Applied Cryptography Group 15
Applied Cryptography Group 15
1 Abstract spyros
The rapid expansion of surveillance cameras has raised significant privacy con-
cerns, particularly regarding unauthorized access and data misuse. This report
outlines a cryptographic system designed for RoboEye Inc. to ensure that surveil-
lance footage is securely transmitted, and stored. The proposed solution leverages
cryptographic methods, including TLS for data in transit, AES for data at rest,
and Shamir’s Secret Sharing for distributed key management, to guarantee data
confidentiality, integrity, and access control.
The report begins with an analysis of risks, categorized using the STRIDE
model, and identifies key assets vulnerable to privacy violations, tampering, and
unauthorized access. Requirements are then defined for both system functionality
and security, followed by an exploration of state-of-the-art encryption and access
control models. The design implements a flexible access structure where different
user roles must collaborate to access encrypted footage based on customizable,
context-sensitive policies.
This system’s evaluation demonstrates robust mitigations against major se-
curity risks, though future work is suggested to address residual threats like
spoofing and denial-of-service attacks.
2 Introduction Marco
Surveillance cameras are being used more widely, which has led to an increase
of privacy concerns. They often capture sensitive information, raising the risk of
potential violations of individual privacy. In most countries it is considered illegal
or ethically unacceptable to mass record individuals without a warrant or legal
agreement. Citizens expect their privacy to be respected, even when surveillance
is necessary for security purposes. Therefore, there is a need for a surveillance
system that protects the privacy while maintaining their functionality.
RoboEye Inc. wants to develop a system that can mitigate some of these pri-
vacy concerns. The system should enforce that the recorded surveillance footage
can only be retrieved with a warrant. The system must be flexible enough to
adhere to different countries’ legal frameworks. For instance in one framework,
2 F. Author et al.
accessing surveillance footage may require the approval of a judge, law enforce-
ment agreement, and authorization of one out of three bank directors to access
the recordings. The challenge is to design a system that supports these various
access structures involving multiple authorized stakeholders for access granting
while ensuring that unauthorized parties cannot access the sensitive data.
The project focuses on using advanced cryptographic techniques to secure
data during transmission from the camera to the database and inside the database.
The solution must be able to adapt to different legal/organizational frameworks
and guarantee only authorized users can access as specified in the specific access
structure. They can retrieve surveillance footage only from respective parts of the
database required for the situation. Therefore, different entries in the database
can have different access structures. Furthermore the system should also handle
dynamic changes in access rights such as revocation of privileges or role changes.
In the following sections the report will delve into detailed design of the cryp-
tographic system. Starting with the requirements and potential risks and threats.
Followed by the state of art, the design, security, and finally the evaluation and
analysis of the system’s effectiveness in mitigating privacy risks.
The risk analysis focuses on which assets are at stake within the system by
assessing the potential risk, impact, severity, and mitigations. The analysis for
the risks follows the STRIDE model [9]. To calculate the severity of the risks a
rating of 1-5 is used assuming that the threat has occurred. See table 1 for an
overview of the threat model.
1. Cameras
2. Servers: Where the cameras’s footage will be stored.
Surveillance Cameras 3
Out of scope
– Spoofing, denial of service, and repudiation risks
– Physical attacks against cameras
– Attacks against the server and database
– Social engineering
Attacker assumptions
– The attackers can be external and internal
– The attackers’ motivation can be stealing sensitive data, invade privacy, and
data tampering.
– The attackers can be skilled hackers with access to various resources, tools,
and techniques
Mitigations
– Encryption : Encrypt the surveillance footage during transit and at rest in
the database.
– Integrity checks : Check whether the surveillance footage in the database
has been altered or persist immutability.
– Access Control Management: Only allow legitimate users to access the
surveillance footage at rest and adopt principle of least privilege.
4 Requirements Marco
Requirements are the basis of any system, since they define what the system
should do and the limitations it must operate with. Requirements can be classi-
fied into two categories :
These requirements describe the overall characteristics and constraints that the
system must meet in order to be secure. In order to be able to understand
what the security requirements are, we should keep in mind the assets at stake,
detailed in Risk Analysis, and therefore need protection. Thus, our system must
provide:
This chapter explores the current state of encryption techniques specifically de-
signed to secure video data during its transmission from cameras to databases,
as well as the methods used to secure this data within the database. We will
also examine robust access control systems that safeguard stored content and
the techniques employed to distribute access keys.
