=Paper=
{{Paper
|id=None
|storemode=property
|title=Applying Pervasive and Flexible Access Control to Distributed Multimedia Retrieval
|pdfUrl=https://ceur-ws.org/Vol-908/paper7.pdf
|volume=Vol-908
|dblpUrl=https://dblp.org/rec/conf/immoa/KukhunCMS12
}}
==Applying Pervasive and Flexible Access Control to Distributed Multimedia Retrieval==
Applying Pervasive and Flexible Access Control
to Distributed Multimedia Retrieval
Dana Al-Kukhun, Dana Codreanu, Ana-Maria Manzat, Florence Sedes
Université de Toulouse – IRIT – UMR 5505
118 Route de Narbonne, 31062 Toulouse, France
{kukhun, codreanu, manzat, sedes}@irit.fr
ABSTRACT medical domain, etc.), the access control management should be
The distribution of data sources has formed a classical challenge taken into consideration at the different levels of data processing
for data management. The LINDO framework is an open system and should take into account the user’s mobility. Meanwhile,
that manages the indexing, storage and retrieval of multimedia these security constraints should not affect the user’s accessibility
contents that are distributed in different remote servers and needs especially in important situations.
generated in a real time basis. The main objective of this Our objective is to include the access control within the query
framework is to provide efficient information retrieval with processing and enrich it within the LINDO framework in order to
minimal processing costs. This was achieved through the proposal attain a pervasive accessibility that enables the user to access
of an efficient decentralized content indexing mechanism. When multimedia sources at anytime, anywhere and anyhow. To achieve
considering the pervasive and mobile access to the managed this goal, we have employed PSQRS – Pervasive Situation-aware
content, the need of an access control becomes essential. In this Query Rewriting System – that offers adaptive context and
paper, we apply an access control layer on top of the LINDO situation-aware access solutions. The decision making within the
architecture that manages access based on the RBAC model and system is based on the RBAC model [10] and employs the
realizes decision making using the XACML standard. We explore XACML standard [16]. These technologies are adapted to the
the challenges that face the system in processing access requests distributed access management needs within the LINDO
showing how an access denial could influence the system’s framework.
usability especially when returned to a user facing an important
situation. Thus, we propose to apply flexible decision making that The solution overcomes the access denials taking place in real
searches for alternative resources. This operation is performed time mobile situations by modifying the query processing
using PSQRS, a query rewriting system that aims to provide users mechanism of the LINDO framework and by providing adaptive
with pervasive accessibility where they could access any needed solutions that can bypass the access control constraints.
multimedia source at anytime, anywhere and anyhow. Next in section 2, we introduce a state of the art covering the
different systems managing distributed multimedia content in 2.1,
1. INTRODUCTION the basic standards for distributed access control management in
The necessity of handling a huge quantity of multimedia content 2.2 and some research about multimedia access control in 2.3.
created by multiple sources in a distributed environment emerges The LINDO approach for efficient multimedia distributed content
and raises new challenges concerning the indexing and access to management is described in Section 3 through its architecture, as
the multimedia content, such as: distributed storage and well as its indexing and querying mechanisms. In section 4, we
decentralized processing, choice of the indexing algorithms, real apply an access control layer on top of the LINDO architecture. In
time information retrieval and location-aware retrieval. On top of section 5, the adaptive access control solution is illustrated
that we have to consider also that the users are more and more through a video surveillance use case. Finally, conclusions and
mobile and they need to access the system from anywhere. In such future work directions are provided in section 6.
mobile and pervasive contexts, privacy and security management
is a central issue. 2. STATE OF THE ART:
In this paper, we present a new layer on top of the architecture 2.1 Distributed Multimedia Systems
proposed by the LINDO project1 in order to tackle the above- The constant growing dimension of the multimedia collections
mentioned challenges. The objective of the LINDO project was to that are generated every day brings to the light problems of
build a distributed system for multimedia content management, efficient indexing and retrieval. The solution to these issues
and to ensure effective indexing and storage of data acquired in passes through the generation and management of the metadata
real time. The project didn’t address the issues linked to data associated to the multimedia content.
privacy and security.
These metadata are obtained through the application of indexing
Knowing that ensuring the protection of multimedia content is a algorithms, which have different performances, purposes and
key issue in certain application domains (e.g., video surveillance, constraints. Besides, a great heterogeneity of indexing algorithms
has been defined in the state of the art (e.g., [4] for texts, [13] for
1
images, [18] for audios, [20] for the videos). In a multimedia
http://www.lindo-itea.eu information system it is not desirable to execute all available
41
indexing algorithms on all multimedia contents; because these video surveillance of motorways, in which they detect strange
will (i) overload the system and (ii) produce metadata that might events, identify objects (persons, cars, trucks) and track the
never be used. objects in the videos acquired by different cameras [1]. The video
content is indexed by a segmentation agent on the same server
In the following, we present some distributed systems that
where it is stored. The obtained segmentation is employed by
manage multimedia contents by emphasizing the architectural
other collaborative agents in order to detect anomalies, which are
choice and the adopted solution for multimedia indexing.
displayed to the user as summaries.
A distributed management of the multimedia is used by many
A comparative study of these systems shows that no matter what
projects due to the mobile acquisition context of these contents.
the architectural choice is, the content indexing is usually done on
An advantage of this kind of systems is that they benefit from the
dedicated servers (the content and the associated resulting
distributed storage and processing of the multimedia content and
metadata are transferred over the network) using a pre-defined set
thus, the performances of the system can be improved.
of indexing algorithms. These algorithms are executed on all
The distributed systems that handle multimedia contents employ ingested multimedia. Thus, the resource consumption is not
peer-to-peer or service-oriented architectures. The major problem optimal. This important consumption problem was addressed by
that these systems encounter is the heterogeneity of indexing the LINDO project, which proposes a distributed architecture for
algorithms and of the generated metadata. The following projects the management of multimedia contents, which is favoring
addressed this problem in different manners. reduced resource consumption, in terms of data transfers over the
network, storage and CPU utilization.
The SAPIR (Search on Audio-visual content using Peer-to-peer
Information Retrieval) project [2], [15] proposes a hybrid peer-to- 2.2 Distributed Access Control
peer architecture for the management of multimedia contents. It Access control and privacy protection are key issues nowadays,
employs three specialized indexing servers, where each peer sends especially in the context of distributed systems. In this section, we
its ingested contents in order to be indexed. The resulted metadata present two main standards that are widely employed for
is sent back to the peer that ingested the multimedia content in managing access control within distributed environments: the
order to store it. RBAC model and the XACML standard.
The DISCO (Distributed Indexing and Search by Content)
project2 has chosen a structured peer-to-peer architecture for the 2.2.1 The RBAC Model
management of multimedia contents [5]. The indexing is The principal motivation behind the proposal of the RBAC (Role
accomplished at each peer, at the contents acquisition time. Each Based Access Control) model [10] was to enable easy
peer sends a summary of its index that is concatenated to a global specification and enforcement for enterprise specific security
index which is sent to all the other peers. policies in a way that maps naturally to an organization’s
structure. The RBAC model has simplified the administration and
The CANDELA (Content Analysis and Network DELivery modification (updates) of access privileges especially in the case
Architectures) project3 is focused on the video content analysis of assigning permissions for a large number of users accessing
and retrieval into a Service Oriented Architecture, where the distributed resources.
content is stored and indexed on the distributed servers. The
proposed solution was implemented for several use cases: The main concept of the RBAC model was to group users within
personal mobile multimedia management [17], video surveillance roles that reflect their organizational positions then, simply
[14], [12].
The WebLab project4 proposes an integration infrastructure that
enables the management of indexing algorithms as Web Services
in order to be used in the development of multimedia processing
applications [11]. These indexing services are handled manually
through a graphical interface.
The VITALAS (Video & image Indexing and retrieval in the
Large Scale) project5 capitalizes the WebLab infrastructure in a
distributed multimedia environment [22]. The architecture enables Figure 1: The RBAC Model
the integration of partner's indexing modules as web services. The distribute permissions to these roles instead of repeating the
multimedia content is indexed off-line, at acquisition time. process for each individual.
The MODEST (Multimedia Object Descriptors Extraction from As illustrated in Figure 1, the role is placed at the heart of the
Surveillance Tapes) project6 proposes a multi-agent system for the RBAC model and is seen as an intermediary element that connects
between the users and permissions as it attributes a set of
2
http://www.lamsade.dauphine.fr/disco/index privileges to those users based on their roles. These permissions
3
(PRMS) allow the users to perform operations (OPS) on system
http://www.hitech-projects.com/euprojects/candela sources expressed as objects (OBS).
4
http://weblab-project.org/
5
http://vitalas.ercim.org 2.2.2 XACML
6
The RBAC model managed to solve the challenge of
http://www.tele.ucl.ac.be/PROJECTS/MODEST/index.html administrating access permissions to distributed data sources by
42
providing centralized management for permissions through roles. their system have to be segmented. Only the objects which have
With the evolution of service-oriented architectures and web roles associated to are extracted from the multimedia contents.
services, new challenges has arisen and the problem of managing The system stores several versions of the multimedia contents, the
access becomes more complicated as the access control policies original one and one for each user-based restriction.
are also being distributed and more dynamic since they’re
[21] Studied the confidentiality and privacy issues in the context
managed by different administrating authorities. To resolve this
of a video surveillance system. They also defined access rights to
problem, the XACML standard was introduced by [16].
different hierarchical objects that can be extracted from the video
XACML (extensible Access Control Markup Language) is an contents. They focused on the detection of suspicious events.
XML based policy language that describes access control policies
to allow the attribution of user privileges on system sources. The
3. THE LINDO APPROACH
standard provides a system for authentication and authorization
taking into account various factors related to the user’s context. 3.1 System Architecture
XACML provides an expressive security policy for data exchange The main goal of the LINDO project (Large scale distributed
within dynamic environments, which enables a flexible way to INDexation of multimedia Objects) is to define a distributed
express and enforce access control policies. system for multimedia content management, while focusing on the
efficient use of the resources in the indexing and query processes.
Thus, not only the multimedia contents storage is distributed but
also the indexing process. The originality of this solution is that:
(a) the content is not moved to indexing servers, but indexing
algorithms are deployed on the servers where the content is
acquired; (b) the indexing process is accomplished in two steps: a
generic indexing at ingest time (i.e., implicit indexing) and a more
detailed one at query time (i.e., explicit indexing). The Figure 3
illustrates an example of the distributed architecture proposed
within LINDO project. A more detailed presentation of the
LINDO architecture can be found in [6].
Figure 2: The XACML dataflow
As shown in Figure 2, as a client makes a resource request upon a
server; a PEP (Policy Enforcement Point) interferes to ensure a
secure and authorized access. In order to enforce a security policy,
PEP will formalize attributes describing the requester (these
attributes can be extracted from the user profile) to the PIP
(Policy Information Point) and delegate the authorization decision
to the PDP (Policy Decision Point). Applicable policies are
located in a policy store PAP (Policy Administration Point) and
evaluated at the PDP, which then returns the authorization
decision. Using this information, the PEP can deliver the
appropriate response to the client and ensures that only authorized Figure 3: Example of LINDO architecture
resources are accessed.
Thus, the adopted distributed architecture enables to bypass
2.3 MULTIMEDIA ACCESS CONTROL problems that are specific to centralized systems like:
The projects mentioned in Section 2.1 were focused on the (1) The query processing slowness: executing the query on all
indexing and retrieval of multimedia contents, but none of them metadata existing in the system might overload the central server,
took into consideration problems related to the privacy and access especially when processing complex queries and when several
control management of the contents and systems resources. queries are executed simultaneously.
Meanwhile, many solutions have been proposed in order to secure (2) The network bandwidth overload: in a classical approach all
the access to multimedia databases and systems. While some contents and associated metadata are transferred to central server
authors were interested in the security of the connection to the or to dedicated servers.
systems and on the distribution of the contents [19], others were
focused on the content-based multimedia access control with fine- (3) The system centralization: this could rise problems like fault
grained restrictions at a specific level of the multimedia data [9]. resistance, if the central server is no longer available the metadata
collection needs to be recomputed.
[8] proposes a framework that addresses multi-level multimedia
access control by adopting RBAC, XML, and Object-Relational (4) The violation of access rights concerning the contents: some
Databases. The authors associated roles to users, IP addresses, metadata shouldn’t be stored on the central server for privacy
objects and time periods. All multimedia contents handled by reasons.
43
Indoor Outdoor
Intrusion - Presence of people - Presence of people & vehicles
Counting - Number of people - Number of people, number of vehicles
- Main color of the upper part of - Main color of the people upper part.
the people - Main color of vehicles
Figure 4: Examples of Metadata attained by applying Implicit Indexing Algorithms
Indoor Outdoor
Intrusion - Presence of people - Presence of people & vehicles
Counting - Number of people - Number of people, number of vehicles
- Main color of the upper part of the - Main color of the people upper part.
people - Main color of vehicles
- Face recognition - Car plate number
- voice recognition & speech-to-text - Face recognition
Figure 5: Examples of Metadata attained by applying Explicit Indexing Algorithms
remote servers) in order to select the remote servers that could
3.2 System Functionality provide answers to the query and it is sent for execution to the
The functionality adopted within the previously presented system selected servers. Among the servers that were not selected at the
architecture goes as follows: the content is acquired and stored on first step, there could be some servers that contain relevant
the remote servers, and the collection of indexing algorithms is information that has not been indexed with the right algorithms.
stored and managed on the central server. This collection is For this reason, the LINDO solution detects such supplementary
variable; at any moment we can integrate new algorithms with algorithms [7] and starts their execution (i.e., explicit indexing)
different functionalities, execution constraints and performances. on a sub-collection of multimedia contents. All the results
obtained from the remote servers are sent to the central server,
3.2.1 Indexing Mechanism where they are combined and displayed to the user.
In order to reduce resource consumption, the architecture allows
the indexing of multimedia contents to be accomplished at
acquisition time (i.e., implicit indexing) with some generic
algorithms (e.g., person detection, dominant color detection) and
on demand (i.e., explicit indexing) with some algorithms that will
analyze the contents more in detail (e.g., person recognition,
register plate detection). This avoids executing all the indexing
algorithms at once and producing metadata that might never be
used but raises access rights issues concerning the explicit
indexing. The Figure 4 and Figure 5 offer some indexing
algorithms examples that illustrate the difference of the level of
detail attained by the implicit and explicit indexing. These
algorithms differentiate between two types of context acquisition
(indoor and outdoor).
3.2.2 Query Processing Mechanism
The query processing (illustrated in Figure 6) begins with the
query specification on the central server. First, the query is
processed and executed on the metadata collection on the central
Figure 6: Query Processing Flow Chart
server (which is a summary of the metadata collections from
44
4. ADDING AN ACCESS CONTROL 2. The presentation of the video contents (the identity of
filmed persons in a video surveillance system is
LAYER TO THE LINDO ARCHITECTURE protected by privacy laws that assure their anonymity).
The sensitivity of the multimedia content and the privacy
protection law that imposes anonymity constraints justify the need Next, we introduce the detailed functionality of the PSQRS
of applying an access control scheme on top of the LINDO architecture.
architecture. The proposed layer customizes access based on the
user’s role (RBAC model) and is responsible for managing: 4.3 The PSQRS Architecture
1. The access rights granted to users or services demanding access As illustrated in Figure 7, the PSQRS (Pervasive Situation-aware
to the multimedia sources (e.g., video surveillance, medical Query Rewriting System) architecture contains several
domain, etc.) that vary not only according to their role but also in components and the sequence of its functionality starts from the
terms of their context (time, location, etc.). user, who enters the system through an authentication portal (step
1) and launches an access request to a certain element (step 2).
2. The access rights for executing queries that employ the explicit This request will be interpreted by our Query Interpreter that will
indexing algorithms: the risk of disclosing personal or translate the request into an XACML request and send it to the
confidential information arises with the level of detail sought and Query Analyzer (step3). The request (R) will be analyzed in
provided by the indexing algorithm increases. consideration with the user’s profile - automatically extracted at
We highlight that in the context of adding this access control the sign in process - and according to his context (XACML flow
layer, the lack of responses returned to a user’s query might not chart, Figure 2). As the analysis finishes, the Query Analyzer
only be due to the lack of results existing within the system but would send the result directly to the user if it’s a Permit (step 4a)
also due to access restrictions imposed by the security layer. or back to the Query Interpreter, if it’s a deny (step 4b).
4.1 A Pervasive Vision for LINDO
Our goal is to apply the access control layer and to balance
between the security constraints and the user needs to find
solutions that can ensure seamless accessibility to the requested
resources at any time, from anywhere and anyhow.
The pervasive accessibility that we aim to provide matches with
the pervasive characteristics of the LINDO system, which are:
• The distribution of multimedia sources.
• The variation of the entities managing these resources.
• The evolutive nature of these resources (generated and
indexed in real time).
• The sensitivity and confidentiality of their content.
• The diversity of contextual information.
• The distribution of the indexing process performed by a Figure 7: The PSQRS Architecture
variety of indexing algorithms. In a deny situation the adaptive situation-aware query rewriting
• The execution of access requests in real time. mechanism will take place and function as follows: the Query
• The importance level of obtaining reactive solutions in Interpreter will check the sensitivity of the consulting situation
important consultations or critical situations. with the help of the Sensitivity Analyzer component (steps 5, 6)
and according to the importance level of the situation, the Query
4.2 Confronting Accessibility Challenges with Interpreter will search for similar or alternative resources through
Adaptive Access Control the Similarity Provider component (steps 7, 8) and employ them
Managing access requests becomes more challenging within to rewrite the XACML request (R’) and send it again to the Query
pervasive environments due to the dynamicity of contextual and Analyzer that will analyze the request and transfer the result back
situational information. Our objective is to ensure an efficient to the user (steps 10a,10b).
information retrieval process despite the security challenges. In
order to achieve this objective, we employ PSQRS (Pervasive 5. VIDEO SURVEILLANCE USECASE
Situation-aware Query Rewriting System) - an adaptive decision- In this section, we present an example where the implementation
making system that confronts access denials taking place in real- of our proposal is used to overcome the lack of answers provided
time consulting situations by rewriting access requests in order to by the system. As we will illustrate next, the system will modify
offer alternative-based access solutions. the query processing and will adapt access decisions according to
The access control relaxation that we propose to carry out respects the level of importance of the querying situation.
the access rights defined to protect the multimedia content and Scenario: Taking the metro from « Trocadéro » station to « Place
applies the adaptive decision-making at two functionalities: d'Italie » station at 14:15, Helen has forgotten her red bag on a
1. The choice of using the explicit indexing algorithms bench at the waiting line. As soon as she realized, she went out to
(located on remote servers). report the problem at the information counter.
45
A typical treatment of such situations goes through the customer 5.2 Employing PSQRS for Adaptive and
service agent who would open a lost object file, take the
descriptions and transmit them to the security officer on site. The Alternative based Query Processing
security agent will follow different steps in order to find the The search results returned to the security agent in this case might
object; he will check if the object has already been found or be insufficient especially that the red bag might be present in the
returned to the lost and found office by someone. Otherwise, he unauthorized segments containing passenger faces. Our proposal
will try to see the video surveillance system to check if the object can take place at this level as a step towards ensuring a better
is still in the same location. quality of service by offering a wider subset of resources to the
user while respecting the access rights defined on the consultation
of the video surveillance data sources.
5.1 Typical LINDO Query Processing
Figure 8 shows the typical interpretation performed by the Through the usage of our proposed PS-RBAC model, the system
information retrieval system provided by LINDO. The launched would be able to offer more accessibility and adapt the
request will be processed and parsed to extract the main keywords permissions assigned to the security agent according to his
that are then reformulated in the form of an XML user query. contextual attributes and to the importance level of the situation of
the consultation.
Query: Find all videos containing a red bag, forgotten in
Trocadéro, Paris metro station, on the 2nd of February, between This adaptive solution can be employed when the system
2:00pm and now (3:00pm). identifies access challenges related to the user’s context or at an
important situation. In this scenario, the « lost object » situation
find all videos containing a red bag, forgotten in
identification can be obtained from the file number.
Trocadéro, Paris metro station, on 2 February, between 2:00pm and 3:00pm. The implementation of the adaptive solutions is performed by the
metro station, Paris, Trocadéro
PSQRS that adapts decision-making by rewriting the XACML
Video queries. The solution proves its effectiveness due to its ability to
achieve decision making to access video surveillance sources that
2012-02-02T14:00:00 are distributed and administrated by different authorities.
2012-02-02T15:00:00
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="urn:oasis:names:tc:xacml:2.0:context:schema:os
Figure 8: Request represented in XML http://docs.oasisopen.org/xacml/access_control-xacml-2.0-context-schema-os.xsd">
The distributive nature of resource management and query
based retrieval mechanism. The objective is to find the results that John Smith
the subset of metadata that the system has to scan in real-time Security Agent
while processing the request.
locating the servers responsible for managing the data streams sa2023
captured by the cameras located in the Trocadéro station waiting
line. Next, a filtering step is performed to restrict the search find all videos containing a red bag,
within the segments captured between 14:00 and 15:00. forgotten in Trocadéro, Paris metro station, on Thursday,
2 Febuary, between 2:00pm and 3:00pm).
The system will then, determine a list of indexing algorithms that metro station, Paris, Trocadéro
would meet the needs, properties and context expressed within the Video
query. This step will retrieve a subset of metadata describing the
2012-02-02T14:00:00
segments corresponding to the query. 2012-02-02T15:00:00
In this scenario, the requested information are generic thus, the
query processing will perform the search on the metadata
central server. The system will continue the search to find a red Read
object in the retrieved list of metadata describing the chosen
A filtering process is applied to take into account access control Situation
rules. Analyzing the access rights assigned to the security agent,
Forgotten Object
employ the explicit indexing algorithms existing at remote
1
segments that contain people faces and finally return to the user
the list of segments that contain a red object (if available).
Figure 9: XACML request embedding the user’s query
46
As shown in Figure 8, the richness of the elements that we can Table 1: The adaptive solutions that our adaptive query
embed within an XACML query enables it to describe the processing can employ
contextual attributes characterizing: (i) the requested source in
the « resource » tag, (ii) the user launching the request in the « Problem The adaptive solution
subject » tag and (iii) the situation at which the user has launched The privacy law imposing the protection of anonymity of
the access request in the « environment » tag. audiovisual contents
The importance level of the situation will determine the level of Passenger faces are not Display the content after the execution of
adaptation to be realized. The activation of the adaptive search authorized an algorithm that applies a blur face
mode will be communicated from the XACML response in the function.
form of an « obligation » that accompanies the resulting access
decision, see Figure 10. Voices are not- Use an algorithm for speech-to-text
authorized transcription
Volume of the video
Deny Lack of storage capacity Use a compression algorithm in order to
on the user’s machine obtain a smaller file
Format not supported Use a conversion algorithm into a
by the user’s machine compatible format.
Download problems due Use a summarization algorithm in order
New solutions can also be inserted to the adaptive solutions
On database through a learning mechanism that detects the solutions
that users employ when encountered with access challenges in real
time.
The success of the adaptive solutions suggested by the users
Figure 10: XACML response containing the obligation would eventually be more efficient if they knew the reason behind
the access denial. The error messages that often accompany the
As the adaptive querying mode is triggered, the query processing
returned access denial responses can serve as indicators to help
mechanism will change to ensure the success of the search by
the users in finding alternative solutions.
providing a variety of adaptive solutions in correspondence with
the situation’s sensitivity level. Therefore, the adaptive solution for this example will modify the
treatment process and will: (i) neglect the filtering step
This adaptive search solution is realized by the PSQRS that
responsible for imposing the access control constraints and (ii)
detects the situation sensitivity through the Situation Analyzer
replace it with an adaptive step-related to the presentation of
component and turns to the Similarity Provider component to find
resources with unauthorized content.
similar resources that will guide the query rewriting process (see
Figure 7). By applying this process to the scenario described above, the
system will return the video segments taken from the Trocadéro
In the case where the search didn’t retrieve satisfactory results to
station between 14:00 and 15:00 and containing a red object.
the user and the consultation is taking place in a normal situation
(Sit_Lvl = 0), the system will perform the adaptive query These results will be filtered in order to detect the unauthorized
rewriting step through semantic similarity. The keywords of the segments (containing passenger faces). This is where the system
user query will be reformulated using similar words or more will apply the adaptation process that would filter the display to
generic concepts offered by the Similarity Provider. Similar works conform with the access restrictions imposed by the system.
have been introduced in [3], the objective is to maximize The adaptation will be performed through a face detection step
accessibility chances without crossing the security boundaries. and the use of an algorithm that applies a “blur function” to
The semantic reformulation options can be achieved with the help protect the privacy of passengers appearing in these segments in
of a standard lexical dictionary such as WordNet. For example, order to return to the user a list of pertinent results that respect the
the word "bag" can be replaced by various synonyms {backpack, access rules.
luggage, purse, etc.}.
At the other hand, the adaptation process in the mentioned 6. CONCLUSION
scenario will follow another scheme since the lost object situation In this paper, we have presented an adaptive approach for access
is judged to be of higher importance (Sit_Lvl = 1). Hence, the control management within multimedia distributed systems. Our
Similarity Provider component will be replaced by an Adaptive solution overcomes the access denials that take place in real time
Solutions Provider. This component will provide some predefined access demands by modifying the query processing mechanism
solutions that could bypass the access control challenge or would and by providing adaptive solutions to bypass the access control
assist the user in adapting and reformulating his query by pointing constraints. The proposed solution has been validated within the
out the access challenge and offering him adaptive solutions that LINDO framework in the context of a video surveillance use case.
would suit his context, the solutions are often saved in a We applied and validated the same access control approach for
predefined database. Table 1 shows examples of the solutions that other use cases, such as Healthcare Systems [3].
the system can offer.
47
The adaptive and alternative based situation-aware solution can [11] Giroux, P., Brunessaux, S., Brunessaux, S., Doucy, J.,
increase the complexity of processing the request, but if we Dupont, G., Grilheres, B., Mombrun, Y.,and Saval, A.
consider the usefulness of the results provided in real time and the Weblab : An integration infrastructure to ease the
fact they do not violate the access rights defined by the privacy development of multimedia processing applications, In the
law, this complexity seems quite acceptable. 21st Conference on Software and Systems Engineering and
In future works, we aim to extend our proposal by taking into their Applications, 2008
account different contextual elements that might also influence the [12] Jaspers, E.G.T., Wijnhoven, R.G.J., Albers, A.H.R.,
accessibility to multimedia content (e.g., hardware, network Desurmont, X., Barais, M., Hamaide, J.,and Lienard B.
bandwidth, etc.) and to apply the adaptive process not only at the Candela-Storage, Analysis and Retrieval of Video Content in
presentation level but also at the choice of the explicit indexing Distributed Systems: Real-Time Video Surveillance and
algorithms that are protected by RBAC constraints. Retrieval. In Proc. of the IEEE International Conference on
Multimedia and Expo , 2005, 1553-1556.
7. ACKNOWLEDGMENTS [13] Kosch, H. and Maier, P. Content based image retrieval
This work has been supported by the EUREKA project LINDO systems – reviewing and benchmarking, In Proc. of the 9th
(ITEA2-06011). Workshop on Multimedia Metadata, 2009, 1-21.
[14] Merkus, P., Desurmont, X., Jaspers, E., Wijnhoven, R.,
8. REFERENCES Caignart, O., Delaigle, J.-F.,and Favoreel, W. Candela -
[1] Abreu, B., Botelho, L., Cavallaro, A., Douxchamps, D., integrated storage, analysis and distribution of video content
Ebrahimi, T., Figueiredo, P., Macq, B., Mory, B., Nunes, L., for intelligent information systems. In European Workshop
Orri, J., Trigueiros, M. J., and Violante, A. Video-Based on the Integration of Knowledge, Semantics and Digital
Multi-Agent Traffic Surveillance System. In Proc. of the Media Technology (EWIMT’04), 2004
IEEE Intelligent Vehicles Symposium. 2000, 457-462 [15] Michal, B., Fabrizio, F., Claudio, L., David, N., Raffaele, P.,
[2] Agosti, M., Buccio, E. D., Nunzio, G. M. D., Ferro, N., Fausto, R., Jan, S.,and Pavel, Z. Building a web-scale image
Melucci, M., Miotto, R., and Orio, N. Distributed similarity search system. In Multimedia Tools and
information retrieval and automatic identification of music Applications. 47, 3(May 2010), 599-629.
