Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption
Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enablin...
Gespeichert in:
Veröffentlicht in: | Informatica (Ljubljana) 2020-06, Vol.44 (2), p.115-125 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 125 |
---|---|
container_issue | 2 |
container_start_page | 115 |
container_title | Informatica (Ljubljana) |
container_volume | 44 |
creator | Pham, Viet-An |
description | Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enabling the capability to query visual content even in encrypted format at the services. More precisely, we need smart systems that their security and practicality must be balanced against each other. As far as we know, in spite of their importance in preserving personal privacy, such reliable systems have not gained sufficient attention from researchers. This motivates our proposal to develop a smart secure service for visual logs with a temporal interval query. In our system, visual log data are analyzed to generate high-level contents, including entities, scenes, and activities happening in visual data. Then our system supports data owners to query these high-level contents from their visual logs at the server-side in a temporal interval while the data are still encrypted. Our searchable symmetric encryption scheme TIQSSE utilizes interval tree structure and we prove that our scheme achieves efficient search and update time while also maintaining all important security properties such as forward privacy, backward privacy, and it does not leak information outside the desired temporal range. |
doi_str_mv | 10.31449/inf.v44i2.3090 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2428570358</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2428570358</sourcerecordid><originalsourceid>FETCH-LOGICAL-c223t-be0f3a99e03d6f591b187751e303695ef79446061754dc83cf954431ff4f4d723</originalsourceid><addsrcrecordid>eNo9kM1LAzEQxYMoWKtnrwHP2yabZHdzlFK1ULDS6jXsZidtSvfDZLey4B9vasXTDG_em2F-CN1TMmGUczm1tZkcObfxhBFJLtCIZoJHLEvpJRoRJkgkhEyu0Y33e0I4o1k8Qt8rZ4-5HvDKgQd3tPUWf1jf5we8bLZ4fZI04C_b7fAGqrZxYbKou6CH5q0HN-Den1L_4sYBREXuoQzx3OldXhwAr4eqgs5Zjee1dkPb2aa-RVcmP3i4-6tj9P4038xeouXr82L2uIx0HLMuKoAYlksJhJWJEZIWNEtTQYERlkgBJpWcJyShqeClzpg2UvDwnzHc8DKN2Rg9nPe2rvnswXdq3_SuDidVzONMpIFOFlzTs0u7xnsHRrXOVrkbFCXqF7EKiNUvYnVCzH4ABWBxVg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2428570358</pqid></control><display><type>article</type><title>Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Pham, Viet-An</creator><creatorcontrib>Pham, Viet-An</creatorcontrib><description>Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enabling the capability to query visual content even in encrypted format at the services. More precisely, we need smart systems that their security and practicality must be balanced against each other. As far as we know, in spite of their importance in preserving personal privacy, such reliable systems have not gained sufficient attention from researchers. This motivates our proposal to develop a smart secure service for visual logs with a temporal interval query. In our system, visual log data are analyzed to generate high-level contents, including entities, scenes, and activities happening in visual data. Then our system supports data owners to query these high-level contents from their visual logs at the server-side in a temporal interval while the data are still encrypted. Our searchable symmetric encryption scheme TIQSSE utilizes interval tree structure and we prove that our scheme achieves efficient search and update time while also maintaining all important security properties such as forward privacy, backward privacy, and it does not leak information outside the desired temporal range.</description><identifier>ISSN: 0350-5596</identifier><identifier>EISSN: 1854-3871</identifier><identifier>DOI: 10.31449/inf.v44i2.3090</identifier><language>eng</language><publisher>Ljubljana: Slovenian Society Informatika / Slovensko drustvo Informatika</publisher><subject>Cameras ; Data encryption ; Encryption ; Keywords ; Leaking of information ; Privacy ; Queries ; Semantics ; Smart sensors ; Surveillance systems</subject><ispartof>Informatica (Ljubljana), 2020-06, Vol.44 (2), p.115-125</ispartof><rights>2020. This work is published under https://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Pham, Viet-An</creatorcontrib><title>Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption</title><title>Informatica (Ljubljana)</title><description>Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enabling the capability to query visual content even in encrypted format at the services. More precisely, we need smart systems that their security and practicality must be balanced against each other. As far as we know, in spite of their importance in preserving personal privacy, such reliable systems have not gained sufficient attention from researchers. This motivates our proposal to develop a smart secure service for visual logs with a temporal interval query. In our system, visual log data are analyzed to generate high-level contents, including entities, scenes, and activities happening in visual data. Then our system supports data owners to query these high-level contents from their visual logs at the server-side in a temporal interval while the data are still encrypted. Our searchable symmetric encryption scheme TIQSSE utilizes interval tree structure and we prove that our scheme achieves efficient search and update time while also maintaining all important security properties such as forward privacy, backward privacy, and it does not leak information outside the desired temporal range.</description><subject>Cameras</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Keywords</subject><subject>Leaking of information</subject><subject>Privacy</subject><subject>Queries</subject><subject>Semantics</subject><subject>Smart sensors</subject><subject>Surveillance systems</subject><issn>0350-5596</issn><issn>1854-3871</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNo9kM1LAzEQxYMoWKtnrwHP2yabZHdzlFK1ULDS6jXsZidtSvfDZLey4B9vasXTDG_em2F-CN1TMmGUczm1tZkcObfxhBFJLtCIZoJHLEvpJRoRJkgkhEyu0Y33e0I4o1k8Qt8rZ4-5HvDKgQd3tPUWf1jf5we8bLZ4fZI04C_b7fAGqrZxYbKou6CH5q0HN-Den1L_4sYBREXuoQzx3OldXhwAr4eqgs5Zjee1dkPb2aa-RVcmP3i4-6tj9P4038xeouXr82L2uIx0HLMuKoAYlksJhJWJEZIWNEtTQYERlkgBJpWcJyShqeClzpg2UvDwnzHc8DKN2Rg9nPe2rvnswXdq3_SuDidVzONMpIFOFlzTs0u7xnsHRrXOVrkbFCXqF7EKiNUvYnVCzH4ABWBxVg</recordid><startdate>20200601</startdate><enddate>20200601</enddate><creator>Pham, Viet-An</creator><general>Slovenian Society Informatika / Slovensko drustvo Informatika</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7SC</scope><scope>7XB</scope><scope>8AL</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BYOGL</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>20200601</creationdate><title>Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption</title><author>Pham, Viet-An</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c223t-be0f3a99e03d6f591b187751e303695ef79446061754dc83cf954431ff4f4d723</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Cameras</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Keywords</topic><topic>Leaking of information</topic><topic>Privacy</topic><topic>Queries</topic><topic>Semantics</topic><topic>Smart sensors</topic><topic>Surveillance systems</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Pham, Viet-An</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Computer and Information Systems Abstracts</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East Europe, Central Europe Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>Informatica (Ljubljana)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Pham, Viet-An</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption</atitle><jtitle>Informatica (Ljubljana)</jtitle><date>2020-06-01</date><risdate>2020</risdate><volume>44</volume><issue>2</issue><spage>115</spage><epage>125</epage><pages>115-125</pages><issn>0350-5596</issn><eissn>1854-3871</eissn><abstract>Visual logs become widely available via personal cameras, visual sensors in smart environments, or surveillance systems. Storing such data in public services is a common convenient solution, but it is essential to devise a mechanism to encrypt such data to protect sensitive information while enabling the capability to query visual content even in encrypted format at the services. More precisely, we need smart systems that their security and practicality must be balanced against each other. As far as we know, in spite of their importance in preserving personal privacy, such reliable systems have not gained sufficient attention from researchers. This motivates our proposal to develop a smart secure service for visual logs with a temporal interval query. In our system, visual log data are analyzed to generate high-level contents, including entities, scenes, and activities happening in visual data. Then our system supports data owners to query these high-level contents from their visual logs at the server-side in a temporal interval while the data are still encrypted. Our searchable symmetric encryption scheme TIQSSE utilizes interval tree structure and we prove that our scheme achieves efficient search and update time while also maintaining all important security properties such as forward privacy, backward privacy, and it does not leak information outside the desired temporal range.</abstract><cop>Ljubljana</cop><pub>Slovenian Society Informatika / Slovensko drustvo Informatika</pub><doi>10.31449/inf.v44i2.3090</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0350-5596 |
ispartof | Informatica (Ljubljana), 2020-06, Vol.44 (2), p.115-125 |
issn | 0350-5596 1854-3871 |
language | eng |
recordid | cdi_proquest_journals_2428570358 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Cameras Data encryption Encryption Keywords Leaking of information Privacy Queries Semantics Smart sensors Surveillance systems |
title | Privacy Preserving Visual Log Service with Temporal Interval Query using Interval Tree-based Searchable Symmetric Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T22%3A47%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Privacy%20Preserving%20Visual%20Log%20Service%20with%20Temporal%20Interval%20Query%20using%20Interval%20Tree-based%20Searchable%20Symmetric%20Encryption&rft.jtitle=Informatica%20(Ljubljana)&rft.au=Pham,%20Viet-An&rft.date=2020-06-01&rft.volume=44&rft.issue=2&rft.spage=115&rft.epage=125&rft.pages=115-125&rft.issn=0350-5596&rft.eissn=1854-3871&rft_id=info:doi/10.31449/inf.v44i2.3090&rft_dat=%3Cproquest_cross%3E2428570358%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2428570358&rft_id=info:pmid/&rfr_iscdi=true |