compromised (Cranor, 2002). These standards reduce
the trust issues between individuals and different
applications. Systematic auditing and accountability
by regulatory authorities will provide checks and
balances for observers as well as for individuals.
When it comes to SC-VSS, privacy-preserving
measures should show compliance with these
legislations especially the ones they are obligated to
legally (regional, federal or international law). Some
countries have fewer restrictions on surveillance
systems when LEAs are using them, sometimes there
is privacy intrusion, but they are not considered
illegal. Other countries have strict surveillance
regulations, for instance, Canada and Denmark do not
allow obtaining personal information from
surveillance data, unless it is legally authorized for a
specific purpose, and even then, the authorization has
a short time window (Rajpoot, 2014). In the USA,
surveillance systems must abide by both national and
federal laws while obtaining personal information for
any purpose.
4 CONCLUSION
Due to the unceasing data gathering in smart city
video surveillance systems, citizens expect local
administrations to offer real-time and informed
services in different areas such as public safety and
traffic management, without violating their privacy.
This paper analyses an SC-VSS model, and inspects
its different modules and data aspects to look for
privacy concerns, and suggests essential privacy-
preserving measures. It concludes that the flow of
information to observers should be looked upon
critically as most of the privacy breaches happens at
their end i.e. how they use it for different purposes.
Therefore, it is essential to know how surveillance
data is collected and distributed, who has access to
this data, and whether they pose any threat to the
privacy of individuals whose information is part of
the data. To preserve privacy, it is important to limit
observers' access to information for authorized
purposes with situation-aware access control
mechanisms made in accordance with applicable
legislation.
REFERENCES
L. Cranor, M. Langheinrich, M. Marchiori, M. Presler-
Marshall, and J. Reagle. The Platform for Privacy
Preferences 1.0 (P3P1.0) Specification. W3C, April
2002
GDPR and Video Surveillance, 2016.
https://edps.europa.eu/data-protection/data
protection/reference-library/video-surveillance_en
Rajpoot Q.M., Jensen C.D. 2014. Security and Privacy in
Video Surveillance: Requirements and Challenges. In
ICT Systems Security and Privacy Protection. SEC
2014. Springer, Berlin, Heidelberg
B. Simion, D. N. Ilha, S. Ray, L. Barron, A. Demke Brown,
and R. Johnson, "Slingshot: A modular framework for
designing data processing systems," 2015 IEEE
International Conference on Big Data (Big Data), Santa
Clara, CA, 2015
S. Oni, Z. Chen, A. Crainiceanu, K. Joshi and D. Needham,
2019, "Situation-Aware Access Control in Federated
Data-as-a-Service for Maritime Search and
Rescue," 2019 IEEE International Conference on
Services Computing (SCC), Milan, Italy.
T. Hoang, A. A. Yavuz and J. Guajardo Merchan, 2019. "A
Secure Searchable Encryption Framework for Privacy-
Critical Cloud Storage Services," in IEEE Transactions
on Services Computing.
Rajpoot, Qasim & Jensen, Christian Damsgaard &
Krishnan, Ram. (2015). Integrating Attributes into
Role-Based Access Control.
M.Ambrosin, P.Braca, Mauro Conti, and Riccardo
Lazzaretti. 2018. ODIN: Obfuscation-based privacy
preserving consensus algorithm for Decentralized
Information fusion in smart device Networks. 1, 1,
Article 1 (July 2018)
Jensen, Christian D., 2014, The importance of trust in
computer security. In Proceedings of the 8th IFIP WG
11.11 International Conference on Trust Management
(IFIPTM 2014).
F. Kandah Y. Singh W. Zhang C. Wang "Mitigating
colluding injected attack using monitoring verification
in mobile ad-hoc networks" Security and
Communication Networks pp. 1939-0122 2013.
M.U. Farooq M. Waseem A. Khairi S. Mazhar "A Critical
Analysis on the Security Concerns of Internet of Things
(IoT)" International Journal of Computer Applications
(0975 8887) vol. 111 no. 7 February 2015.
Atrey, P.K., Yan, W., Kankanhalli, M.S.: A Scalable
Signature Scheme for Video Authentication. Journal of
Multimedia Tools and Applications 34, 107–135 (2007)
Liu, F., Hartmut, K.: A Survey of Video Encryption
Algorithms. Journal of computers & security 29, 3–15
(2010)
Z.Khan, Z.Pervez, A.G.Abbasi, “Towards a secure service
provisioning framework in a Smart city environment”,
Future Generation Computer Systems, Volume 77,
2017, Pages 112-135
G. Hynes, V. Reynolds, and M. Hauswirth, “A context
lifecycle for web-based context management services,”
in Smart Sensing and Context, ser. Lecture Notes in
Computer Science. Springer Berlin/ Heidelberg, 2009,
vol. 5741, pp. 51–65.
C. Perera, A. Zaslavsky, P. Christen and D.
Georgakopoulos, "Context-Aware Computing for The
Internet of Things: A Survey," in IEEE