works in SAPIR. In Proc. of the 15th Italian Symposium on [16] OASIS, A brief Introduction to XACML, http://www.oasis-
Advanced Database Systems (SEBD’07), 2007, 479-482. open.org/committees/download.php/
[3] Al Kukhun, D. and Sedes, F., Adaptive Solutions for Access 2713/Brief_Introduction_to_XACML.html, 14 mars 2003
Control within Pervasive Healthcare Systems. In Proc. of [17] Pietarila, P., Westermann, U., Jarvinen, S., Korva, J., Lahti,
International Conference On Smart homes and health J., and Lothman, H. Candela-storage, analysis, and retrieval
Telematics (ICOST 2008), 2008, 42-53. of video content in distributed systems: Personal mobile
[4] Berry, M. W. and Castellanos, M., Survey of Text Mining II: multimedia management. In Proc. of the IEEE International
Clustering, Classification, and Retrieval, Springer, 2008. Conference on Multimedia and Expo (ICME’05), 2005,
[5] Boisson, F., Crucianu, M., and Vodislav, D. Publication 1557-1560.
Framework for Content-Based Search in Heterogeneous [18] Pinquier,J., André-Obrecht, R. Audio Indexing: Primary
Distributed Multimedia Databases. Scientific Rapport Components Retrieval - Robust Classification in Audio
CEDRIC No 1585, 2008. 18 pages. Documents. In Multimedia Tools and Applications, 30,3
[6] Brut, M., Codreanu, D., Dumitrescu, S., Manzat, A.-M., (September 2006), 313-330.
Sedes, F. A distributed architecture for flexible multimedia [19] Sánchez, M., López, G., Cánovas, O., Sánchez, J.-A., and
management and retrieval. In Proc. of Database and Expert Gómez-Skarmeta, A. F. An access control system for
Systems Applications (DEXA, 2011),2011, 249-263 multimedia content distribution. In Proc. of the Third
[7] Brut, M., Codreanu, D., Manzat, A.-M., and Sèdes, F. European conference on Public Key Infrastructure: theory
Adapting Indexation to the Content, Context and Queries and Practice (EuroPKI 2006), 2006, 169-183.
Characteristics in Distributed Multimedia Systems. In Proc. [20] Snoek, C. G., Worring, M. Multimodal video indexing: A
of International Conference on Signal-Image Technology & review of the state of the art. In Multimedia Tools and
Internet-Based Systems (SITIS 2011), 2011, 118-125. Applications, 25, 1(January 2005), 5- 35.
[8] Chen,S.-C., Shyu, M.-L., and Zhao, N. SMARXO: towards [21] Thuraisingham, B., Lavee, G., Bertino, E., Fan, J., and Khan.
secured multimedia applications by adopting RBAC, XML L. Access control, confidentiality and privacy for video
and object-relational database. In Proc. of the 12th annual surveillance databases. In Proc. of the eleventh ACM
ACM international conf. on Multimedia, 2004, 432-435. symposium on Access control models and technologies
[9] El-Khoury, V. A Multi-level Access Control Scheme for (SACMAT '06), 2006, 1-10.
Multimedia Database. In 9th Workshop on Multimedia [22] Viaud, M.-L., Thièvre, J., Goëau, H., Saulnier, A., and
Metadata (WMM'09), 2009. Buisson, O. Interactive components for visual exploration of
[10] Ferraiolo, D. F., and Richard Kuhn, D. Role-Based Access multimedia archives. In Proc. of the International
Controls. In Proc. of the 15th National Computer Security Conference on Image and Video Retrieval, 2008, 609-616
Conference, 1992, 554-563.
48