IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS ACM Transactions on Internet of Things Pub Date : 2020-06-01 DOI:10.1145/3375878
Youssef Khazbak, Junpeng Qiu, Tianxiang Tan, Guohong Cao
{"title":"TargetFinder","authors":"Youssef Khazbak, Junpeng Qiu, Tianxiang Tan, Guohong Cao","doi":"10.1145/3375878","DOIUrl":null,"url":null,"abstract":"With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find interested targets (e.g., crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity of IoT cameras such as dash mounted and phone cameras, the crowdsourced videos have much better spatial coverage compared to only using surveillance cameras, and, thus, can significantly improve the effectiveness of target search. However, this may raise privacy concerns when workers (owners of IoT cameras) are provided with photos of the target. Also, the videos captured by the workers may be misused to track bystanders. To address this problem, we design and implement TargetFinder, a privacy preserving system for target search through IoT cameras. By exploiting homomorphic encryption techniques, the server can search for the target on encrypted information. We also propose techniques to allow the requester (e.g., the police) to receive images that include the target, while all other captured images of the bystanders are not revealed. Moreover, the target’s face image is not revealed to the server and the participating workers. Due to the high computation overhead of the cryptographic primitives, we develop optimization techniques in order to run our privacy preserving protocol on mobile devices. We also formulate and solve a worker selection problem to maximize the probability of finding the target under some budget constraint. A real-world demo and extensive evaluations demonstrate the effectiveness of TargetFinder.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"1 1","pages":"1 - 23"},"PeriodicalIF":3.5000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3375878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 8

摘要

随着物联网摄像头的普及,可以使用众包视频来帮助找到感兴趣的目标(例如,犯罪嫌疑人、丢失的孩子、丢失的车辆)。由于物联网摄像头(如仪表板摄像头和手机摄像头)无处不在,众包视频与仅使用监控摄像头相比具有更好的空间覆盖范围,因此可以显着提高目标搜索的有效性。然而,当工作人员(物联网摄像头的所有者)提供目标的照片时,这可能会引起隐私问题。此外,工作人员拍摄的视频可能会被滥用来追踪旁观者。为了解决这个问题,我们设计并实现了TargetFinder,这是一个通过物联网摄像头进行目标搜索的隐私保护系统。通过利用同态加密技术,服务器可以在加密信息上搜索目标。我们还提出了一些技术,允许请求者(例如警察)接收包含目标的图像,而不显示所有其他捕获的旁观者图像。此外,目标的面部图像不向服务器和参与工作人员透露。由于加密原语的高计算开销,我们开发了优化技术,以便在移动设备上运行我们的隐私保护协议。在一定的预算约束下,构造并求解了一个工人选择问题,使找到目标的概率最大化。一个真实世界的演示和广泛的评估证明了TargetFinder的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
TargetFinder
With the proliferation of IoT cameras, it is possible to use crowdsourced videos to help find interested targets (e.g., crime suspect, lost child, lost vehicle) on demand. Due to the ubiquity of IoT cameras such as dash mounted and phone cameras, the crowdsourced videos have much better spatial coverage compared to only using surveillance cameras, and, thus, can significantly improve the effectiveness of target search. However, this may raise privacy concerns when workers (owners of IoT cameras) are provided with photos of the target. Also, the videos captured by the workers may be misused to track bystanders. To address this problem, we design and implement TargetFinder, a privacy preserving system for target search through IoT cameras. By exploiting homomorphic encryption techniques, the server can search for the target on encrypted information. We also propose techniques to allow the requester (e.g., the police) to receive images that include the target, while all other captured images of the bystanders are not revealed. Moreover, the target’s face image is not revealed to the server and the participating workers. Due to the high computation overhead of the cryptographic primitives, we develop optimization techniques in order to run our privacy preserving protocol on mobile devices. We also formulate and solve a worker selection problem to maximize the probability of finding the target under some budget constraint. A real-world demo and extensive evaluations demonstrate the effectiveness of TargetFinder.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
5.20
自引率
3.70%
发文量
0
期刊最新文献
Introduction to the Special Issue on Wireless Sensing for IoT Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief Resilient Intermediary‐Based Key Exchange Protocol for IoT A Two-Mode, Adaptive Security Framework for Smart Home Security Applications Online learning for dynamic impending collision prediction using FMCW radar
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1