Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Access Control Model for Video Database Systems As a joint work of: Elisa Bertino 1, Ahmed K. Elmagarmid 2 and Moustafa M. Hammad 2 1 Dipartimento di.

Similar presentations


Presentation on theme: "An Access Control Model for Video Database Systems As a joint work of: Elisa Bertino 1, Ahmed K. Elmagarmid 2 and Moustafa M. Hammad 2 1 Dipartimento di."— Presentation transcript:

1 An Access Control Model for Video Database Systems As a joint work of: Elisa Bertino 1, Ahmed K. Elmagarmid 2 and Moustafa M. Hammad 2 1 Dipartimento di Scienze dell'Informazione. Universit degli Studi di Milano. Via Comelico, 39/41 20135 Milano, Italy. bertino@dsi.unimi.it. 2 Computer Science Department, Purdue University. 1398 Computer Science Bld., West Lafayette IN 47907. {ake,mhammad}@cs.purdue.edu.

2 Introduction 4 Video data possess unique features that distinguished them from other data types. ( e.g. different media types - visual, audio and text-, schemaless, massive volume, time and space-variant, rich semantic contents - a picture worth 1000 words, what about video????) 4 Different approaches to model video data like: –Segmentation-based, physical features oriented; color histogram, textures, audio, text. –Annotation-based, semantic features oriented. Video description is used to access video. 4 Large amount of digital video > 1.8 M Gbytes, and a large investments, MPEG-2 has created the entirely new digital television industry worth ~30 billion $. 4 Hence a need to provide secure and organized access to video database !!!! or access control. 4 Is Access Control based on physical or semantic content? Our work is focused on access control based on video semantics to exploit the expressive power in video.

3 Topics of Discussion 4 Video data model. 4 Authorization model for video database. 4 Access control techniques. 4 System architecture. 4 Conclusion and future work.

4 Video Data Model John plying with his bicycle Hot Object Life time interval or logical video segment Physical video stream Physical video segment

5 Authorization Model 4 Closed system access control ( no access permission unless explicitly specified in the system). 4 User access requests are checked against authorization rules. 4 Authorization rule specification entails: –Subject Specification, –Object Specification, and –Mode Specification. Request satisfies authorization rules Authorization rules Access request Deny Grant No Yes

6 Subject Specification 4 Use of credential –Characteristic and attributes of users (user profiles) instead of only user identifiers. –Example: (Name: John, Age: 8, Job: student,……). –Suitable for video data. 4 Credential type (schema), credential and credential expression. 4 We specify a simple language for credential expressions. 4 Examples of credential expressions: –Student(x): representing all users that are students. –x.age < 18: denoting all users having age < 18. –Student(x) AND x.age < 18: Students with age < 18. 4 Credential expression is finally evaluated to a set of user identifiers. 4 Subject is specified as either: –list of users identifiers or credential expression.

7 Object Specification 4 We base our access model on logical video level to: –be easy to apply and modify, and –allow specification of access based on semantic video contents. 4 Video objects possess more than just physical characteristic (semantic contents). 4 Annotations describe video semantic and one can extract concepts from video annotation. (e.g. FIAT and MAZDA are CARS). 4 In its simplest form concepts represent just annotation keywords. 4 We use concepts that describe video semantics to specify video security.

8 Object Specification (Cont.) 4 Concept expression involves one or more concepts with video operators between them. Video operators are either spatial, temporal, spatio-temporal or Boolean operators. 4 Concept expression: –The set CPE of concept expressions is built from atoms and operation , video operation. –Atoms can be of the following types: c, where c  set of concepts. c 1  c 2, where c 1, c 2 are concepts and   set of video operations. –Then the set CPE of concept expressions is recursively defined as follows: Every atom is a concept expression. If CpE 1 and CpE 2 are concept expressions, then CpE 1  CpE 1, CpE 1  CpE 1,  CpE 1, (CpE 1 ) are also concept expressions.

9 Object Specification (Cont.) 4 Concepts expression finally evaluates to set of logical video segments that contain concepts satisfying the expression. 4 Examples of concept expressions: –“World War II  Digol” denotes all frame intervals that have General Digol as a hot object and deal with World War II. –“ Ortiga DURING drug trial” denotes all frame intervals that have former Colombian president Ortiga” during the drug trial in court video. –“ DISCOVERY CLOSE spying satellite” denotes all frame intervals that have DISCOVERY space shuttle fixing or close to a spying satellite in NASA video library. 4 Video Object can be specified either: –by providing a set of logical video elements. –by providing concept expression.

10 Authorized Object 4 Consists of two parts: –protected objects (po): which represent video elements user wants to access, and –restricted objects (ro) : which represent video elements user is restricted to access. 4 Authorized objects (ao) is defined as the following expression: –ao = po ro, where is defined as the exclusion of restricted object from protected ones. Restricted objectProtected object= Authorized Object

11 Relations Between Different Object Specification Terms

12 Mode Specification 4 low level operations like (read and write) are not suitable in video access control. 4 More abstract level operations are used to specify different access modes: 4 View (annotations), View(Rframes), Play(period, quality), Edit(annotation), Edit(logical-video), Edit(Physical-video). 4 Those operations are in increasing power, the successor subsumes the predecessor.

13 Access Control Mechanism 4 A user submits a request to access video element, 4 The access control routine checks the authorization rule repository for an authorization rule satisfies : –User is one of the subjects, –The accessed object is one of the protected objects, –The operation is equal or less than the specified mode. 4 If not found, user is unauthorized. 4 Else If the object is a restricted one Then apply operator and authorize the subject to the new object. Else authorize the subject.

14 System Architecture

15 Conclusion and future work 4 Provide access control based on video semantic not only physical features. 4 Support for different video granularity access control. 4 Not a dump guard but smart manager (apply filter effects). 4 Provide categories of video privileges. 4 Use of credentials instead of just identifiers. 4 Providing modular access control architecture. 4 The model can be adapted to video models that provide content description mechanisms (MPEG-7).

16 Conclusion and future work (cont.) 4 Real time provision of access control. 4 Distributed implementation. 4 PICS (Platform for Internet Content Selection).


Download ppt "An Access Control Model for Video Database Systems As a joint work of: Elisa Bertino 1, Ahmed K. Elmagarmid 2 and Moustafa M. Hammad 2 1 Dipartimento di."

Similar presentations


Ads by Google