We begin by addressing the challenges associated with encrypting video data
during transmission. Next, we will focus on the encryption of video data within
databases and the existing access control mechanisms. Lastly, we will investigate
secret sharing techniques that enhance confidentiality and reliability in managing
sensitive information, particularly in relation to key distribution.
Surveillance Cameras 5
– Full encryption
– Partial encryption
– Perceptual encryption
– Crypto-compression methods
A widely used protocol that uses AES, and so make use of full encryption, is
TLS. Transport Layer Security (TLS) is a cryptographic protocol designed to
provide communications security over a computer network. TLS is built upon
SSL and the latest version of it is TLS 1.3 which is considered to be the most
secure. The protocol primarily aims to ensure security between client and server
communication which includes :
1. Confidentiality : Protecting the information being exchanged from unautho-
rized access.
2. Integrity : Ensuring the data transmitted has not been tampered with or
altered in transit.
3. Authenticity : Verifying the identity of the communicating parties, often
through the use of digital certificates.
TLS is consisted of two main protocols, TLS Handshake protocol and TLS
Record Protocol.
1. TLS Handshake : This part of TLS is used to negotiate the security param-
eters between a client and a server before any actual bulk data is transmitted.
Here asymmetric encryption is being used between the server and the client
in order to create a secret shared key. In a few words, after the Server has a
valid certificate issued by a Certificate Authority (CA), and a client requests
to communicate with the server with a hello message, the server responds
Surveillance Cameras 7
with his own certificate in order for the client to validate it and proceed for
a secure communication.
2. TLS Record protocol: Once the Handshake is complete, the client and
server can exchange securely data.TLS Handshake allows the client and the
server to establish cryptographic symmetric keys, called session keys which
are consisted of a set of keys for symmetric encryption and one set of sym-
metric MAC keys.uring the data transfer phase of the TLS protocol, the
client and server securely exchange information using the session keys es-
tablished during the handshake. All transmitted data is encrypted, ensuring
confidentiality so that even if intercepted, the information remains unread-
able to unauthorized parties. Additionally, each message includes a MAC
to verify its integrity, ensuring that the data has not been altered during
transmission.
Partial encryption refers to securing only a portion of the bitstream (i.e., specific
bytes or bits), while leaving the rest of the data unchanged. By encrypting a lim-
ited number of bits, the complexity of cryptographic operations and the overall
computational load are significantly reduced, without fully compromising secu-
rity. One example from this algorithm family is pattern encryption, which en-
crypts specific sequences of data bytes according to a predefined pattern, leaving
other sequences unencrypted [5].
Access Control Models Access control is essential in defining who has the
authority to access or modify resources within a system, aiming to balance ease
of management, security, and flexibility. Among the various models, Attribute-
Enhanced Role-Based Access Control (AERBAC)[3] combines the role hierarchy
of Role-Based Access Control with the attribute granularity of Attribute-Based
Access Control (ABAC). This hybrid approach allows for more fine-grained and
dynamic access control policies, making it well-suited for complex systems that
require both structured roles and detailed attribute specifications.
– Features: AES operates on a 128-bit block size and supports key sizes of 128,
192, or 256 bits. It utilizes a substitution-permutation network structure and
Surveillance Cameras 9
Within the threshold secret-sharing scheme (TSSS) type, the most known se-
cret sharing techniques is Shamir’s Secret Sharing Scheme, which relies on the
properties of polynomials over finite fields. As explained in the original article
published in 1979 [6], and shown in Figure 3 the scheme operates as follows:
– Secret Representation: The secret S is represented as the constant term of a
polynomial f (x) of degree t−1, where f (x) = a0 +a1 x+a2 x2 +...+at−1 xt−1 ,
and a0 = S. The coefficients a1 , a2 , ..., at−1 are randomly chosen from a finite
field.
– Share Distribution: Each participant is assigned a distinct value xi and pro-
vided with the same (xi , f (xi )). These pairs are points on the polynomial.
Surveillance Cameras 11
– Secret Reconstruction: Given at least t points (shares), the secret can be re-
constructed by using polynomial interpolation. With fewer than t points, the
polynomial cannot be reconstructed, and hence the secret remains hidden.
Fig. 3. Shamir SSS Construction, from the book "The joy of cryptography", pg 59
6 Design aftab
This chapter presents the design of a cryptography-based solution that meets
the requirements outlined by RoboEye Inc. The solution focuses on protecting
surveillance data during transmission and storage, as well as implementing a
customizable access control mechanism that ensures only legitimate users can
access the data. Figure 4 provides an overview of the proposed design.
