar 

  6. Liu, M., Yu, F.R., Teng, Y., Leung, V.C., Song, M.: Performance optimization for blockchain-enabled industrial internet of things (iiot) systems: a deep reinforcement learning approach. IEEE Trans. Ind. Inform. 15(6), 3559–3570 (2019). https://doi.org/10.1109/tii.2019.2897805

    Article  Google Scholar 

  7. Qiu, C., Yu, F.R., Yao, H., Jiang, C., Xu, F., Zhao, C.: Blockchain-based software-defined industrial internet of things: a dueling deep \(\cal{Q}\)-learning approach. IEEE Internet Things J. 6(3), 4627–4639 (2018). https://doi.org/10.1109/JIOT.2018.2871394

    Article  Google Scholar 

  8. Ashton, K.: That ‘internet of things’ thing. RFID J. 22(7), 97–114 (2009)

    Google Scholar 

  9. Witkowski, K.: Internet of things, big data, industry 4.0-innovative solutions in logistics and supply chains management. Procedia Eng. 182, 763–769 (2017). https://doi.org/10.1016/j.proeng.2017.03.197

    Article  Google Scholar 

  10. Khan, A.A., Bourouis, S., Kamruzzaman, M., Hadjouni, M., Shaikh, Z.A., Laghari, A.A., Elmannai, H., Dhahbi, S.: Data security in healthcare industrial internet of things with blockchain. IEEE Sens. J. (2023). https://doi.org/10.1109/jsen.2023.3273851

    Article  Google Scholar 

  11. Khan, A.A., Zhang, X., Hajjej, F., Yang, J., Ku, C.S., Por, L.Y.: Asmf: ambient social media forensics chain of custody with an intelligent digital investigation process using federated learning. Heliyon (2024). https://doi.org/10.1016/j.heliyon.2023.e23254

    Article  Google Scholar 

  12. Khan, A.A., Laghari, A.A., Rashid, M., Li, H., Javed, A.R., Gadekallu, T.R.: Artificial intelligence and blockchain technology for secure smart grid and power distribution automation: a state-of-the-art review. Sustain. Energy Technol. Assess. 57, 103282 (2023). https://doi.org/10.1016/j.seta.2023.103282

    Article  Google Scholar 

  13. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. 3440802 (2008). https://doi.org/10.2139/ssrn.3440802

  14. Arslan, S.S., Goker, T.: Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming. Cluster Comput. 25(3), 1957–1968 (2022). https://doi.org/10.1007/s10586-022-03584-5

    Article  Google Scholar 

  15. Khan, A.A., Laghari, A.A., Shafiq, M., Cheikhrouhou, O., Alhakami, W., Hamam, H., Shaikh, Z.A.: Healthcare ledger management: a blockchain and machine learning-enabled novel and secure architecture for medical industry. Hum. Cent. Comput. Inf. Sci 12, 55 (2022). https://doi.org/10.22967/HCIS.2022.12.055

    Article  Google Scholar 

  16. Khan, A.A., Laghari, A.A., Baqasah, A.M., Alroobaea, R., Almadhor, A., Sampedro, G.A., Kryvinska, N.: Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput. Sci. (2024). https://doi.org/10.7717/peerj-cs.1933

    Article  Google Scholar 

  17. Hossain, M., Karim, Y., Hasan, R.: Fif-iot: a forensic investigation framework for iot using a public digital ledger. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 33–40 (2018). IEEE. https://doi.org/10.1109/iciot.2018.00012

  18. Singh, P.: Blockchain based security solutions with iot application in construction industry. In: IOP Conference Series: Earth and Environmental Science, vol. 614, p. 012052 (2020). IOP Publishing. https://doi.org/10.1088/1755-1315/614/1/012052

  19. Kim, S.-K., Kim, U.-M., Huh, J.-H.: A study on improvement of blockchain application to overcome vulnerability of iot multiplatform security. Energies 12(3), 402 (2019). https://doi.org/10.3390/en12030402

    Article  Google Scholar 

  20. Hang, L., Kim, D.-H.: Reliable task management based on a smart contract for runtime verification of sensing and actuating tasks in iot environments. Sensors 20(4), 1207 (2020). https://doi.org/10.3390/s20041207

    Article  Google Scholar 

  21. Sulaiman, N., Bagiwa, M., Aliyu, S., Shafii, K., Usman, A., Mohammed, S., Abdulsalam, A.: Detection and localization of splicing forgery in digital videos using convolutional auto-encoder and goturn algorithm. Fudma J. Sci. 3(4), 449–458 (2019)

    Google Scholar 

  22. Sowmya, K., Chennamma, H., Rangarajan, L.: Video authentication using spatio temporal relationship for tampering detection. J. Inf. Secur. Appl. 41, 159–169 (2018). https://doi.org/10.1016/j.jisa.2018.07.002

    Article  Google Scholar 

  23. Khan, A.A., Laghari, A.A., Elmannai, H., Shaikh, A.A., Bourouis, S., Hadjouni, M., Alroobaea, R.: Gan-iotvs: a novel internet of multimedia things-enabled video streaming compression model using gan and fuzzy logic. IEEE Sens. J. 23, 29434–29441 (2023). https://doi.org/10.1109/jsen.2023.3316088

    Article  Google Scholar 

  24. Kerr, M., Han, F., van Schyndel, R.: A blockchain implementation for the cataloguing of cctv video evidence. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1–6 (2018). IEEE. https://doi.org/10.1109/avss.2018.8639440

  25. Ghimire, S., Choi, J.Y., Lee, B.: Using blockchain for improved video integrity verification. IEEE Trans. Multim. 22(1), 108–121 (2019). https://doi.org/10.1109/TMM.2019.2925961

    Article  Google Scholar 

  26. Danko, D., Mercan, S., Cebe, M., Akkaya, K.: Assuring the integrity of videos from wireless-based iot devices using blockchain. In: 2019 IEEE 16th International Conference on Mobile Ad Hoc and Sensor Systems Workshops (MASSW), pp. 48–52 (2019). IEEE. https://doi.org/10.1109/massw.2019.00016

  27. Khan, P.W., Byun, Y.-C., Park, N.: A data verification system for cctv surveillance cameras using blockchain technology in smart cities. Electronics 9(3), 484 (2020). https://doi.org/10.3390/electronics9030484

    Article  Google Scholar 

  28. Michelin, R.A., Ahmed, N., Kanhere, S.S., Seneviratne, A., Jha, S.: Leveraging lightweight blockchain to establish data integrity for surveillance cameras. In: 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), pp. 1–3 (2020). IEEE. https://doi.org/10.1109/icbc48266.2020.9169429

  29. Lee, W.Y., Choi, Y.-S.: Reliable integrity preservation analysis of video contents with support of blockchain systems. Appl. Sci. 12(20), 10280 (2022). https://doi.org/10.3390/app122010280

    Article  Google Scholar 

  30. Cruz, J.P., Kaji, Y., Yanai, N.: Rbac-sc: Role-based access control using smart contract. IEEE Access 6, 12240–12251 (2018). https://doi.org/10.1109/access.2018.2812844

    Article  Google Scholar 

  31. Ismail, A., Wu, Q., Toohey, M., Lee, Y.C., Dong, Z., Zomaya, A.Y.: Trabac: A tokenized role-attribute based access control using smart contract for supply chain applications. In: 2021 IEEE International Conference on Blockchain (Blockchain), pp. 584–589 (2021). IEEE. https://doi.org/10.1109/blockchain53845.2021.00088

  32. Kim, J., Park, N.: Role-based access control video surveillance mechanism modeling in smart contract environment. Trans. Emerg. Telecommun. Technol. 33(4), 4227 (2022). https://doi.org/10.1002/ett.4227

    Article  Google Scholar 

Download references

Acknowledgements

We are grateful to the editor and anonymous reviewers for reviewing the manuscript and providing constructive comments for improvement.

Funding

This work is supported by the Opening Project of Intelligent Policing Key Laboratory of Sichuan Province, No. ZNJW2023KFMS009.

Author information

Authors and Affiliations

Authors

Contributions

Zigang Chen: Conceptualization, Writing—review & editing. Fan Liu: Writing—original draft, Visualization. Danlong Li: Visualization. Xingchun Yang: Writing—review & editing, Supervision. Yuhong Liu: Writing—review & editing. Haihua Zhu: Writing—review & editing, Supervision.

Corresponding authors

Correspondence to Xingchun Yang or Haihua Zhu.

Ethics declarations

Conflict of interest

All authors declare no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, Z., Liu, F., Li, D. et al. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04667-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04667-1

Keywords