28
Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems in Pervasive Video Surveillance Systems Antoni Martínez-Ballesté , Hatem A. Rashwan, Domènec Puig, Antonia Paniza Universitat Rovira i Virgili Universitat de les Illes Balears

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Embed Size (px)

Citation preview

Page 1: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Towards a Trustworthy Privacy

in Pervasive Video Surveillance Systemsin Pervasive Video Surveillance Systems

Antoni Martínez-Ballesté, Hatem A. Rashwan, Domènec Puig, Antonia Paniza

Universitat Rovira i VirgiliUniversitat de les Illes Balears

Page 2: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 3: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 4: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

UNESCO Chair in Data Privacy

�Universal Declaration of Human Rights (1948)

– “No one shall be subjected to arbitrary interference with

his privacy, family, home or correspondence, nor to

attacks upon his honour and reputation. Everyone has

the right to the protection of the law against such

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

the right to the protection of the law against such

interference or attacks”

�Data privacy technologies are about technically

enforcing the above right in the information society

Page 5: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

UNESCO Chair in Data Privacy

�Unfortunately…

– Lack of awareness of the population on the existing

privacy threats (profiling, tracking, etc.)

– Large companies and the “Big Brother” effect

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– Large companies and the “Big Brother” effect

– Lack of comprehensive legislation

Page 6: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

UNESCO Chair in Data Privacy

�Chair aims and goals

– Promote the adoption of privacy-preserving

technologies by governments and private sectors

(telecoms, banks, etc.)

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– Raise the public awareness of the need and the right to

preserve the privacy of the individuals

– Promote cross-national research on privacy technologies

�We are mainly focused on technologies

Page 7: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 8: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Privacy in Video Surveillance

�Example scenario

Preprocessingsurveillance

camera

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Video Processing Module

Information System

Trusted Manager

Identification

Contentprotection

User

Security Management Module

Page 9: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Privacy in Video Surveillance

�Pervasive technology scenario

Video Processing Module

Information System

Identification

Contentprotection

Preprocessing

Security Management Module

surveillance camera

Video Processing Module

Information System

Identification

Contentprotection

User

Preprocessing

Security Management Module

surveillance camera

Video Processing Module

Identification

Contentprotection

Preprocessingsurveillance

camera

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Trusted Manager

User

Video Processing Module

Information System

Trusted Manager

Identification

Contentprotection

User

Preprocessing

Security Management Module

surveillance camera

Trusted Manager

Video Processing Module

Information System

Trusted Manager

Identification

Contentprotection

User

Preprocessing

Security Management Module

surveillance camera

Video Processing Module

Information System

Trusted Manager

Identification

Contentprotection

User

Preprocessing

Security Management Module

surveillance camera

Information System

Trusted Manager

protection

User

Security Management Module

Page 10: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Privacy in Video Surveillance

�Typical “privacy” technologies in VS

– Face/people detection

– Blurring/Encryption

�But…

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�But…

– Are people notified they are being recorded?

– Is the access to the raw/encrypted data correctly

managed?

– Do the video processing techniques really ensure privacy

of individuals?

Page 11: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 12: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Trustworthy ICT?

�The goal of VS is security

�Security vs privacy...

– Is people happy while being monitored?

– Does people feel safe while being under surveillance?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– Does people feel safe while being under surveillance?

Page 13: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Trustworthy ICT?

�Is technology reliable?

– “The degree to which a trustor has a justifiable belief

that the trustee will provide the expected function or

service”

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�Technology problems? Owner misbehaviors?

– Are individuals protected by the law? Lack of legislation

can certainly slow down the social acceptance of ICT

�Social acceptance vs. User collaboration

– Web 2.0 trust is based on collaboration of users

Page 14: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 15: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

(I) Technology: algorithms and platform

�Trusted Platform Module chips

– Can be used to build a plethora of trustable devices

– For instance, trustworthy cameras

– But they could be hacked...

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– But they could be hacked...

Video Processing Module

Information System

Identification

Contentprotection

Preprocessingsurveillance

camera

Page 16: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

(I) Technology: algorithms and platform

�In the case of VS, computer vision techniques...

– Must work in real time. If the technique needs some

temporary storage of the raw video, a security leak of

the information system can compromise the privacy of

the individuals.

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

the individuals.

– Must perform well in terms of accuracy. (i) Must detect

ALL the ROIs (e.g. Faces). (ii) Should not need human

supervision.

Page 17: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

(I) Technology: algorithms and platform

�Fortunately...

– There are techniques to detect ROIs in realtime

– And capable of detecting them correctly!

�But...

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�But...

– Camera conditions are essential: fixed cameras, good

illumination conditions, etc.

– Some of the literature does not tackle these issues!

– Some of the proposals blur ROIs in the pixel domain and

raw video is stored and accessible to authorized users.

Page 18: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

(I) Technology: algorithms and platform

�The platform must fulfil some properties, namely

– Confidentiality, authenticity, integrity

– Security Access

Symmetric

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Video Processing Module

Information System

Trusted Manager

User

Security Management Module

Symmetric

Encryption

Public Key

Cryptography

Trusted Certification

Authorities

Secure Logging

Page 19: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 20: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Law enforcement

�Directive 95/46/EC on the protection of individuals

with regard to the processing of personal data and

on the free movement of such data

– Any information relating to an identified or identifiable

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– Any information relating to an identified or identifiable

natural person can be seen as personal data

– A picture can be considered personal data if it allows

identification of individuals

Page 21: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Law enforcement

�Spanish legislation

– Surveillance must be advertised

– The owner must take the necessary precautions to

ensure the safety of the images and prevent alteration,

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

ensure the safety of the images and prevent alteration,

loss or unauthorized access

– Data cannot be released to third parties

Does the owner

behave properly?

Page 22: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Law enforcement

�A trust score for VS

High trust. ROIs are

hidden, no supervision /

High trust + notification

In case of identification

IMAGE PROTECTION DATA ACCESS

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

No trust. ROIs are not

hidden

No trust. Anyone can

access the original data

Low trust. ROIs are hidden,

but human supervision is

needed / no real time

Low trust. Only

authorized users can

access ALL THE DATA

hidden, no supervision /

no real time High trust. Anyone accesses

the protected data, auhorized

users access original data.

Page 23: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Law enforcement

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

IMAGE PROTECTION LOW

DATA ACCESS HIGH

Data is protected and sent to SECURITAS. Original data is only available to police.

Page 24: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Content

�UNESCO Chair in Data Privacy

�Privacy in Video Surveillance

�Trustworthy ICT?

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

�(I) Technology: algorithms and platform

�(II) Law enforcement

�(III) User collaboration

�Discussion

Page 25: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

User collaboration

�User collaboration is natural in state-of-art internet

services:

– Collaborative recommendation systems

– Collaborative privacy techniques: Instead of trusting a

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

– Collaborative privacy techniques: Instead of trusting a

third party, users collaborate to gain privacy.

�It is interesting that users are informed upon being

recorded by VS systems

Page 26: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

User collaboration

�Smartphone and web application

surveillance camera

Tag

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

User Application

Server

Web interface

Database

web browser

TagValidate

Inform

Page 27: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

User collaboration

�Smartphone and web application

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

Page 28: Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems

DISCUSSION

Towards a Trustworthy Privacy in Pervasive Video Surveillance Systems