Starting off with the data transmission from the camera to the database, we
12 F. Author et al.
will be using TLS 1.3. Firstly, obtaining a valid digital certificate from a trusted
Certificate Authority (CA) is essential. This certificate will authenticate the
server that receives the video footage, establishing trust between the camera
(client) and the database (server).
Next, the server must be properly configured to support TLS 1.3. This may
involve updating the web server or application server software to the latest ver-
sion that includes support for TLS 1.3. It is important to review and select secure
cipher suites that are compatible with TLS 1.3, as this will enhance the security
of the encrypted connections. Once the server is configured, the implementa-
tion of the TLS handshake process must be integrated into the application. This
includes programming the camera (client) to initiate the handshake by send-
ing a "Client Hello" message, which specifies the supported TLS version and
cipher suites. The server will respond with a "Server Hello" message, and the
subsequent steps of certificate exchange and key establishment must be handled
correctly to ensure a secure connection.
By focusing on these implementation steps, the secure transmission of video
footage using TLS 1.3 can be effectively achieved, ensuring that the data remains
encrypted throughout its life cycle.
To ensure the confidentiality and integrity of video data stored in the database,
the system employs the Advanced Encryption Standard (AES) combined with a
Message Authentication Code (MAC). AES is a symmetric-key encryption algo-
rithm widely recognized for its robustness and efficiency, as explained in Section
5.2, making it ideal for securing large volumes of data like video recordings [7].
The integration of a MAC adds an extra layer of security by ensuring that any
unauthorized alterations to the data can be detected.
When video data is transmitted from the camera to the database, it arrives
at the database server. Immediately upon arrival and before any storage occurs,
each video frame is encrypted using AES with a 256-bit key, and a MAC is
generated for each encrypted frame. This immediate encryption and authentica-
tion ensure that unencrypted data is never at rest within the system and that
any tampering can be identified, significantly reducing the risk of unauthorized
access or modification of sensitive information.
The encryption and authentication process is as follows:
1. Data Reception: Video frames are securely transmitted from the camera
to the database server over a secure communication channel, as described in
Section 5.1.
2. Encryption and MAC Generation: Upon arrival, each video frame is
encrypted using AES-256. A MAC is then generated for each encrypted
frame using a secret key and a cryptographic hash function.
Surveillance Cameras 13
3. Key Management: The AES encryption key and the MAC key are pro-
tected using Shamir’s Secret Sharing Scheme, as detailed in Section 5.2.
4. Secure Storage: The encrypted video frames, along with their correspond-
ing MACs, are then stored in the database. Since the data is both encrypted
and authenticated, it remains secure, and any unauthorized alterations can
be detected even if the database is accessed without authorization.
By encrypting the data and generating a MAC immediately upon arrival, the
system ensures that all stored video data is both encrypted at rest and protected
against tampering. This approach eliminates any window of vulnerability where
unencrypted or unauthenticated data could potentially be accessed or altered
within the storage system, thereby enhancing the overall security and integrity
of the video data.
Once the video frame has been confidently transmitted and stored inside the
database, access control becomes a priority to guarantee data confidentiality.
The access control technique developed for this project is based on the principle
of Shamir’s Secret Sharing Scheme, which distributes the decryption keys among
multiple authorized parties according to predefined access control policies. This
scheme ensures that only valid users can reconstruct the encryption key, hence
accessing data.
The Shamir’s Secret Sharing Scheme, as discussed in section 5.2 is used to
protect the AES encryption key, that in turn protect the video data at rest.
This cryptographic technique splits the AES key into various shares that can be
distributed among various authorized users. In performing this, the system can
ensure that multiple parties will need to collaborate in order for the data to be
decrypted; no single person will have complete access to the key.
In the proposed design, policies for access can be flexible, and customizable,
based on the sensitivity of data and the camera capturing them. In the system,
each video recording would have an associated access structure depending on
the source camera and the context of the recording. Given the location of the
camera, and so the sensitivity of the footage recorded, different individuals or
roles may possess shares of a key to AES. For example:
– Public space cameras: The video data would be less sensitive; shares of the
key could be distributed to a police officer, a city administrator, a judge and
the database administrator. In such a case at least two of these four roles
are required in order to get access to the video.
