• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Cheng, H. (Cheng, H..) [1] | Liu, X. (Liu, X..) [2] | Wang, H. (Wang, H..) [3] | Fang, Y. (Fang, Y..) [4] | Wang, M. (Wang, M..) [5] | Zhao, X. (Zhao, X..) [6]

Indexed by:

Scopus

Abstract:

Anomaly detection offers a powerful approach to identifying unusual activities and uncommon behaviors in real-world video scenes. At present, convolutional neural networks (CNN) have been widely used to tackle anomalous events detection, which mainly rely on its stronger ability of feature representation than traditional hand-crafted features. However, massive video data and high cost of CNN model training are a challenge to achieve satisfactory detection results for resource-limited users. In this paper, we propose a secure video anomaly detection framework (SecureAD) based on CNN. Specifically, we introduce additive secret sharing to design several calculation protocols for achieving safe CNN training and video anomaly detection. Besides, we propose a Bloom filter based fine-grained access control policy to authenticate legitimate users, without leaking the privacy of raw personal attributes. In addition, edge computing instead of cloud computing is integrated into the architecture to reduce response time between servers and users in an outsourced environment. Finally, we prove that the proposed SecureAD achieves secure video anomaly detection without compromising the privacy of the related data. Also, the simulation results demonstrate the effectiveness and security of our SecureAD. IEEE

Keyword:

anomaly detection; Bloom filter; CNN; Privacy-preserving; secret sharing

Community:

  • [ 1 ] [Cheng, H.]College of Mathematics and Computer Science, Fuzhou University, Fuzhou University, Fuzhou, Fujian China 350108 (e-mail: hcheng@fzu.edu.cn)
  • [ 2 ] [Liu, X.]SCHOOL OF INFORMATION SYSTEMS, Singapore Management University, Singapore, Singapore Singapore (e-mail: snbnix@gmail.com)
  • [ 3 ] [Wang, H.]Division of Mathematical Sciences, Nanyang Technological University, Singapore, Singapore Singapore (e-mail: hxwang@ntu.edu.sg)
  • [ 4 ] [Fang, Y.]the College of Computer and Information Sciences, Fujian Agriculture and Forestry University, 12449 Fuzhou, Fujian China (e-mail: yfang@fafu.edu.cn)
  • [ 5 ] [Wang, M.]the College of Mathematics and Computer Science, Fuzhou University, 12423 Fuzhou, Fujian China (e-mail: mqwang@fzu.edu.cn)
  • [ 6 ] [Zhao, X.]Department of Cryptography and Cyber Security, East China Normal University School of Computer Science and Software Engineering, 530476 Shanghai, Shanghai China (e-mail: 52164500025@stu.ecnu.edu.cn)

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Transactions on Cloud Computing

ISSN: 2168-7161

Year: 2020

5 . 9 3 8

JCR@2020

5 . 3 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 16

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:102/10052729
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1