DOC PREVIEW
UTD CS 6V81 - Lecture #14 Secure Multimedia Data Management

This preview shows page 1-2-3-4-5 out of 16 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 16 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Data and Applications Security Developments and DirectionsOutlineWhy Multimedia Data Management System?Architectures: Loose IntegrationArchitectures: Tight IntegrationData Model: ScenarioMultimedia Data Access: Some approachesMetadata for MultimediaStorage MethodsSecurity IssuesAccess Control for Multimedia DatabasesMLS SecurityExample Security Architecture: Integrity LockInference ControlSecuring Geospatial DataDirectionsData and Applications Security Developments and DirectionsDr. Bhavani ThuraisinghamThe University of Texas at DallasLecture #14Secure Multimedia Data ManagementMarch 4, 2009OutlineMultimedia Data Management SystemsSecuritySecure Geospatial data managementWhy Multimedia Data Management System?Need persistent storage for managing large quantities of multimedia dataA Multimedia data manager manages multimedia data such as text, images, audio, animation, videoExtended by a Browser to produce a Hypermedia data management systemHeterogeneity with respect to data typesNumerous Applications-Entertainment, Defense and Intelligence, Telecommunications, Finance, MedicalArchitectures:Loose IntegrationMultimediaFile ManagerMetadataModule for IntegratingData Manager with File ManagerUser InterfaceData Manager for MetadataMultimediaFilesArchitectures:Tight IntegrationUser InterfaceUser InterfaceMM-DBMS:Integrated data manager and file managerMM-DBMS:Integrated data manager and file managerMultimediaDatabaseMultimediaDatabaseData Model:ScenarioExample:Object representationObject A2000 Frames4/958/955/9510/95Object B3000 FramesMultimedia Data Access: Some approachesText data-Selection with index features-Methods: Full text scanning, Inverted files, Document clusteringAudio/Speech data-Pattern matching algorithmsMatching index features given for searching and ones available in the databaseImage data-Identifying geometric boundaries, Identifying spatial relationships, Image clusteringVideo data-Retrieval with metadata, Pattern matching with imagesMetadata for MultimediaMetadata may be annotations and stored in relations-I.e., Metadata from text, images, audio and video are extracted as stored as text-Text metadata may be converted to relations by tagging and extracting conceptsMetadata may be images of video data-E.g., certain frames may be captured as metadataMultimedia data understanding-Extracting metadata from the multimedia dataStorage MethodsSingle disk storage-Objects belonging to different media types in same diskMultiple disk storage-Objects distributed across disksExample: individual media types stored in different disksI.e., audio in one disk and video in anotherNeed to synchronize for presentation (real-time techniques)Multiple disks with striping-Distribute placement of media objects in different disksCalled disk stripingSecurity IssuesAccess ControlMultilevel SecurityArchitectureSecure Geospatial Information SystemsAccess Control for Multimedia DatabasesAccess Control for Text, Images, Audio and VideoGranularity of Protection-TextJohn has access to Chapters 1 and 2 but not to 3 and 4-ImagesJohn has access to portions of the imageAccess control for pixels?-Video and AudioJohn has access to Frames 1000 to 2000Jane has access only to scenes in US-Security constraintsAssociation based constraintsE.g., collections of images are classifiedMLS SecurityBookObjectIntroductionSet of SectionsReferencesIntroduction: Level = UnclassifiedSet of Sections: Level = TopSecretReferences: Level = SecretExample Security Architecture: Integrity LockMultimediaDatabaseTrusted Agentto computechecksumsSensorData ManagerUntrustedMultimedia DataManagerCompute ChecksumBased on say multimedia data value(such as video object content)Security level and ChecksumCompute ChecksumBased on multimedia data valueand Security level retrievedfrom the stored multimedia databaseInference ControlMetadata,ConstraintsUser Interface ManagerInference EngineActs as an Inference ControllerMultimediaDatabaseMultimediaDatabaseManagerSecuring Geospatial DataGeospatial images could be Digital Raster Images that store images as pixels or Digital Vector Images that store images as points, lines and polygonsGSAM: Geospatial Authorization Model specifies subjects, credentials, objects (e.g, points, lines, pixels etc.) and the access that subjects have to objectsReference: Authorization Model for Geospatial Data; Atluri and Chun, IEEE Transactions on Dependable and Secure Computing, Volume 1, #4, October – December 2004.Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan: Access control, confidentiality and privacy for video surveillance databases. SACMAT 2006: 1-10Details will be given in one of the lectures after the mid-term.DirectionsMultimedia data security is getting some attentionLittle research on Geospatial data securityDigital watermarking is getting some attentionOur focus at UTD is to develop a secure geospatial semantic webWe have developed a system called DAGIS and demonstrating secure interoperabilityDetails will be given


View Full Document

UTD CS 6V81 - Lecture #14 Secure Multimedia Data Management

Documents in this Course
Botnets

Botnets

33 pages

Privacy

Privacy

27 pages

Privacy

Privacy

27 pages

Load more
Download Lecture #14 Secure Multimedia Data Management
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture #14 Secure Multimedia Data Management and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture #14 Secure Multimedia Data Management 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?