• Aucun résultat trouvé

A Multi-level Access Control Scheme For Multimedia Database

N/A
N/A
Protected

Academic year: 2022

Partager "A Multi-level Access Control Scheme For Multimedia Database"

Copied!
2
0
0

Texte intégral

(1)

A Multi-level Access Control Scheme For Multimedia Database

Vanessa EL-KHOURY

Lyon University, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621, France vanessa.el-khoury@insa-lyon.fr

1 Introduction

Security of multimedia database systems becomes a critical problem, especially with the proliferation of multimedia data and applications. One of the most challenging issues is to provide a content-based multimedia database access control that efficiently handles different user’s access with possible fine-grained restrictions at a specific level of the multimedia data. However, the realization of such a model depends on other related research issues: (a) Efficient multimedia data analysis for supporting semantic visual concept representation; (b) Practical representation of the multimedia database; (c) Effective multimedia database indexing structure for content-based retrieval; (d) Development of a suitable access control.

2 Related Works

Several efforts have been reported in the literature to support a multi-level multimedia access control. Some of these works [CSZ04], [ZH08] aim to extend existing database access control models by providing new access modes beyond the conventional ones (i.e., read, write, execute); when others [EB03], [TH06]propose their own access control model. In both cases, we noticed that the same steps are followed: First, the entire video is segmented in multi-level access unit and stored in a hierarchy structure. Then, an indexing method is applied over the structure. Finally, a video access control model is presented to tell what kind of visual concepts should be detected and which access control rules should be applied on these visual concepts.

However, these approaches face many problems such as: (1) Space inefficiency; instead of adapting the user request on the multimedia data, multiple versions are stored in the multimedia database, where each is customized to meet user-based restrictions. (2) Complexity; the extraction and the segmentation techniques are done over the entire multimedia data regardless of the constraints in the user profile. The result is a multi- level hierarchical structure, complex for re-assembling the data when requested. Thus,

(2)

the time request for a video element becomes so expensive at the run-time due to the time processing of the authorization rules over this structure.

3 Proposed approach

In this work, we intend to present a new scheme that supports a multi-level security protection for multimedia data while considering temporal, spatial and contextual constraints based on restriction extracted from the user profile. The main idea of our work is to avoid an entire segmentation of the video and instead, to gradually treat it by means of a novel and efficient indexing method, as constraints are introduced. Then, these indexes are classified in an efficient hierarchy that maintains segments summaries as defined in MPEG-7. Thereby, when a new constraint is applied over a video, a data mining technique is executed to update the existing indexes by locating the segments containing salient objects. Only segments containing sensitive objects in the frames are stored independently in a blurred form. Then, they are indexed hierarchically so they can replace the corresponding originals one when reading the video. Finally, the access control is done by identifying segment summaries that should be applied to read the document.

From this viewpoint, this scheme remedies to the space efficiency, respectively to the request-time efficiency problem, since only one version of the video is stored in the database and the access to the data is straightforward thanks to the summaries.

Bibliography

[EB03] Elisa Bertino, Jianping Fan, Elena Ferrari, Mohand-Said Hacid, Ahmed K. Elmagarmid, Xingquan Zhu: A hierarchical access control model for video database systems. ACM Trans. Inf. Syst. 21(2): 155-191, (2003).

[TH06] Thuraisingham, B., Lavee, G., Bertino, E., Fan, J., and Khan, L.. Access control, confidentiality and privacy for video surveillance databases. In Proceedins of the 11 th ACM Symposium on Access Control Models and Technologies, (2006).

[CSZ04] S.-C.Chen, M.-L. Shyu, and N. Zhao, “SMARXO: Towards Secured Multimedia Applications by Adopting RBAC, XML and Object-Relational Database,” In Proceeding of the 12th Annual ACM International Conference on Multimedia (ACM-MM), (2004)

[ZH08] Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu, "MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems, In Proceeding of the 11th IEEE Symposium on Object Oriented Real-Time Distributed computing (ISORC), (2008)

Références

Documents relatifs

Therefore, we present in this paper a new method of search by con- tent based on Harris detector, Haar wavelet and Color histogram for the step of feature extraction to extract a

We will not discuss the technicals properties of the algorithms (robustness, invisibility, speed. ) but only their aims and objectives. With encryption, an

After finding all the squares with this property, the algorithm takes the first square where 2 numbers are possible, puts one of them in the square and tries

With the increasing variety and decreasing cost of various types of sensors, there will be an increase in the use of radically different media such as

main task based on two-tier classification. In the sub-task, we submit two RUNs: i) RUN 1 (required): apply only foren- sic features described in Section 2.1, ii) RUN 2: apply

HTTP Streaming - HLS and DASH As described in [12], there was a need for a user-convenient video streaming protocol, which can be used without using any other software than a

Different verification techniques shall be used to analyze multimedia documents: (i) Consistency reasoning with description logic [1] will be used for verifying document

The definition of a complete framework that allows to manage knowledge around the building process requires an extensible and generic formalism to represent both specific