• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ ¿µ»ó ¾Ïȣȭ ¾ÆÅ°ÅØó ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service
ÀúÀÚ(Author) ±èÁ¤¼®   ÀÌÀçÈ£   Jeongseok Kim   Jaeho Lee  
¿ø¹®¼ö·Ïó(Citation) VOL 09 NO. 12 PP. 0307 ~ 0314 (2020. 12)
Çѱ۳»¿ë
(Korean Abstract)
¿µ»ó °¨½Ã ½Ã½ºÅÛÀº ±¤¹üÀ§ÇÑ ¿µ¿ª¿¡¼­ ½±°Ô ¼³Ä¡µÇ°í ³ìÈ­ ÀåÄ¡ ȤÀº ÀÎÅͳÝÀ» ÅëÇÑ Å¬¶ó¿ìµå ÀúÀå¼Ò¿¡ ¿µ»ó Á¤º¸¸¦ °ü¸®ÇÏ´Â Áß¾Ó °ü¸® ¹æ½ÄÀ» »ç¿ëÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ ½Ã½ºÅÛÀÇ ÁÖ¿äÇÑ ¹®Á¦Á¡Àº ÀúÀå ¿µ»óÀÇ Àü¼Û °úÁ¤°ú ÀúÀå ´ëÇؼ­ °´°üÀûÀ¸·Î ½Å·ÚÇÒ ¼ö ÀÖ´Â ¹æ¹ýÀÌ Á¦°øµÇÁö ¾Ê°í ÀÖÀ¸¸ç, °³ÀÎÁ¤º¸º¸È£¸¦ À§ÇÑ ÀåÄ¡ À¯¹«¿Í º°°³·Î ¸ðµç ±ÇÇÑÀ» ¼­ºñ½º Á¦°øÀÚ¿¡°Ô À§ÀÓÇÑ »óÅ¿¡¼­ ¿î¿µÇÏ°í ÀÖ´Ù´Â Á¡ÀÌ´Ù. º» ¿¬±¸¿¡¼­´Â °ø°³Å° ±â¹Ý ¾Ïȣȭ¿Í ºí·ÏüÀÎ ±â¹ÝÀÇ Å° °ü¸® ½Ã½ºÅÛÀ» Á¶ÇÕÇÑ ¾ÆÅ°ÅØó¸¦ ÀÌ¿ëÇÏ¿© ¹Î°¨ÇÑ Á¤º¸¸¦ »ç¿ëÀÚ°¡ ¾ÈÀüÇÏ°Ô º¸È£ÇÒ ¼ö ÀÖ´Â ¹æ¾ÈÀ» Á¦½ÃÇÑ´Ù. Á¦¾ÈÇÏ´Â ¾ÆÅ°ÅØó¿¡¼­´Â ´ëĪ۸¦ »ç¿ëÇÑ ºí·Ï ¾Ïȣȭ(block-cipher) °úÁ¤À» ÅëÇØ ¿µ»ó Á¤º¸¸¦ ¾ÏȣȭÇÏ°í, À̶§ »ç¿ëÇÏ´Â ´ëĪ۸¦ »ç¿ëÀÚÀÇ °ø°³Å°·Î ¾ÏȣȭÇÏ¿© ºí·ÏüÀÎÀÇ ·¹Àú(ledger)·Î ±â·ÏÇÏ´Â ±â¹ýÀ» »ç¿ëÇÑ´Ù. ¿µ»ó Á¤º¸¸¦ ¾ÏȣȭÇÏ´Â °úÁ¤À» ºí·ÏüÀÎ ³×Æ®¿öÅ©ÀÇ Æ¯¼º(ºÐ»ê, Åõ¸í¼º, µ¥ÀÌÅÍ º¯Á¶ ºÒ°¡)À» È°¿ëÇÏ¿© °³ÀÎÁ¤º¸ ¿µ»óÀÇ »ý¼ººÎÅÍ ¼Ò¸ê±îÁö »ç¿ëÀÚ°¡ ÃßÀûÀÌ °¡´ÉÇϵµ·Ï ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.
Å°¿öµå(Keyword) ºí·ÏüÀΠ  °³ÀÎÁ¤º¸º¸È£   ¿µ»ó °¨½Ã ½Ã½ºÅÛ   Blockchain   Privacy Protection   Video Surveillance  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå