Nothing Special   »   [go: up one dir, main page]

Skip to main content

Breakthroughs and Challenges in Multimedia Privacy and Security in the Internet of Things (IoT)

  • Chapter
  • First Online:
Intelligent Multimedia Signal Processing for Smart Ecosystems
  • 175 Accesses

Abstract

With the rapid advancement of internet, massive amounts of multimedia content are generated and/or exchanged via multiple Internet of Things (IoT) systems, devices, and applications. However, the privacy and security of multimedia information have surfaced as major problems that might compromise the effective adoption of IoT devices, particularly in data-sensitive scenarios. This paper provides an in-depth examination of multimedia content privacy and security protection in the IoT systems. A classification of multimedia information into various categories and security levels based on application fields is initially presented. Then, an examination and debate on the current multimedia content protection systems in the IoT, covering both conventional systems such as encryption and watermarking, and developing technologies such as blockchain and federated learning, is conducted. This work identifies certain challenges and opportunities, highlighting areas for future research based on an extensive examination of the research progress of IoT-related multimedia privacy and security protection research. Besides the work is aimed to, further assist the investigators in developing a greater understanding of the state-of-the-art in multimedia content protection in the IoT.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Karie NM, Sahri NM, Haskell-Dowland P (2020) IoT threat detection advances, challenges and future directions. In: 2020 workshop on emerging technologies for security in IoT (ETSecIoT), April 2020. IEEE, pp 22–29

    Google Scholar 

  2. Zhou L, Chao HC (2011) Multimedia traffic security architecture for the internet of things. IEEE Netw 25(3):35–40

    Article  Google Scholar 

  3. Yongliang L, Gao W, Liu S (2004) Multimedia security in the distributed environment. In: APCC/MDMC’04. The 2004 joint conference of the 10th Asia-Pacific conference on communications and the 5th international symposium on multi-dimensional mobile communications proceeding, August 2004, vol 2. IEEE, pp 639–642

    Google Scholar 

  4. Punia A, Gupta D, Jaiswal S (2017) A perspective on available security techniques in IoT. In: 2017 2nd IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), May 2017. IEEE, pp 1553–1559

    Google Scholar 

  5. Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A (2013) A systemic approach for IoT security. In: 2013 IEEE international conference on distributed computing in sensor systems, May 2013. IEEE, pp 351–355

    Chapter  Google Scholar 

  6. Parah SA, Sheikh JA, Hafiz AM, Bhat GM (2014) Data hiding in scrambled images: a new double layer security data hiding technique. Comput Electr Eng 40(1):70–82

    Article  Google Scholar 

  7. Parah SA, Sheikh JA, Bhat GM (2012) Data hiding in intermediate significant bit planes, a high capacity blind steganographic technique. In: 2012 international conference on emerging trends in science, engineering and technology (INCOSET), December 2012. IEEE, pp 192–197

    Chapter  Google Scholar 

  8. Parah SA, Sheikh JA, Bhat GM (2014) A secure and efficient spatial domain data hiding technique based on pixel adjustment. Am J Eng Technol Res 14(2):33

    Google Scholar 

  9. Parah SA, Sheikh JA, Bhat GM (2012) On the realization of a secure, high capacity data embedding technique using joint top-down and down-top embedding approach. Comput Sci Eng 49:10141

    Google Scholar 

  10. Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413

    Article  Google Scholar 

  11. Nahrstedt K, Dittmann J, Wohlmacher P (2000) Approaches to multimedia and security. In: 2000 IEEE international conference on multimedia and Expo. ICME2000. Proceedings. Latest advances in the fast changing world of multimedia (Cat. No. 00TH8532), July 2000, vol 3. IEEE, pp 1275–1278

    Google Scholar 

  12. Tzelepi S, Pangalos G, Nikolacopoulou G (2002) Security of medical multimedia. Med Inform Internet Med 27(3):169–184

    Article  Google Scholar 

  13. Furht B, Socek D (2003) A survey of multimedia security. Comprehensive report.

    Google Scholar 

  14. Voloshynovskyy S, Koval O, Deguillaume F, Pun T (2005) Multimedia security: open problems and solutions. In: Proceedings of NATO-advanced study institute: security through science program 2005

    Google Scholar 

  15. Moravčík M, Segeč P, Hrabovský J, Papán J, Uramová J (2016) Survey of real-time multimedia security mechanisms. In: 2016 international conference on emerging eLearning technologies and applications (ICETA), November 2016. IEEE, pp 233–238

    Chapter  Google Scholar 

  16. Ashour AS, Dey N (2017) Security of multimedia contents: a brief. In: Intelligent techniques in signal processing for multimedia security. Springer, Cham, pp 3–14

    Chapter  Google Scholar 

  17. Li Y, Jeong YS, Shin BS, Park JH (2017) Crowdsensing multimedia data: security and privacy issues. IEEE Multimed 24(4):58–66

    Article  Google Scholar 

  18. Alvi SA, Afzal B, Shah GA, Atzori L, Mahmood W (2015) Internet of multimedia things: vision and challenges. Ad Hoc Netw 33:87–111

    Article  Google Scholar 

  19. Wang Q, Zhao Y, Wang W, Minoli D, Sohraby K, Zhu H, Occhiogrosso B (2017) Multimedia IoT systems and applications. In: 2017 global internet of things summit (GIoTS), June 2017. IEEE, pp 1–6

    Google Scholar 

  20. Kumar D, Kumar P, Ashok A (2020) Introduction to multimedia big data computing for IoT. In: Multimedia big data computing for IoT applications. Springer, Singapore, pp 3–36

    Google Scholar 

  21. Hurrah NN, Parah SA, Sheikh JA, Al-Turjman F, Muhammad K (2019) Secure data transmission framework for confidentiality in IoTs. Ad Hoc Netw 95:101989

    Article  Google Scholar 

  22. Parah SA, Sheikh JA, Akhoon JA, Loan NA (2020) Electronic health record hiding in images for smart city applications: a computationally efficient and reversible information hiding technique for secure communication. Futur Gener Comput Syst 108:935–949

    Article  Google Scholar 

  23. Nauman A, Qadri YA, Amjad M, Zikria YB, Afzal MK, Kim SW (2020) Multimedia internet of things: a comprehensive survey. IEEE Access 8:8202–8250

    Article  Google Scholar 

  24. Verma S, Bhatia A, Chug A, Singh AP (2020) Recent advancements in multimedia big data computing for IoT applications in precision agriculture: opportunities, issues, and challenges. In: Multimedia big data computing for IoT applications. Springer, Singapore, pp 391–416

    Chapter  Google Scholar 

  25. Nath MP, Priyadarshini SBB, Ray M, Das DS (2022) An overview of multimedia technologies in current era of internet of things (IoT). In: Multimedia technologies in the internet of things environment, vol 2, pp 1–23

    Google Scholar 

  26. Yu S (2016) Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4:2751–2763

    Article  Google Scholar 

  27. Qu Y, Yu S, Zhou W, Peng S, Wang G, Xiao K (2018) Privacy of things: emerging challenges and opportunities in wireless internet of things. IEEE Wirel Commun 25(6):91–97

    Article  Google Scholar 

  28. Alhirabi N, Rana O, Perera C (2021) Security and privacy requirements for the internet of things: a survey. ACM Trans Internet Things 2(1):1–37

    Article  Google Scholar 

  29. Husnoo MA, Anwar A, Chakrabortty RK, Doss R, Ryan MJ (2021) Differential privacy for IoT-enabled critical infrastructure: a comprehensive survey. IEEE Access 9:153276–153304

    Article  Google Scholar 

  30. Jiang B, Li J, Yue G, Song H (2021) Differential privacy for industrial internet of things: opportunities, applications, and challenges. IEEE Internet Things J 8(13):10430–10451

    Article  Google Scholar 

  31. Oracevic A, Dilek S, Ozdemir S (2017) Security in internet of things: a survey. In: 2017 international symposium on networks, computers and communications (ISNCC), May 2017. IEEE, pp 1–6

    Google Scholar 

  32. Bhat GM, Mustafa M, Parah SA, Ahmad J (2010) Field programmable gate array (FPGA) implementation of novel complex PN-code-generator-based data scrambler and descrambler. Maejo Int J Sci Technol 4(1):125–135

    Google Scholar 

  33. Qu Y, Yu S, Gao L, Zhou W, Peng S (2018) A hybrid privacy protection scheme in cyber-physical social networks. IEEE Trans Comput Soc Syst 5(3):773–784

    Article  Google Scholar 

  34. Zikria YB, Afzal MK, Kim SW (2020) Internet of multimedia things (IoMT): opportunities, challenges and solutions. Sensors 20(8):2334

    Article  Google Scholar 

  35. Khattab A, Abdelgawad A, Yelmarthi K (2016) Design and implementation of a cloud-based IoT scheme for precision agriculture. In: 2016 28th international conference on microelectronics (ICM), December 2016. IEEE, pp 201–204

    Google Scholar 

  36. Mohanraj I, Ashokumar K, Naren J (2016) Field monitoring and automation using IOT in agriculture domain. Procedia Comput Sci 93:931–939

    Article  Google Scholar 

  37. Yang W, Wang S, Zheng G, Chaudhry J, Valli C (2018) ECB4CI: an enhanced cancelable biometric system for securing critical infrastructures. J Supercomput 74(10):4893–4909

    Article  Google Scholar 

  38. Ribaric S, Ariyaeeinia A, Pavesic N (2016) De-identification for privacy protection in multimedia content: a survey. Signal Process Image Commun 47:131–151

    Article  Google Scholar 

  39. Lu Y, Wu S, Fang Z, Xiong N, Yoon S, Park DS (2017) Exploring finger vein based personal authentication for secure IoT. Futur Gener Comput Syst 77:149–160

    Article  Google Scholar 

  40. Thilagavathi B, Suthendran K (2018) Boosting based implementation of biometric authentication in IoT. J Cyber Secur Mobil:131–144

    Google Scholar 

  41. Yang W, Wang S, Zheng G, Yang J, Valli C (2019) A privacy-preserving lightweight biometric system for internet of things security. IEEE Commun Mag 57(3):84–89

    Article  Google Scholar 

  42. Xu J, Glicksberg BS, Su C, Walker P, Bian J, Wang F (2021) Federated learning for healthcare informatics. J Healthc Inform Res 5(1):1–19

    Article  Google Scholar 

  43. Bhoomika BK, Muralidhara KN (2015) Secured smart healthcare monitoring system based on Iot. Int J Recent Innov Trends Comput Commun 3(7):4958–4961

    Google Scholar 

  44. Muhammad G, Rahman SMM, Alelaiwi A, Alamri A (2017) Smart health solution integrating IoT and cloud: a case study of voice pathology monitoring. IEEE Commun Mag 55(1):69–73

    Article  Google Scholar 

  45. Parah SA, Kaw JA, Bellavista P, Loan NA, Bhat GM, Muhammad K, de Albuquerque VHC (2020) Efficient security and authentication for edge-based internet of medical things. IEEE Internet Things J 8(21):15652–15662

    Article  Google Scholar 

  46. Rashid M, Singh H, Goyal V, Parah SA, Wani AR (2021) Big data based hybrid machine learning model for improving performance of medical internet of things data in healthcare systems. In: Healthcare paradigms in the internet of things ecosystem. Academic Press, pp 47–62

    Chapter  Google Scholar 

  47. Sarosh P, Parah SA, Bhat GM, Heidari AA, Muhammad K (2021) Secret sharing-based personal health records management for the internet of health things. Sustain Cities Soc 74:103129

    Article  Google Scholar 

  48. Obaidat MS, Rana SP, Maitra T, Giri D, Dutta S (2019) Biometric security and internet of things (IoT). In: Biometric-based physical and cybersecurity systems. Springer, Cham, pp 477–509

    Chapter  Google Scholar 

  49. Hsu TH, Tung YM (2020) A social-aware P2P video transmission strategy for multimedia IoT devices. IEEE Access 8:95574–95584

    Article  Google Scholar 

  50. Yu H, Wang J, Sun X (2019) Surveillance video online prediction using multilayer ELM with object principal trajectory. SIViP 13(6):1243–1251

    Article  Google Scholar 

  51. Feng X, Ye M, Swaminathan V, Wei S (2017) Towards the security of motion detection-based video surveillance on IoT devices. In: Proceedings of the on thematic workshops of ACM multimedia, October 2017. Association for Computing Machinery, New York, NY, pp 228–235

    Google Scholar 

  52. Liu W, Zhang M, Luo Z, Cai Y (2017) An ensemble deep learning method for vehicle type classification on visual traffic surveillance sensors. IEEE Access 5:24417–24425

    Article  Google Scholar 

  53. Zhao H, Qin J, Hu J (2012) An energy efficient key management scheme for body sensor networks. IEEE Trans Parallel Distrib Syst 24(11):2202–2210

    Article  Google Scholar 

  54. Pandey C, Sharma S, Matta P (2021) Privacy techniques for body sensor network in healthcare internet of things (HIoT)-a critical survey. In: 2021 5th international conference on computing methodologies and communication (ICCMC), April 2021. IEEE, pp 385–389

    Google Scholar 

  55. Ren Y, Zhu F, Zhu K, Sharma PK, Wang J (2021) Blockchain-based trust establishment mechanism in the internet of multimedia things. Multimed Tools Appl 80(20):30653–30676

    Article  Google Scholar 

  56. Vishwa A, Hussain FK (2018) A blockchain based approach for multimedia privacy protection and provenance. In: 2018 IEEE symposium series on computational intelligence (SSCI), November 2018. IEEE, pp 1941–1945

    Chapter  Google Scholar 

  57. Li D, Liu W, Deng L, Qin B (2021) Design of multimedia blockchain privacy protection system based on distributed trusted communication. Trans Emerg Telecommun Technol 32(2):e3938

    Article  Google Scholar 

  58. Abdur Rahman M, Loukas G, Maruf Abdullah S, Abdu A, Sadiqur Rahman S, Hassanain E, Arafa Y (2019) Blockchain and IoT-based secure multimedia retrieval system for a massive crowd: sharing economy perspective. In: Proceedings of the 2019 on international conference on multimedia retrieval, June 2019, pp 404–407

    Google Scholar 

  59. Rathee G, Sharma A, Saini H, Kumar R, Iqbal R (2020) A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology. Multimed Tools Appl 79(15):9711–9733

    Article  Google Scholar 

  60. Maggo P, Chhillar RS (2013) Lightweight image encryption scheme for multimedia security. Int J Comput Appl 71(13)

    Google Scholar 

  61. Dhall S, Pal SK, Sharma K (2014) Cryptographic primitives for multimedia security. INROADS-Int J Jaipur National Univ 3(1s2):335–339

    Google Scholar 

  62. Wang X, Akgul A, Kacar S, Pham VT (2017) Multimedia security application of a ten-term chaotic system without equilibrium. Complexity 2017

    Google Scholar 

  63. Mekki N, Hamdi M, Aguili T, Kim TH (2018) A real-time chaotic encryption for multimedia data and application to secure surveillance framework for IoT system. In: 2018 international conference on advanced communication technologies and networking (CommNet), April 2018. IEEE, pp 1–10

    Google Scholar 

  64. Nie H, Jiang X, Tang W, Zhang S, Dou W (2020) Data security over wireless transmission for enterprise multimedia security with fountain codes. Multimed Tools Appl 79(15):10781–10803

    Article  Google Scholar 

  65. Liu F, Li T (2018) A clustering-anonymity privacy-preserving method for wearable iot devices. Secur Commun Netw 2018

    Google Scholar 

  66. Xiong J, Ren J, Chen L, Yao Z, Lin M, Wu D, Niu B (2018) Enhancing privacy and availability for data clustering in intelligent electrical service of IoT. IEEE Internet Things J 6(2):1530–1540

    Article  Google Scholar 

  67. Guo X, Lin H, Wu Y, Peng M (2020) A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems. Futur Gener Comput Syst 113:407–417

    Article  Google Scholar 

  68. Onesimu JA, Karthikeyan J, Sei Y (2021) An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. Peer Peer Netw Appl 14(3):1629–1649

    Article  Google Scholar 

  69. Tian Y, Zhang Z, Xiong J, Chen L, Ma J, Peng C (2021) Achieving graph clustering privacy preservation based on structure entropy in social IoT. IEEE Internet Things J 9(4):2761–2777

    Article  Google Scholar 

  70. Xia Y, Chen W, Liu X, Zhang L, Li X, Xiang Y (2017) Adaptive multimedia data forwarding for privacy preservation in vehicular ad-hoc networks. IEEE Trans Intell Transp Syst 18(10):2629–2641

    Article  Google Scholar 

  71. Aljawarneh S, Yassein MB, Talafha WAA (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76(21):22703–22724

    Article  Google Scholar 

  72. Mishra D, Vijayakumar P, Sureshkumar V, Amin R, Islam SK, Gope P (2018) Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Appl 77(14):18295–18325

    Article  Google Scholar 

  73. Kumari S, Om H (2017) Cryptanalysis and improvement of an anonymous multi-server authenticated key agreement scheme. Wirel Pers Commun 96(2):2513–2537

    Article  Google Scholar 

  74. Deebak BD, Al-Turjman F, Mostarda L (2019) A hash-based RFID authentication mechanism for context-aware management in IoT-based multimedia systems. Sensors 19(18):3821

    Article  Google Scholar 

  75. Omrani T, Rhouma R, Becheikh R (2019) LICID: a lightweight image cryptosystem for IoT devices. Cryptologia 43(4):313–343

    Article  Google Scholar 

  76. Ma S, Zhang T, Wu A, Zhao X (2019) Lightweight and privacy-preserving data aggregation for mobile multimedia security. IEEE Access 7:114131–114140

    Article  Google Scholar 

  77. Huang CT, Tsai MY, Lin LC, Wang WJ, Wang SJ (2018) VQ-based data hiding in IoT networks using two-level encoding with adaptive pixel replacements. J Supercomput 74(9):4295–4314

    Article  Google Scholar 

  78. Hurrah NN, Parah SA, Loan NA, Sheikh JA, Elhoseny M, Muhammad K (2019) Dual watermarking framework for privacy protection and content authentication of multimedia. Futur Gener Comput Syst 94:654–673

    Article  Google Scholar 

  79. Wu HT, Zheng K, Huang Q, Hu J (2021) Contrast enhancement of multiple tissues in MR brain images with reversibility. IEEE Signal Processing Lett 28:160–164

    Article  Google Scholar 

  80. Rani M, Germine Mary G, Rosemary Euphrasia K (2016) Multilevel multimedia security by integrating visual cryptography and steganography techniques. In: Computational intelligence, cyber security and computational models. Springer, Singapore, pp 403–412

    Chapter  Google Scholar 

  81. Xu C, Ren J, Zhang D, Zhang Y (2018) Distilling at the edge: a local differential privacy obfuscation framework for IoT data analytics. IEEE Commun Mag 56(8):20–25

    Article  Google Scholar 

  82. Qiao Y, Liu Z, Lv H, Li M, Huang Z, Li Z, Liu W (2019) An effective data privacy protection algorithm based on differential privacy in edge computing. IEEE Access 7:136203–136213

    Article  Google Scholar 

  83. Zia MT, Khan MA, El-Sayed H (2020) Application of differential privacy approach in healthcare data–a case study. In: 2020 14th international conference on innovations in information technology (IIT), November 2020. IEEE, pp 35–39

    Google Scholar 

  84. Xue W, Shen Y, Luo C, Xu W, Hu W, Seneviratne A (2022) A differential privacy-based classification system for edge computing in IoT. Comput Commun 182:117–128

    Article  Google Scholar 

  85. Pang J, Huang Y, Xie Z, Han Q, Cai Z (2020) Realizing the heterogeneity: a self-organized federated learning framework for IoT. IEEE Internet Things J 8(5):3088–3098

    Article  Google Scholar 

  86. Imteaj A, Amini MH (2019) Distributed sensing using smart end-user devices: pathway to federated learning for autonomous IoT. In: 2019 international conference on computational science and computational intelligence (CSCI), December 2019. IEEE, pp 1156–1161

    Chapter  Google Scholar 

  87. Lu Y, Huang X, Dai Y, Maharjan S, Zhang Y (2019) Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans Industr Inform 16(6):4177–4186

    Article  Google Scholar 

  88. Wu Q, He K, Chen X (2020) Personalized federated learning for intelligent IoT applications: a cloud-edge based framework. IEEE Open J Comput Soc 1:35–44

    Article  Google Scholar 

  89. Hamoudy MA, Qutqut MH, Almasalha F (2017) Video security in internet of things: an overview. IJCSNS 17(8):199

    Google Scholar 

  90. OVIC (2021) Internet of things and privacy – issues and challenges [Available Online] https://ovic.vic.gov.au/privacy/internet-of-things-and-privacy-issues-and-challenges/ (Accessed 30 July 2022)

  91. Bodei C, Chessa S, Galletta L (2019) Measuring security in IoT communications. Theor Comput Sci 764:100–124

    Article  MathSciNet  MATH  Google Scholar 

  92. Shifa A, Asghar MN, Fleury M (2016) Multimedia security perspectives in IoT. In: 2016 sixth international conference on innovative computing technology (INTECH), August 2016. IEEE, pp 550–555

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rohun Nisa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nisa, R., Baba, A. (2023). Breakthroughs and Challenges in Multimedia Privacy and Security in the Internet of Things (IoT). In: Parah, S.A., Hurrah, N.N., Khan, E. (eds) Intelligent Multimedia Signal Processing for Smart Ecosystems. Springer, Cham. https://doi.org/10.1007/978-3-031-34873-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34873-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34872-3

  • Online ISBN: 978-3-031-34873-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics