TY - GEN
T1 - A scalable and secure model for surveillance cameras in resource constrained IoT systems
AU - Zia, Syed Muhammad Unsub
AU - Scotney, Bryan
AU - McCartney, Mark
AU - Martinez Carracedo, Jorge
AU - Abu-Tair, Mamun
AU - Sajjad, Ali
PY - 2020/8/26
Y1 - 2020/8/26
N2 - In wireless multimedia surveillance networks (WMSNs), the sensors generate continuous data streams which are saved on cloud servers for processing and future use. Large-scale security and monitoring decisions are based on the video data fed back to the cloud by the visual sensors. Internet of Things (IoT) networks are deployed in certain resource constrained scenarios where edge computing is not available for data analytics and security considering the IoT devices have also limited resources such as memory, power and processing capabilities. In this paper, the problems of limited resources and data security are addressed by the proposal of a secure model for video surveillance systems working in resource constrained IoT assisted scenarios. The suggested approach comprises of the following four main stages: i) save only those video frames in which any activity is detected, ii) encrypt the saved frames for secure transmission, iii) synchronize the encrypted frames between cloud and sensor node and iv) remove the transmitted frames from sensor and decrypt the stored data on cloud. The performance of the encryption process for resource constrained devices is analyzed on different types of sensor nodes during experimentation. The results prove that the proposed method automates and speeds up the process of live video data extraction and occupies less space on cloud when compared to the conventional approach for saving surveillance videos. Furthermore, adding encryption to video frames ensures integrity of video data during their journey from sensor to the cloud.
AB - In wireless multimedia surveillance networks (WMSNs), the sensors generate continuous data streams which are saved on cloud servers for processing and future use. Large-scale security and monitoring decisions are based on the video data fed back to the cloud by the visual sensors. Internet of Things (IoT) networks are deployed in certain resource constrained scenarios where edge computing is not available for data analytics and security considering the IoT devices have also limited resources such as memory, power and processing capabilities. In this paper, the problems of limited resources and data security are addressed by the proposal of a secure model for video surveillance systems working in resource constrained IoT assisted scenarios. The suggested approach comprises of the following four main stages: i) save only those video frames in which any activity is detected, ii) encrypt the saved frames for secure transmission, iii) synchronize the encrypted frames between cloud and sensor node and iv) remove the transmitted frames from sensor and decrypt the stored data on cloud. The performance of the encryption process for resource constrained devices is analyzed on different types of sensor nodes during experimentation. The results prove that the proposed method automates and speeds up the process of live video data extraction and occupies less space on cloud when compared to the conventional approach for saving surveillance videos. Furthermore, adding encryption to video frames ensures integrity of video data during their journey from sensor to the cloud.
KW - IoT
KW - resource constrained video surveillance
KW - scalability
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85092707681&partnerID=8YFLogxK
U2 - 10.1145/3416921.3416932
DO - 10.1145/3416921.3416932
M3 - Conference contribution
T3 - ACM International Conference Proceeding Series
SP - 92
EP - 96
BT - Proceedings of the 2020 4th International Conference on Cloud and Big Data Computing, ICCBDC 2020
PB - Association for Computing Machinery
CY - New York, USA
ER -