2020 International Conference on Electronics, Information, and Communication (ICEIC) 2020
DOI: 10.1109/iceic49074.2020.9051302
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the Security Threats and Privacy Policy of Intelligent Video Surveillance System Considering 5G Network Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…This architecture enables economical use of the resources with the concept of (common) data centres, which are expensive to deploy and maintain. With the fast development of Cloud Computing and 5G networks [175,176] and technologies combined with AI, the function and performance of surveillance systems will be significantly enhanced. Under a deployed 5G network, the data recorded and developed by live sensors could be transformed fast and wirelessly and then stored in a Cloud Centre.…”
Section: About the Next Generation Of Cctv Surveillance Systems For R...mentioning
confidence: 99%
“…This architecture enables economical use of the resources with the concept of (common) data centres, which are expensive to deploy and maintain. With the fast development of Cloud Computing and 5G networks [175,176] and technologies combined with AI, the function and performance of surveillance systems will be significantly enhanced. Under a deployed 5G network, the data recorded and developed by live sensors could be transformed fast and wirelessly and then stored in a Cloud Centre.…”
Section: About the Next Generation Of Cctv Surveillance Systems For R...mentioning
confidence: 99%
“…Examples of security and privacy threats are control takeover attacks that can lead to data manipulation, data loss, data recovery, and data leakage. In addition, malicious third-party MEC applications in the MEC host can cause serious security problems [26,28,29].…”
Section: Related Workmentioning
confidence: 99%
“…Challenges/Issues Discussed [263] Healthcare Security and privacy [264] Healthcare Data intrepretation and fusion [265] Healthcare Security and privacy [266] Healthcare Informed consent [267] Healthcare Informed consent and confidentiality [268] Surveillance Privacy [269] Surveillance Security and privacy [270] Surveillance Privacy [271] Recruitment Privacy and informed consent [272] Generic Security, privacy, bias, and informed consent [273] Generic Informed consent [274] Recruitment Bias [275] Generic Bias [276] Generic Bias [62] Generic Open data, intrepretation, and annotation…”
Section: Ref Applicationmentioning
confidence: 99%