Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services

Published: 06 September 2022 Publication History

Abstract

Video surveillance systems are increasingly becoming common in many private and public campuses, city buildings, and facilities. They provide many useful smart campus/city monitoring and management services based on data captured from video sensors. However, the video surveillance services may also breach personally identifiable information, especially human face images being monitored; therefore, it may potentially violate the privacy of human subjects involved. To address this privacy issue, we introduced a large-scale distributed video surveillance service model, called Smart-city Video Surveillance (SCVS). SCVS is a video surveillance data collection and processing platform to identify important events, monitor, protect, and make decisions for smart campus/city applications. In this article, the specific research focus is on how to identify and anonymize human faces in a distributed edge cloud computing infrastructure.
To preserve the privacy of data during video anonymization, SCVS utilizes a two-step approach: (i) parameter server-based distributed machine learning solution, which ensures that edge nodes can exchange parameters for machine learning-based training. Since the dataset is not located on a centralized location, the data privacy and ownership are protected and preserved. (ii) To improve the machine learning model’s accuracy, we presented an asynchronous training approach to protect data and model privacy for both data owners and data users, respectively. SCVS adopts an in-memory encryption approach, where edge computing nodes collect and process data in the memory of edge nodes in encrypted form. This approach can effectively prevent honest but curious attacks. The performance evaluation shows the presented privacy protection platform is efficient and effective compared to traditional centralized computing models as presented in Section 5.

References

[2]
SecurityInformed. [n.d.]. Video Surveillance Advancements Lead to Data Storage Challenges. Retrieved from https://www.securityinformed.com/insights/video-surveillance-data-storage-challenges-co-10817-ga-co-2851-ga-co-11453-ga.21002.html.
[3]
ACLU. 2002. Testimony by ACLU’s Barry Steinhardt on Surveillance System before DC City Council. Retrieved from https://www.aclu.org/other/testimony-aclus-barry-steinhardt-surveillance-system-dc-city-council.
[4]
ACLU. 2020. What’s wrong with public surveillance? Retrieved from https://www.aclu.org/other/whats-wrong-public-video-surveillance.
[5]
P. Valet, T. Winkler, A. Erdélyi, T. Barát, and B. Rinner. 2014. Adaptive cartooning for privacy protection in camera networks. In Proceedings of the 11th IEEE International Conference on Advanced Video Signal Based Surveillance. 44–49.
[6]
Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai, et al. 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Info. Forensics Secur. 13, 5 (2017), 1333–1345.
[7]
Ignacio Bermudez, Stefano Traverso, Marco Mellia, and Maurizio Munafo. 2013. Exploring the cloud from passive measurements: The Amazon AWS case. In Proceedings of the IEEE INFOCOM. IEEE, 230–234.
[8]
F. Dufaux. 2008. Video scrambling for privacy protection in video surveillance: Recent results and validation framework. Proc. SPIE 8063, 806302 (May 2008).
[9]
Mohammad Esmaeilpour, Patrick Cardinal, and Alessandro Lameiras Koerich. 2021. Multi-discriminator sobolev defense-GAN against adversarial attacks for end-to-end speech systems. Retrieved from https://arXiv:2103.08086.
[10]
Joint Task Force and Transformation Initiative. 2013. Security and privacy controls for federal information systems and organizations. NIST Special Publication 800, 53 (2013), 8–13.
[11]
Robin C. Geyer, Tassilo Klein, and Moin Nabi. 2017. Differentially private federated learning: A client level perspective. Retrieved from https://arXiv:1712.07557.
[12]
J. Gomes and L. Velho. 1997. Warping and morphing. Proc. Image Process. Comput. Graph (1997), 271–296.
[13]
Ian Goodfellow. 2016. NIPS 2016 tutorial: Generative adversarial networks. Retrieved from https://arXiv:1701.00160.
[14]
Ralph Gross, Latanya Sweeney, Fernando De la Torre, and Simon Baker. 2006. Model-based face de-identification. In Proceedings of the Conference on Computer Vision and Pattern Recognition Workshop (CVPRW’06). IEEE, 161–161.
[15]
Corentin Hardy, Erwan Le Merrer, and Bruno Sericola. 2019. MD-GAN: Multi-discriminator generative adversarial networks for distributed datasets. In Proceedings of the IEEE International Parallel and Distributed Processing Symposium (IPDPS’19). IEEE, 866–877.
[16]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 770–778.
[17]
Martin Heusel, Hubert Ramsauer, Thomas Unterthiner, Bernhard Nessler, and Sepp Hochreiter. 2017. Gans trained by a two time-scale update rule converge to a local nash equilibrium. In Advances in Neural Information Processing Systems. MIT Press, 6626–6637.
[18]
Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. 2017. Deep models under the GAN: Information leakage from collaborative deep learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 603–618.
[19]
Håkon Hukkelås, Rudolf Mester, and Frank Lindseth. 2019. DeepPrivacy: A generative adversarial network for face anonymization. In Proceedings of the International Symposium on Visual Computing. Springer, 565–578.
[20]
C. Höschl, T. Suk, B. Zitová, J. Flusser, S. Farokhi, and M. Pedone. 2016. Recognition of images degraded by Gaussian blur. IEEE Trans. Image Process. 25, 2 (Feb. 2016), 790–806.
[21]
R. Girshick, J. Redmon, S. Divvala, and A. Farhadi. 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision Pattern Recognition (2016), 779–788.
[22]
Y. Ito, K. Chinomi, N. Nitta, and N. Babaguchi. 2008. PriSurv: Privacy protected video surveillance system using adaptive visual abstraction. In Proceedings of the Conference on Advances in Multimedia Modeling (MMM’08) (Lecture Notes in Computer Science), vol. 4903, 144–154.6.
[23]
P. Dollár, K. He, G. Gkioxari, and R. Girshick. 2017. Object detection for dummies part 3: R-CNN family. Facebook AI Res., New York, NY, Technical Report.
[24]
David Kaplan, Jeremy Powell, and Tom Woller. 2016. AMD memory encryption. White Paper (2016).
[25]
Jerry S. H. Lee, Kathleen M. Darcy, Hai Hu, Yovanni Casablanca, Thomas P. Conrads, Clifton L. Dalgard, John B. Freymann, Sean E. Hanlon, Grant D. Huang, Leonid Kvecher, et al. 2019. From discovery to practice and survivorship: Building a national real-world data learning healthcare framework for military and veteran cancer patients. Clin. Pharmacol. Therap. 106, 1 (2019), 52–57.
[26]
Jian Li, Yabiao Wang, Changan Wang, Ying Tai, Jianjun Qian, Jian Yang, Chengjie Wang, Jilin Li, and Feiyue Huang. 2019. DSFD: Dual shot face detector. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5060–5069.
[27]
Mu Li, David G. Andersen, Jun Woo Park, Alexander J. Smola, Amr Ahmed, Vanja Josifovski, James Long, Eugene J. Shekita, and Bor-Yiing Su. 2014. Scaling distributed machine learning with the parameter server. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI’14). 583–598.
[28]
Z. Li and F. Zhou. 2017. FSSD: Feature Fusion Single Shot Multibox Detector. Retrieved from https://arxiv.org/abs/1712.00960.
[29]
Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang, and Haibo Chen. 2014. Concurrent and consistent virtual machine introspection with hardware transactional memory. In Proceedings of the IEEE 20th International Symposium on High Performance Computer Architecture (HPCA’14). IEEE, 416–427.
[30]
David G. Lowe. 2004. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision 60, 2 (2004), 91–110.
[31]
Lingjuan Lyu, Han Yu, and Qiang Yang. 2020. Threats to federated learning: A survey. Retrieved from https://arXiv:2003.02133.
[32]
Yishay Mansour, Mehryar Mohri, Jae Ro, and Ananda Theertha Suresh. 2020. Three approaches for personalization with applications to federated learning. Retrieved from https://arXiv:2002.10619.
[33]
Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics. PMLR, 1273–1282.
[34]
Mahyar Najibi, Pouya Samangouei, Rama Chellappa, and Larry S. Davis. 2017. Ssh: Single stage headless face detector. In Proceedings of the IEEE International Conference on Computer Vision. 4875–4884.
[35]
Carman Neustaedter, Saul Greenberg, and Michael Boyle. 2006. Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans. Comput.-Hum. Interact. 13, 1 (2006), 1–36.
[36]
Elaine M. Newton, Latanya Sweeney, and Bradley Malin. 2005. Preserving privacy by de-identifying face images. IEEE Trans. Knowl. Data Eng. 17, 2 (2005), 232–243.
[37]
C. A. Norris. 1997. Surveillance Order and Social Control. Economic and Social Research Council.
[38]
H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, A. C. Berg, O. Russakovsky, J. Deng, and L. Fei-Fei. 2015. ImageNet large scale visual recognition challenge. Int. J. Comput. Vision 115, 3 (2015), 211–252.
[39]
A. J. Paverd, Andrew Martin, and Ian Brown. 2014. Modelling and automatically analysing privacy properties for honest-but-curious adversaries. Technical Report, University of Oxford.
[40]
Adrienne J. Raglin, Dijiang Huang, Huan Liu, and James McCabe. 2019. Smart CCR IoT: Internet of things testbed. In Proceedings of the IEEE 5th International Conference on Collaboration and Internet Computing (CIC’19). IEEE, 232–235.
[41]
Shaoqing Ren, Kaiming He, Ross Girshick, and Jian Sun. 2015. Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in Neural Information Processing Systems. MIT Press, 91–99.
[42]
A. O. Akyüz, S. Çiftçi, and T. Ebrahimi. 2018. A reliable and reversible image privacy protection based on false colors. IEEE Trans. Multimedia 20, 1 (Jan. 2018), 68–81.
[43]
Reza Shokri, Mayasm Yabandeh, and Nasser Yazdani. 2007. Anonymous routing in MANET using random identifiers. In Proceedings of the 6th International Conference on Networking (ICN’07). 2.
[44]
Patrick Simmons. 2011. Security through amnesia: A software-based solution to the cold boot attack on disk encryption. In Proceedings of the 27th Annual Computer Security Applications Conference. 73–82.
[45]
T. Spies and R. T. Minner. 2014. System for Protecting Sensitive Data with Distributed Tokenization. U.S. Patent No. 0 046 853 A1.
[46]
M. Alexa, A. Finkelstein, Y. Gingold, T. Gerstner, D. DeCarlo, and A. Nealen. 2013. Pixelated image abstraction with integrated user constraints. Comput. Graph. 37, 5 (2013), 333–347.
[47]
Surat Teerapittayanon, Bradley McDanel, and Hsiang-Tsung Kung. 2017. Distributed deep neural networks over the cloud, the edge and end devices. In Proceedings of the IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). IEEE, 328–339.
[48]
Avis Thomas-Lester and Toni Locy. 1997. Chief’s Friend Accused of Extortion. Retrieved from https://www.washingtonpost.com/wp-srv/local/longterm/library/dc/dcpolice/stories/stowe25.htme.
[49]
Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, and Jiming Chen. 2020. Privacy-preserving distributed machine learning via local randomization and ADMM perturbation. IEEE Trans. Signal Process. 68 (2020), 4226–4241.
[50]
Wikipedia. [n.d.]. Police Surveillance in New York City. Retrieved from https://en.wikipedia.org/wiki/Police_surveillance_in_New_York_City.
[51]
H. Kang, Y. Kusama, and K. Iwamura. 2015. Mosaic-based privacy-protection with reversible watermarking. In Proceedings of the 12th International Joint Conference on e-Business Telecommunication. 98–103.
[52]
Shuo Yang, Ping Luo, Chen-Change Loy, and Xiaoou Tang. 2016. Wider face: A face detection benchmark. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 5525–5533.
[53]
Chen Zhang, Yu Xie, Hang Bai, Bin Yu, Weihong Li, and Yuan Gao. 2021. A survey on federated learning. Knowl.-Based Syst. 216 (2021), 106775.

