Abstract
Security surveillance of home or office premises is usually performed by deploying a number of video cameras to continuously monitor the environment. Such monitoring has a potential to cause serious violation of privacy of individuals or individual rights as their movements are continuously observed. The existing centralised security systems can also be misused to collect the personal information for example the collected information could be used to launch cyber frauds using collected biometric identities. To address these issues, in this paper a distributed edge-fog node based video surveillance system is proposed for smart home environments for privacy preservation of individuals. The proposed system is event driven and resource efficient as it utilizes motion detection to detect intrusions and filters unnecessary data in the surveillance system. To meet users' privacy protection demands, a reversible blurring is performed on the privacy sensitive objects detected in the captured video stream. The proposed solution consumes less resources and provides better privacy preserving functionality. The system is coupled with a private Blockchain network that integrates into the surveillance system. This transformation of the surveillance system can be used to check and maintain integrity, management of blurring keys, and provide authorization rights to access video data.
Similar content being viewed by others
References
Patil, P., Sangeetha, M., & Bhaskar, V. (2020). Blockchain for IoT access control, security and privacy: A review. Wireless Personal Communications, 17(3), 1815–34.
Ihsmarkit.com. (2021). Retrieved 30 January 2021, from https://ihsmarkit.com/pdf/IHS-Video-surveillance-installed-base(2)_227038110913052132.pdf.
Datta, R., Gurjar, D. S., Reddy, T. M., Chaupal, S. K., Mandloi, M., & Hossain, A. (2020). Secrecy performance of amplify-and-forward relay networks with relay selection under Nakagami-m fading. Wireless Personal Communications, 112(4), 2233–2251.
Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., & Morozov, K. (2018). A decentralized marketplace application on the ethereum blockchain. In: IEEE 4th International Conference on Collaboration and Internet Computing (CIC IEEE, (pp. 90–97).
Steichen, M., Fiz, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-based, decentralized access control for IPFS. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) IEEE, (pp. 1499–1506).
Mehta, P. L., Kalra, R., & Prasad, R. (2021). A backdrop case study of AI-Drones in Indian demographic characteristics emphasizing the role of AI in global cities digitalization. Wireless Personal Communications, 1118(1), 301–321.
Singh, K. D., & Sood, S. K. (2021). QoS-aware optical fog-assisted cyber-physical system in the 5G ready heterogeneous network. Wireless Personal Communications, 116(4), 3331–3350.
Memos, V. A., Psannis, K. E., Goudos, S. K., & Kyriazakos, S. (2019). An enhanced and secure cloud infrastructure for e-health data transmission. Wireless Personal Communications, 1–19.
Juneja, K., & Rana, C. (2021). An extensive study on traditional-to-recent transformation on face recognition system. Wireless Personal Communications, 118(4), 3075–3128.
Fan, J., Luo, H., Hacid, M. S., & Bertino, E. (2005). A novel approach for privacy-preserving video sharing. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, (pp. 609–616).
Frome, A., Cheung, G., Abdulkader, A., Zennaro, M., Wu, B., Bissacco, A., & Vincent, L. (2009). Large-scale privacy protection in google street view. In: 12th International Conference on Computer Vision, IEEE, (pp. 2373–2380).
Bo, C., Shen, G., Liu, J., Li, X. Y., Zhang, Y., & Zhao, F. (2014). Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems (pp. 163–176).
Mahalle, P. N., Prasad, N. R., & Prasad, R. (2014). Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), IEEE, (pp. 1–5).
Stojmenovic, I., Wen, S., Huang, X., & Luan, H. (2016). An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), 2991–3005.
Ni, J., Zhang, K., Lin, X., & Shen, X. S. (2017). Securing fog computing for internet of things applications: Challenges and solutions. IEEE Communications Surveys & Tutorials, 20(1), 601–628.
Grambow, M., Hasenburg, J., & Bermbach, D. (2018). Public video surveillance: Using the fog to increase privacy. In: Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things (pp. 11–14).
Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.
Rego, A., Canovas, A., Jiménez, J. M., & Lloret, J. (2018). An intelligent system for video surveillance in IoT environments. IEEE Access, 6, 31580–31598.
Kaur, K., Garg, S., Kaddoum, G., Gagnon, F., & Ahmed, S. H. (2019). Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: International Conference on Communications Workshops (ICC Workshops), IEEE, (pp. 1–6).
Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., & Ghafir, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors, 19(8), 1788.
Martin, J. P., Kandasamy, A., Chandrasekaran, K., & Joseph, C. T. (2019). Elucidating the challenges for the praxis of fog computing: An aspect-based study. International Journal of Communication Systems, 32(7), e3926.
Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Blockchain for 5G and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166, 102693.
Amin, R., Kunal, S., Saha, A., Das, D., & Alamri, A. (2020). CFSec: Password based secure communication protocol in cloud-fog environment. Journal of Parallel and Distributed Computing, 140, 52–62.
Nkenyereye, L., Adhi Tama, B., Shahzad, M. K., & Choi, Y. H. (2020). Secure and blockchain-based emergency driven message protocol for 5G enabled vehicular edge computing. Sensors, 20(1), 154.
Rohith, S., Bhat, K. H., & Sharma, A. N. (2014). Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In International Conference on Advances in Electronics Computers and Communications , IEEE, pp. 1–6).
Alkhazaali, A. H., & Oğuz, A. T. A. (2020). Lightweight fog based solution for privacy-preserving in IoT using blockchain. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, (pp. 1–10).
Author information
Authors and Affiliations
Contributions
Prof. Mayank Dave conceived the idea, designed the experiments and analysed the data; Vishal Rastogi performed the experiments and conducted the analysis; Mehak Miglani analysed the methods and corrected the bugs; Parveen interpreted the results and analysed these; Nitin Goyal drew the conclusions and proofread the paper. All the authors agree with the above contribution details.
Corresponding author
Ethics declarations
Conflicts of interest
The authors declare that they have no Conflict of Interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Dave, M., Rastogi, V., Miglani, M. et al. Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain. Wireless Pers Commun 124, 1677–1694 (2022). https://doi.org/10.1007/s11277-021-09426-8
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09426-8