– Cameras in an investment bank: Video data can be very sensitive and hence
require a more intricate access scheme. The AES key can be shared amongst a
judge, a police officer, three bank directors, and the database administrator.
Three of six shares can be required to access the data.
14 F. Author et al.
Each camera in this system can be mapped to one access control policy cus-
tomized, which states which roles have key shares allocated to them and the
number of shares that are necessary as the threshold to reconstruct the key.
This characteristic makes the system flexible in supporting a variaty of different
access structures.
One of the challenges in access management is ensuring the system adapts
to changes in roles or the unavailability of certain users. The use of Shamir’s
Secret Sharing Scheme ensures that the system remains resilient. If a user (e.g.,
a bank director or police officer) is no longer authorized to access the data due
to role changes, retirement, or security concerns, their key share is invalidated,
and a new share is distributed among the remaining authorized parties. This
can be done without needing to re-encrypt the data. In the event that an autho-
rized user loses their key share (due to device loss or other reasons), the system
can still reconstruct the key as long as the minimum quorum of other key hold-
ers is available. In this implementation, we have distributed one extra share to
the database administrator but it is possible to tailor this solution to different
situations.
In the evaluation and analysis the security is discussed along with weaknesses in
the system and future directions.
7.1 Security
An overview of the risks identified in the risk analysis along with the risk miti-
gations from the proposed design in table 2.
The system effectively mitigates the risk of information disclosure. AES en-
sures confidentiality by encrypting the footage in the database. Together with
Surveillance Cameras 15
7.2 Weaknesses
The risks of spoofing, denial of service, and repudiation are not taken into con-
sideration for this project. A strategy for reducing these concerns are necessary
in the future to enhance the security of the system.
References
[1] Sagar Dev Achar et al. “Secure Video Streaming Techniques: A Perfor-
mance Overview”. In: 2023 IEEE Guwahati Subsection Conference (GCON).
2023, pp. 01–06. doi: 10.1109/GCON58516.2023.10183567.
[2] Kyle Croman, Christian Decker, Ittay Eyal, et al. “On Scaling Decentral-
ized Blockchains”. In: International Conference on Financial Cryptography
and Data Security. Springer. 2016, pp. 106–125.
[3] D. Richard Kuhn, Edward J. Coyne, and Timothy R. Weil. “Adding At-
tributes to Role-Based Access Control”. In: Computer 43.6 (2010), pp. 79–
81.
[4] Abeer Tariq Maolood, Ekhlas Khalaf Gbashi, and Eman Shakir Mahmood.
“Novel lightweight video encryption method based on ChaCha20 stream
cipher and hybrid chaotic map”. In: International Journal of Electrical and
Computer Engineering (2022). All Open Access, Gold Open Access, Green
Open Access. doi: 10.11591/ijece.v12i5.pp4988- 5000. url: https:
//www.scopus.com/inward/record.uri?eid=2- s2.0- 85135280934&
doi = 10 . 11591 % 2fijece . v12i5 . pp4988 - 5000 & partnerID = 40 & md5 =
3b30156b2f6ceb09e09a0f7acced7222.
[5] William Puech. Multimedia security 2: Biometrics, video surveillance and
multimedia encryption. wiley, 2022.
[6] Adi Shamir. “How to share a secret”. In: Commun. ACM 22.11 (Nov.
1979), pp. 612–613. issn: 0001-0782. doi: 10.1145/359168.359176. url:
https://doi.org/10.1145/359168.359176.
[7] National Institute of Standards and Technology. “FIPS PUB 197: Ad-
vanced Encryption Standard (AES)”. In: Federal Information Processing
Standards Publication 197 (2001). Available at https://nvlpubs.nist.
gov/nistpubs/FIPS/NIST.FIPS.197.pdf, pp. 1–51.
[8] Craig Taylor. Transport Layer Security (TLS). url: https://cyberhoot.
com/cybrary/transport-layer-security-tls/s.
[9] CSF Tools. STRIDE-LM Threat Model. url: https : / / csf . tools /
reference/stride-lm/.
[10] Chung-Ping Wu and C.-C.J. Kuo. “Design of integrated multimedia com-
pression and encryption systems”. In: IEEE Transactions on Multimedia
7.5 (2005), pp. 828–839. doi: 10.1109/TMM.2005.854469.
[11] Zibin Zheng et al. “An Overview of Blockchain Technology: Architecture,
Consensus, and Future Trends”. In: 2017 IEEE International Congress on
Big Data. IEEE. 2017, pp. 557–564.