Cited By

View all
  • (2024)Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space SensingACM Transactions on Internet of Things10.1145/36484795:2(1-26)Online publication date: 15-May-2024
  • (2024)Edge AI Enabled IoT Framework for Secure Smart Home InfrastructureProcedia Computer Science10.1016/j.procs.2024.04.317235(3369-3378)Online publication date: 2024
  • (2023)Semantic Privacy-Preserving for Video Surveillance Services on the EdgeProceedings of the Eighth ACM/IEEE Symposium on Edge Computing10.1145/3583740.3626820(300-305)Online publication date: 6-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet of Things
ACM Transactions on Internet of Things  Volume 3, Issue 4
November 2022
244 pages
EISSN:2577-6207
DOI:10.1145/3551654
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 06 September 2022
Online AM: 11 June 2022
Accepted: 01 May 2022
Revised: 01 January 2022
Received: 01 March 2021
Published in TIOT Volume 3, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. IoT
  2. distributed training
  3. deep-learning
  4. privacy preservation
  5. edge cloud
  6. computer vision
  7. personally-identifiable information (PII)

Qualifiers

  • Research-article
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)221
  • Downloads (Last 6 weeks)37
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Getting it Just Right: Towards Balanced Utility, Privacy, and Equity in Shared Space SensingACM Transactions on Internet of Things10.1145/36484795:2(1-26)Online publication date: 15-May-2024
  • (2024)Edge AI Enabled IoT Framework for Secure Smart Home InfrastructureProcedia Computer Science10.1016/j.procs.2024.04.317235(3369-3378)Online publication date: 2024
  • (2023)Semantic Privacy-Preserving for Video Surveillance Services on the EdgeProceedings of the Eighth ACM/IEEE Symposium on Edge Computing10.1145/3583740.3626820(300-305)Online publication date: 6-Dec-2023
  • (2023)Joint Dataset Reconstruction and Power Control for Distributed Training in D2D Edge NetworkIEEE Transactions on Network and Service Management10.1109/TNSM.2023.328873821:1(132-147)Online publication date: 22-Jun-2023
  • (2023)Distributed processing framework for cooperative service among edge devices2023 IEEE International Conference on Consumer Electronics (ICCE)10.1109/ICCE56470.2023.10043588(1-6)Online publication date: 6-Jan-2023

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media