Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

  • Arcangelo Castiglione
  • Ciriaco D’Ambrosio
  • Alfredo De Santis
  • Francesco Palmieri
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8128)


Internet-based video surveillance systems are now widespread in the modern e-Society, since they can be used to manage multiple physical security problems in a lot of contexts. Moreover, the growing diffusion of portable device, along with the necessity of keeping specific environments and motion events under control, brought out the need for more flexible and proactive systems, which allow the management of such scenarios. However, most of the state of the art video surveillance systems are known to be unscalable, unreliable, insecure, and do not provide adequate guarantees for user awareness when a determined situation of interest occurs. Furthermore, almost all the currently defined systems, lack in operation flexibility: they are designed for a specific context and can not be easily adapted to the different ones.

In this work, we propose general-purpose video surveillance system, which is fully distributed and accessible through ubiquitous portable devices. Such system, whose architecture is based on a self-organizing overlay network built on top of a mixture of already existing physical network connections, provides an high degree of reliability for the interactions among all its components, and ensures to its users, regardless of where they are located, the ability to receive notifications upon the occurrence of interesting events.


P2P Surveillance Ubiquitous User Awareness Secure P2P Systems Mission Critical Systems Portable Surveillance Monitor Kademlia 


  1. 1.
    Valera, M., Velastin, S.: Intelligent distributed surveillance systems: a review. IEE Proceedings Vision, Image and Signal Processing, IET 152(2), 192–204 (2005)CrossRefGoogle Scholar
  2. 2.
    Hu, W., Tan, T., Wang, L., Maybank, S.: A survey on visual surveillance of object motion and behaviors. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 34(3), 334–352 (2004)CrossRefGoogle Scholar
  3. 3.
    Hampapur, A., Brown, L., Connell, J., Ekin, A., Haas, N., Lu, M., Merkl, H., Pankanti, S.: Smart video surveillance: exploring the concept of multiscale spatiotemporal tracking. IEEE Signal Processing Magazine 22(2), 38–51 (2005)CrossRefGoogle Scholar
  4. 4.
    Buxton, H., Gong, S.: Visual surveillance in a dynamic and uncertain world. Artificial Intelligence 78(1), 431–459 (1995)CrossRefGoogle Scholar
  5. 5.
    Cucchiara, R., Grana, C., Piccardi, M., Prati, A.: Detecting moving objects, ghosts, and shadows in video streams. IEEE Transactions on Pattern Analysis and Machine Intelligence 25(10), 1337–1342 (2003)CrossRefGoogle Scholar
  6. 6.
    Hartley, R., Zisserman, A.: Multiple view geometry in computer vision, vol. 2. Cambridge University Press (2000)Google Scholar
  7. 7.
    Forsyth, D.A., Ponce, J.: Computer vision: a modern approach. Prentice Hall Professional Technical Reference (2002)Google Scholar
  8. 8.
    Parker, J.R.: Algorithms for image processing and computer vision. Wiley Publishing (2010)Google Scholar
  9. 9.
    Moeslund, T.B., Granum, E.: A survey of computer vision-based human motion capture. Computer Vision and Image Understanding 81(3), 231–268 (2001)zbMATHCrossRefGoogle Scholar
  10. 10.
    Kornecki, A.: Middleware for distributed video surveillance. IEEE Distributed Systems Online 9(2), 1 (2008)CrossRefGoogle Scholar
  11. 11.
    Cucchiara, R., Grana, C., Prati, A., Vezzani, R.: Computer vision techniques for PDA accessibility of in-house video surveillance. In: First ACM SIGMM International Workshop on Video Surveillance, IWVS 2003, pp. 87–97. ACM, New York (2003)CrossRefGoogle Scholar
  12. 12.
    Javed, O., Rasheed, Z., Alatas, O., Shah, M.: KNIGHT trade;: a real time surveillance system for multiple and non-overlapping cameras. In: Proceedings of 2003 International Conference on Multimedia and Expo, ICME 2003, vol. 1, pp. 649–652 (July 2003)Google Scholar
  13. 13.
    Comaniciu, D., Berton, F., Ramesh, V.: Adaptive Resolution System for Distributed Surveillance. Real-Time Imaging 8(5), 427–437 (2002)zbMATHCrossRefGoogle Scholar
  14. 14.
    Cucchiara, R., Prati, A., Vezzani, R.: A multi-camera vision system for fall detection and alarm generation. Expert Systems 24(5), 334–345 (2007)CrossRefGoogle Scholar
  15. 15.
    Ostheimer, D., Lemay, S., Ghazal, M., Mayisela, D., Amer, A., Dagba, P.F.: A modular distributed video surveillance system over IP. In: Canadian Conference on Electrical and Computer Engineering, CCECE 2006, pp. 518–521. IEEE (2006)Google Scholar
  16. 16.
    Castiglione, A., Cepparulo, M., De Santis, A., Palmieri, F.: Towards a Lawfully Secure and Privacy Preserving Video Surveillance System. In: Buccafurri, F., Semeraro, G. (eds.) E-Commerce and Web Technologies. LNBIP, vol. 61, pp. 73–84. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  17. 17.
