Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption

Unmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream videos. One interesting application is the Intelligent Transportation Systems (ITS) and public safety applications where drones record videos and send them to a control center for further analysis. These videos are shared by various clients such as law enforcement or emergency personnel. In such cases, the recording might include faces of civilians or other sensitive information that might pose privacy concerns. While the video can be encrypted and stored in the cloud that way, it can still be accessed once the keys are exposed to third parties which is completely insecure. To prevent such insecurity, in this paper, we propose proxy re-encryption based sharing scheme to enable third parties to access only limited videos without having the original encryption key. The costly pairing operations in proxy re-encryption are not used to allow rapid access and delivery of the surveillance videos to third parties. The key management is handled by a trusted control center, which acts as the proxy to re-encrypt the data. We implemented and tested the approach in a realistic simulation environment using different resolutions under ns-3. The implementation results and comparisons indicate that there is an acceptable overhead while it can still preserve the privacy of drivers and passengers.

[1]  Xinpeng Zhang,et al.  An efficient privacy protection scheme for data security in video surveillance , 2019, J. Vis. Commun. Image Represent..

[2]  Eleni I. Vlahogianni,et al.  Extracting Kinematic Characteristics from Unmanned Aerial Vehicles , 2016 .

[3]  Yuan-Cheng Lai,et al.  Privacy-Preserving Encryption-Domain Video Retrieval over the Cloud via Block Transformations of Key Frames , 2019, 2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[4]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[5]  Yi Han,et al.  A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos , 2019, Sensors.

[6]  G. Dimitrakopoulos,et al.  Intelligent Transportation Systems , 2010, IEEE Vehicular Technology Magazine.

[7]  Cong Wang,et al.  Toward Encrypted Cloud Media Center With Secure Deduplication , 2017, IEEE Transactions on Multimedia.

[8]  Ismail Güvenç,et al.  UAV-Enabled Intelligent Transportation Systems for the Smart City: Applications and Challenges , 2017, IEEE Communications Magazine.

[9]  Kefei Chen,et al.  Chosen-Ciphertext Secure Proxy Re-encryption without Pairings , 2008, CANS.

[10]  Na Liu,et al.  Preserving privacy for video surveillance via visual cryptography , 2014, 2014 IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP).

[11]  Eleni I. Vlahogianni,et al.  Unmanned Aerial Aircraft Systems for Transportation Engineering: Current Practice and Future Challenges , 2016 .

[12]  Xuan Li,et al.  Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT , 2018, Sensors.

[13]  Roger Clarke,et al.  The regulation of civilian drones' impacts on behavioural privacy , 2014, Comput. Law Secur. Rev..

[14]  Ivan Martinovic,et al.  Wi-Fly?: Detecting Privacy Invasion Attacks by Consumer Drones , 2017, NDSS.

[15]  Zhaohui Wu,et al.  Intelligent Transportation Systems , 2006, IEEE Pervasive Computing.

[16]  Umit Karabiyik,et al.  A secure and cloud-based medical records access scheme for on-road emergencies , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[17]  Kemal Akkaya,et al.  Privacy-Preserving Control of Video Transmissions for Drone-based Intelligent Transportation Systems , 2019, 2019 IEEE Conference on Communications and Network Security (CNS).

[18]  Marshini Chetty,et al.  Spiders in the Sky: User Perceptions of Drones, Privacy, and Security , 2017, CHI.

[19]  Ryan Fries,et al.  Meeting privacy challenges while advancing intelligent transportation systems , 2012 .

[20]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[21]  Henrique S. Malvar,et al.  Approximate Storage of Compressed and Encrypted Videos , 2017, ASPLOS.