Visible to the public Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption

TitlePrivacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Publication TypeConference Paper
Year of Publication2020
AuthorsRabieh, K., Mercan, S., Akkaya, K., Baboolal, V., Aygun, R. S.
Conference Name2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI)
Date Publishedaug
Keywordsautonomous aerial vehicles, cloud computing, cloud storage, composability, cryptography, cyber physical systems, data privacy, drones, efficient drone video sharing, efficient encryption, Encryption, intelligent transportation systems, law enforcement, Long Term Evolution, original encryption key, privacy, privacy concerns, privacy preserving, privacy-preserving Sharing, Proxy re-encryption, Proxy Reencryption, pubcrawl, public safety applications, public safety scenarios, realistic simulation environment, Resiliency, road safety, storage management, streaming, surveillance videos, trusted control center, unmanned aerial vehicles, Video communication, video recording, video streaming, video surveillance, video transmission, Videos
AbstractUnmanned Aerial Vehicles (UAVs) also known as drones are being used in many applications where they can record or stream videos. One interesting application is the Intelligent Transportation Systems (ITS) and public safety applications where drones record videos and send them to a control center for further analysis. These videos are shared by various clients such as law enforcement or emergency personnel. In such cases, the recording might include faces of civilians or other sensitive information that might pose privacy concerns. While the video can be encrypted and stored in the cloud that way, it can still be accessed once the keys are exposed to third parties which is completely insecure. To prevent such insecurity, in this paper, we propose proxy re-encryption based sharing scheme to enable third parties to access only limited videos without having the original encryption key. The costly pairing operations in proxy re-encryption are not used to allow rapid access and delivery of the surveillance videos to third parties. The key management is handled by a trusted control center, which acts as the proxy to re-encrypt the data. We implemented and tested the approach in a realistic simulation environment using different resolutions under ns-3. The implementation results and comparisons indicate that there is an acceptable overhead while it can still preserve the privacy of drivers and passengers.
Citation Keyrabieh_privacy-preserving_2020