Skip to main content
Log in

Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security surveillance of home or office premises is usually performed by deploying a number of video cameras to continuously monitor the environment. Such monitoring has a potential to cause serious violation of privacy of individuals or individual rights as their movements are continuously observed. The existing centralised security systems can also be misused to collect the personal information for example the collected information could be used to launch cyber frauds using collected biometric identities. To address these issues, in this paper a distributed edge-fog node based video surveillance system is proposed for smart home environments for privacy preservation of individuals. The proposed system is event driven and resource efficient as it utilizes motion detection to detect intrusions and filters unnecessary data in the surveillance system. To meet users' privacy protection demands, a reversible blurring is performed on the privacy sensitive objects detected in the captured video stream. The proposed solution consumes less resources and provides better privacy preserving functionality. The system is coupled with a private Blockchain network that integrates into the surveillance system. This transformation of the surveillance system can be used to check and maintain integrity, management of blurring keys, and provide authorization rights to access video data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Patil, P., Sangeetha, M., & Bhaskar, V. (2020). Blockchain for IoT access control, security and privacy: A review. Wireless Personal Communications, 17(3), 1815–34.

    Article  Google Scholar 

  2. Ihsmarkit.com. (2021). Retrieved 30 January 2021, from https://ihsmarkit.com/pdf/IHS-Video-surveillance-installed-base(2)_227038110913052132.pdf.

  3. Datta, R., Gurjar, D. S., Reddy, T. M., Chaupal, S. K., Mandloi, M., & Hossain, A. (2020). Secrecy performance of amplify-and-forward relay networks with relay selection under Nakagami-m fading. Wireless Personal Communications, 112(4), 2233–2251.

    Article  Google Scholar 

  4. Ranganthan, V. P., Dantu, R., Paul, A., Mears, P., & Morozov, K. (2018). A decentralized marketplace application on the ethereum blockchain. In: IEEE 4th International Conference on Collaboration and Internet Computing (CIC IEEE, (pp. 90–97).

  5. Steichen, M., Fiz, B., Norvill, R., Shbair, W., & State, R. (2018). Blockchain-based, decentralized access control for IPFS. In: IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) IEEE, (pp. 1499–1506).

  6. Mehta, P. L., Kalra, R., & Prasad, R. (2021). A backdrop case study of AI-Drones in Indian demographic characteristics emphasizing the role of AI in global cities digitalization. Wireless Personal Communications, 1118(1), 301–321.

    Article  Google Scholar 

  7. Singh, K. D., & Sood, S. K. (2021). QoS-aware optical fog-assisted cyber-physical system in the 5G ready heterogeneous network. Wireless Personal Communications, 116(4), 3331–3350.

    Article  Google Scholar 

  8. Memos, V. A., Psannis, K. E., Goudos, S. K., & Kyriazakos, S. (2019). An enhanced and secure cloud infrastructure for e-health data transmission. Wireless Personal Communications, 1–19.

  9. Juneja, K., & Rana, C. (2021). An extensive study on traditional-to-recent transformation on face recognition system. Wireless Personal Communications, 118(4), 3075–3128.

    Article  Google Scholar 

  10. Fan, J., Luo, H., Hacid, M. S., & Bertino, E. (2005). A novel approach for privacy-preserving video sharing. In: Proceedings of the 14th ACM International Conference on Information and Knowledge Management, (pp. 609–616).

  11. Frome, A., Cheung, G., Abdulkader, A., Zennaro, M., Wu, B., Bissacco, A., & Vincent, L. (2009). Large-scale privacy protection in google street view. In: 12th International Conference on Computer Vision, IEEE, (pp. 2373–2380).

  12. Bo, C., Shen, G., Liu, J., Li, X. Y., Zhang, Y., & Zhao, F. (2014). Privacy. tag: Privacy concern expressed and respected. In: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems (pp. 163–176).

  13. Mahalle, P. N., Prasad, N. R., & Prasad, R. (2014). Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things (IoT). In: 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), IEEE, (pp. 1–5).

  14. Stojmenovic, I., Wen, S., Huang, X., & Luan, H. (2016). An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), 2991–3005.

    Article  Google Scholar 

  15. Ni, J., Zhang, K., Lin, X., & Shen, X. S. (2017). Securing fog computing for internet of things applications: Challenges and solutions. IEEE Communications Surveys & Tutorials, 20(1), 601–628.

    Article  Google Scholar 

  16. Grambow, M., Hasenburg, J., & Bermbach, D. (2018). Public video surveillance: Using the fog to increase privacy. In: Proceedings of the 5th Workshop on Middleware and Applications for the Internet of Things (pp. 11–14).

  17. Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964–975.

    Article  Google Scholar 

  18. Rego, A., Canovas, A., Jiménez, J. M., & Lloret, J. (2018). An intelligent system for video surveillance in IoT environments. IEEE Access, 6, 31580–31598.

    Article  Google Scholar 

  19. Kaur, K., Garg, S., Kaddoum, G., Gagnon, F., & Ahmed, S. H. (2019). Blockchain-based lightweight authentication mechanism for vehicular fog infrastructure. In: International Conference on Communications Workshops (ICC Workshops), IEEE, (pp. 1–6).

  20. Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., & Ghafir, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors, 19(8), 1788.

    Article  Google Scholar 

  21. Martin, J. P., Kandasamy, A., Chandrasekaran, K., & Joseph, C. T. (2019). Elucidating the challenges for the praxis of fog computing: An aspect-based study. International Journal of Communication Systems, 32(7), e3926.

    Article  Google Scholar 

  22. Nguyen, D. C., Pathirana, P. N., Ding, M., & Seneviratne, A. (2020). Blockchain for 5G and beyond networks: A state of the art survey. Journal of Network and Computer Applications, 166, 102693.

    Article  Google Scholar 

  23. Amin, R., Kunal, S., Saha, A., Das, D., & Alamri, A. (2020). CFSec: Password based secure communication protocol in cloud-fog environment. Journal of Parallel and Distributed Computing, 140, 52–62.

    Article  Google Scholar 

  24. Nkenyereye, L., Adhi Tama, B., Shahzad, M. K., & Choi, Y. H. (2020). Secure and blockchain-based emergency driven message protocol for 5G enabled vehicular edge computing. Sensors, 20(1), 154.

    Article  Google Scholar 

  25. Rohith, S., Bhat, K. H., & Sharma, A. N. (2014). Image encryption and decryption using chaotic key sequence generated by sequence of logistic map and sequence of states of Linear Feedback Shift Register. In International Conference on Advances in Electronics Computers and Communications , IEEE, pp. 1–6).

  26. Alkhazaali, A. H., & Oğuz, A. T. A. (2020). Lightweight fog based solution for privacy-preserving in IoT using blockchain. In: 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), IEEE, (pp. 1–10).

Download references

Author information

Authors and Affiliations

Authors

Contributions

Prof. Mayank Dave conceived the idea, designed the experiments and analysed the data; Vishal Rastogi performed the experiments and conducted the analysis; Mehak Miglani analysed the methods and corrected the bugs; Parveen interpreted the results and analysed these; Nitin Goyal drew the conclusions and proofread the paper. All the authors agree with the above contribution details.

Corresponding author

Correspondence to Nitin Goyal.

Ethics declarations

Conflicts of interest

The authors declare that they have no Conflict of Interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dave, M., Rastogi, V., Miglani, M. et al. Smart Fog-Based Video Surveillance with Privacy Preservation based on Blockchain. Wireless Pers Commun 124, 1677–1694 (2022). https://doi.org/10.1007/s11277-021-09426-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09426-8

Keywords

Navigation