    Yuan, X., Sun, Z., Varol, Y., Bebis, G.: A distributed visual surveillance system. In: Proceedings of the IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 199–204. IEEE (2003)Google Scholar
  18. 18.
    Dias, H., Rocha, J., Silva, P., Leao, C., Reis, L.P.: Distributed surveillance system. In: Portuguese Conference on Artificial Intelligence, EPIA 2005, pp. 257–261. IEEE (2005)Google Scholar
  19. 19.
    Desurmont, X., Bastide, A., Czyz, J., Parisot, C., Delaigle, J.F., Macq, B.: A general purpose system for distributed surveillance and communication. In: Intelligent Distributed Video Surveillance Systems, pp. 121–156 (2006)Google Scholar
  20. 20.
    Wu, Y.S., Chang, Y.S., Juang, T.Y., Yen, J.S.: An Architecture for Video Surveillance Service Based on P2P and Cloud Computing. In: 2012 9th International Conference on Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), pp. 661–666. IEEE (2012)Google Scholar
  21. 21.
    Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., You, I.: A Secure Distributed Video Surveillance System Based on Portable Devices. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 403–415. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  22. 22.
    Albano, P., Bruno, A., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F., Pizzolante, R., Yim, K., You, I.: Secure and distributed video surveillance via portable devices. Journal of Ambient Intelligence and Humanized Computing, 1–9 (2013)Google Scholar
  23. 23.
    Maymounkov, P., Mazières, D.: Kademlia: A peer-to-peer information system based on the XOR metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53–65. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  24. 24.
    Rhea, S.C., Geels, D., Roscoe, T., Kubiatowicz, J.: Handling churn in a DHT. Computer Science Division, University of California (2003)Google Scholar
  25. 25.
    Stutzbach, D., Rejaie, R.: Improving lookup performance over a widely-deployed DHT. In: Proc. Infocom, vol. 6 (2006)Google Scholar
  26. 26.
    Vixie, P., Thomson, S., Rekhter, Y., Bound, J.: Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136 (Proposed Standard), Updated by RFCs 3007, 4035, 4033, 4034 (April 1997)Google Scholar
  27. 27.
    Bradski, G.: The OpenCV library. Doctor Dobbs Journal 25(11), 120–126 (2000)Google Scholar
  28. 28.
    Bradski, G., Kaehler, A.: Learning OpenCV: Computer vision with the OpenCV library. O’Reilly Media, Incorporated (2008)Google Scholar
  29. 29.
    Wijnhoven, R., Jaspers, E., et al.: Flexible surveillance system architecture for prototyping video content analysis algorithms. In: International Society for Optics and Photonics Electronic Imaging 2006, p. 60730R (2006)Google Scholar
  30. 30.
    Castiglione, A., De Prisco, R., De Santis, A.: Do you trust your phone? In: Di Noia, T., Buccafurri, F. (eds.) EC-Web 2009. LNCS, vol. 5692, pp. 50–61. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  31. 31.
    Naoumov, N., Ross, K.: Exploiting P2P systems for DDoS attacks. In: Proceedings of the 1st International Conference on Scalable Information Systems, p. 47. ACM (2006)Google Scholar
  32. 32.
    Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  33. 33.
    Urdaneta, G., Pierre, G., Steen, M.V.: A survey of DHT security techniques. ACM Computing Surveys (CSUR) 43(2), 8 (2011)CrossRefGoogle Scholar
  34. 34.
    Wang, P., Tyra, J., Chan-Tin, E., Malchow, T., Kune, D.F., Hopper, N., Kim, Y.: Attacking the KAD network. In: Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, p. 23. ACM (2008)Google Scholar
  35. 35.
    Irvine, D.: Kademlia DHT with NAT traversal, (accessed June 16, 2013)
  36. 36.
    Castiglione, A., Cattaneo, G., Cembalo, M., De Santis, A., Faruolo, P., Petagna, F., Ferraro Petrillo, U.: Engineering a secure mobile messaging framework. Computers & Security 31(6), 771–781 (2012)CrossRefGoogle Scholar
  37. 37.
    De Santis, A., Castiglione, A., Cattaneo, G., Cembalo, M., Petagna, F., Ferraro Petrillo, U.: An Extensible Framework for Efficient Secure SMS. In: 2010 International Conference on Complex, Intelligent and Software Intensive Systems, pp. 843–850 (2010)Google Scholar
  38. 38.
    Ramsdell, B.: S/MIME version 3 message specification (1999)Google Scholar
  39. 39.
    Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM (2006)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Arcangelo Castiglione
    • 1
  • Ciriaco D’Ambrosio
    • 1
  • Alfredo De Santis
    • 1
  • Francesco Palmieri
    • 2
  1. 1.Dipartimento di InformaticaUniversità di SalernoFiscianoItaly
  2. 2.Dipartimento di Ingegneria Industriale e dell’InformazioneSeconda Università di NapoliAversaItaly

Personalised recommendations