SlideShare ist ein Scribd-Unternehmen logo
1 von 27
CCTV in the Cloud
By Riccardo Mazzurco (www.linkedin.com/in/mazzurco)
Oxymoron or paradigm shift?
The CLOUD... what is it?
The CLOUD: a foggy concept
More of marketing
buzzwords than well
defined technologies
People have different
ideas on the meaning
of these terms
In videosurveillance
the term CLOUD have
been too often abused
Advantages of a CLOUD based infrastructure
• No need of in-house computing infrastructure
• No need of skilled staff for installation, maintenance and troubleshooting
• Reliability. The provider takes care of:
– Redundancy
– Contuinuity of operations
– Backups
– Disaster recovery
Costs scalability of a CLOUD based architecture
• No initial investment
• Predictable costs
• Pay only what you use/need
• Grow or shrink computing power, storage and bandwidth on demand
Geography
independent
Unlimited tenants
Accessibility of Cloud Architectures
Evolution of CCTV
Ever growing number number of cameras
Human surveillance is not affordable or feasible
A real waste of resources
Interesting events are just
a tiny part of the recorded video
HD CCTV = BIG DATA
• Data generated by video surveillance has grown to
practically unmanageable amounts
Real life case: July 2005 London bombings
The recordings were
examined for weeks by
human operators trying to
find a clue in the thousands
and thousands hours of
footage.
Weeks of recordings of
hundredths diverse CCTV
systems where collected
from diverse sources: city
center control, shops,
banks, etc.
CCTV and the CLOUD
Common misconceptions
CLOUD is not just remote storage or
accessing applications via web browser
Why cloud storage of video is not viable?
Sheer size of
produced data
Costs of storage
and transfer
Limited available
bandwidth
Moving mountains around...
… extremely rare, just like a speck of gold lost in tons
of rock
Miners don’t move mountains of rock around! They
bring mining equipment close to where gold ore is dug
Meaningful images are…
So... what now?!
Dealing with Big Data
• Cannot rely on significantly more efficient image
compression algorithms
• Must rely on edge-side storage of high quality HD
video
• Must use video content analysis (VCA) to filter
important footage out (thumbnails or short clips)
• Describe meaningful events by means of effectively
searchable metadata
Extracting interesting information on site
Understand locally and communicate only if needed
Smart cameras can filter
out significant events to
reduce the quantity of data
streamed to the data
center even with limited
bandwidth
Blob Motion Tracking
Tracking & Trajectory
Smoke detection
Fire detection
Face detection
Crowd detection
Number Plate Recognition
Lost and Found Detection
Traffic Controls
Origin, Blind, Darkness Alarm Panic Detection
Available features:
The Smart Products
What can be done today
Accurate image
analysis:
now possible since it is
made on RAW images
coming from the
sensor
Smart Products
Internal Architecture
Local high resolution
storage and external
streaming with
adaptive bandwidth.
Broadband connection
not required
Bidirectional
communication layer,
encrypted and
automatic.
Secure and reliable
Internet connectivity
Virtualized data centre
software with Private
or Public Cloud
deployment.
The control room is
everywhere an
Internet connection is
available
Similar problem: the search for Higgs boson
CERN - LHC accelerator
• Bunches of protons and
antiprotons crossing 40 million
times per second generate about
20 collisions per crossing totaling
about 1 billion collisions per
second
• The frequency of producing a
Higgs boson is extremely rare:
once in 1013 = 10 000 000 000 000
interactions or one every 3 hours
ATLAS experiment
• ~100 million electronic channels
• If all data would be recorded, this
would fill 100 000 CDs per second,
a stack which could reach to the
moon and back twice each year.
• Online data filtering is then a must
• Level 1 trigger filters down to
about 75 000 events per second.
• Level 2 trigger reduces it to about
2 000 events per second.
• The Event Filter then selects for
permanent storage about 200
“interesting” events per second.
The correct approach
• Normalize and correlate
information from
heterogeneous sources
to extract meaningful
and actionable results
• Merge information from
widely distributed
different providers and
organizations
Architectural requirements
• Distributed uncompromised information
• Hierarchical online filtering
• Centralized database indexing with simple and efficient search
methods for multiple distributed tenants
• Extraction of readily actionable information
• Possibility to instruct the devices on the field to execute online
and offline queries based on requests issued by tenants in the
cloud
Database indexing in the cloud
• Thumbnails
– vehicles, license plates, persons, faces, etc.
• Metadata
– Number plates, face recognition, etc.
• Classification and profiling
– Person
• Age, Gender, Etnicity, Height
• Mood, Facial expressions
– Vehicle
• Car, Bike, Motorcycle, Bus, Van, RV, Truck
• Manufacturer, Model
Actionable feedback generation
• Correlation
– Timestamping (synchronized)
– Georeferentiation (Indoor, Outdoor)
– Identification
• RF, NFC, BLE, wifi, cellular, loyalty card
• Voice and Biometrics
– Third party databases
• Publicly accessible data
• Crowdsurced data
• Data accessible only by Governmental Entities
How to get there
• The investments and the time needed to achieve the described scenario are
certainly very large
• It is important, then, to devise effective ways to normalize, merge and
analyze data coming from existing systems preserving most of the prior
investments
Thanks for your attention
Any questions?

Weitere ähnliche Inhalte

Was ist angesagt?

The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyKevin Lloyd
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...AlgoSec
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...AlgoSec
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMahbubul Alam
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drivesmuthamizh adhithan
 
Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast ThousandEyes
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center SolutionBilal Husain
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance FiresLiraz Goldstein
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtechSvetlanaUsikava
 
Harness the Power of Microsoft Azure
Harness the Power of Microsoft AzureHarness the Power of Microsoft Azure
Harness the Power of Microsoft AzureRBA
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product PresentationFanky Christian
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsSolarWinds
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP MarketSolarwinds N-able
 
DNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloudcentralohioissa
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...AlgoSec
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 

Was ist angesagt? (20)

The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
Application visibility across the security estate the value and the vision ...
Application visibility across the security estate   the value and the vision ...Application visibility across the security estate   the value and the vision ...
Application visibility across the security estate the value and the vision ...
 
Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...Webinar: How automation can transform the way you manage your network securit...
Webinar: How automation can transform the way you manage your network securit...
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast Monitoring the Pixel-Serving Architecture at Quantcast
Monitoring the Pixel-Serving Architecture at Quantcast
 
Spark tg Contact Center Solution
Spark tg Contact Center SolutionSpark tg Contact Center Solution
Spark tg Contact Center Solution
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
 
Deliver solutions cv_vebtech
Deliver solutions cv_vebtechDeliver solutions cv_vebtech
Deliver solutions cv_vebtech
 
Harness the Power of Microsoft Azure
Harness the Power of Microsoft AzureHarness the Power of Microsoft Azure
Harness the Power of Microsoft Azure
 
DCMS AKCP Product Presentation
DCMS AKCP Product PresentationDCMS AKCP Product Presentation
DCMS AKCP Product Presentation
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal StandardsFederal Webinar: Improve IT Service Management and help meet Federal Standards
Federal Webinar: Improve IT Service Management and help meet Federal Standards
 
Managed Cloud and the MSP Market
Managed Cloud and the MSP MarketManaged Cloud and the MSP Market
Managed Cloud and the MSP Market
 
DNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized SecurityDNSFilter Webinar: Decentralized Security
DNSFilter Webinar: Decentralized Security
 
Lisa Guess - Embracing the Cloud
Lisa Guess - Embracing the CloudLisa Guess - Embracing the Cloud
Lisa Guess - Embracing the Cloud
 
A business driven approach to security policy management a technical perspec...
A business driven approach to security policy management  a technical perspec...A business driven approach to security policy management  a technical perspec...
A business driven approach to security policy management a technical perspec...
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 

Andere mochten auch

State Monitoring System by Kipod
State Monitoring System by KipodState Monitoring System by Kipod
State Monitoring System by KipodOleg Romanovich
 
VMukti - Executive Briefing-1
VMukti  - Executive Briefing-1VMukti  - Executive Briefing-1
VMukti - Executive Briefing-1Hardik Sanghvi
 
VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)Hardik Sanghvi
 
Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Oleg Romanovich
 
Monitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasMonitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasBizTalk360
 
Internet Protocol Based Closed Circuit Video Monitoring System
Internet Protocol Based Closed Circuit Video Monitoring SystemInternet Protocol Based Closed Circuit Video Monitoring System
Internet Protocol Based Closed Circuit Video Monitoring Systemharshivaishu
 
Presentation file
Presentation filePresentation file
Presentation fileVideoguy
 
ACTi Hosted Video in Cloud Computing
ACTi Hosted Video in Cloud ComputingACTi Hosted Video in Cloud Computing
ACTi Hosted Video in Cloud ComputingACTi
 
5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working SuccessfullyTom Blondies
 
Cloud Connector configuration guide with Sonus cloud link
Cloud Connector configuration guide with Sonus cloud linkCloud Connector configuration guide with Sonus cloud link
Cloud Connector configuration guide with Sonus cloud linkThomas Poett
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introductiontoryharis
 
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCopperEgg
 

Andere mochten auch (19)

State Monitoring System by Kipod
State Monitoring System by KipodState Monitoring System by Kipod
State Monitoring System by Kipod
 
Kipod eng 14-06-2016
Kipod eng 14-06-2016Kipod eng 14-06-2016
Kipod eng 14-06-2016
 
Club segmentation
Club segmentationClub segmentation
Club segmentation
 
desired report
desired reportdesired report
desired report
 
VMukti - Executive Briefing-1
VMukti  - Executive Briefing-1VMukti  - Executive Briefing-1
VMukti - Executive Briefing-1
 
VMukti Catalogue - V 2.1 - 2016 (1)
VMukti Catalogue  - V 2.1 - 2016 (1)VMukti Catalogue  - V 2.1 - 2016 (1)
VMukti Catalogue - V 2.1 - 2016 (1)
 
Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service Kipod - Intelligent video analytics as a service
Kipod - Intelligent video analytics as a service
 
Monitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saasMonitoring on premise biz talk applications using cloud based power bi saas
Monitoring on premise biz talk applications using cloud based power bi saas
 
Internet Protocol Based Closed Circuit Video Monitoring System
Internet Protocol Based Closed Circuit Video Monitoring SystemInternet Protocol Based Closed Circuit Video Monitoring System
Internet Protocol Based Closed Circuit Video Monitoring System
 
ZumIn Secure
ZumIn SecureZumIn Secure
ZumIn Secure
 
Presentation file
Presentation filePresentation file
Presentation file
 
ACTi Hosted Video in Cloud Computing
ACTi Hosted Video in Cloud ComputingACTi Hosted Video in Cloud Computing
ACTi Hosted Video in Cloud Computing
 
Remote Working
Remote WorkingRemote Working
Remote Working
 
5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully5 Steps We Used to Set up Remote Working Successfully
5 Steps We Used to Set up Remote Working Successfully
 
Cloud Connector configuration guide with Sonus cloud link
Cloud Connector configuration guide with Sonus cloud linkCloud Connector configuration guide with Sonus cloud link
Cloud Connector configuration guide with Sonus cloud link
 
Cctv ip surveillance system
Cctv ip surveillance systemCctv ip surveillance system
Cctv ip surveillance system
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
Eagle Eye Surveillance Analysis Solution
Eagle Eye Surveillance Analysis SolutionEagle Eye Surveillance Analysis Solution
Eagle Eye Surveillance Analysis Solution
 
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud MonitoringCloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
 

Ähnlich wie CCTV in the CLOUD

Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumJonas Bonér
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource Solutions
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1James Kelly
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeCognizant
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of ThingsHarshitParkar6677
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...RahulJain989779
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawlerIoTCrawler
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and factsArun Ganesh
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Cloud computing
Cloud computingCloud computing
Cloud computingRazib M
 
A Real-Time Version of the Truth
 A Real-Time Version of the Truth A Real-Time Version of the Truth
A Real-Time Version of the TruthEric Kavanagh
 
Cloud computing
Cloud computingCloud computing
Cloud computingAmit Kumar
 

Ähnlich wie CCTV in the CLOUD (20)

DevOps in IoT
DevOps in IoTDevOps in IoT
DevOps in IoT
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge Continuum
 
InSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing DataInSource 2017 Roadshow: Analyzing Data
InSource 2017 Roadshow: Analyzing Data
 
Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1Digital Transformation in 2018: DX 4 3-2-1
Digital Transformation in 2018: DX 4 3-2-1
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Fog computing
Fog computingFog computing
Fog computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Making Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's EdgeMaking Actionable Decisions at the Network's Edge
Making Actionable Decisions at the Network's Edge
 
System Support for Internet of Things
System Support for Internet of ThingsSystem Support for Internet of Things
System Support for Internet of Things
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
 
General introduction to IoTCrawler
General introduction to IoTCrawlerGeneral introduction to IoTCrawler
General introduction to IoTCrawler
 
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud Computing in Business and facts
Cloud Computing in Business and factsCloud Computing in Business and facts
Cloud Computing in Business and facts
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Secure you
Secure you Secure you
Secure you
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A Real-Time Version of the Truth
 A Real-Time Version of the Truth A Real-Time Version of the Truth
A Real-Time Version of the Truth
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 

CCTV in the CLOUD

  • 1. CCTV in the Cloud By Riccardo Mazzurco (www.linkedin.com/in/mazzurco) Oxymoron or paradigm shift?
  • 3. The CLOUD: a foggy concept More of marketing buzzwords than well defined technologies People have different ideas on the meaning of these terms In videosurveillance the term CLOUD have been too often abused
  • 4. Advantages of a CLOUD based infrastructure • No need of in-house computing infrastructure • No need of skilled staff for installation, maintenance and troubleshooting • Reliability. The provider takes care of: – Redundancy – Contuinuity of operations – Backups – Disaster recovery
  • 5. Costs scalability of a CLOUD based architecture • No initial investment • Predictable costs • Pay only what you use/need • Grow or shrink computing power, storage and bandwidth on demand
  • 8. Ever growing number number of cameras Human surveillance is not affordable or feasible
  • 9. A real waste of resources Interesting events are just a tiny part of the recorded video
  • 10. HD CCTV = BIG DATA • Data generated by video surveillance has grown to practically unmanageable amounts
  • 11. Real life case: July 2005 London bombings The recordings were examined for weeks by human operators trying to find a clue in the thousands and thousands hours of footage. Weeks of recordings of hundredths diverse CCTV systems where collected from diverse sources: city center control, shops, banks, etc.
  • 12. CCTV and the CLOUD
  • 13. Common misconceptions CLOUD is not just remote storage or accessing applications via web browser
  • 14. Why cloud storage of video is not viable? Sheer size of produced data Costs of storage and transfer Limited available bandwidth
  • 15. Moving mountains around... … extremely rare, just like a speck of gold lost in tons of rock Miners don’t move mountains of rock around! They bring mining equipment close to where gold ore is dug Meaningful images are…
  • 17. Dealing with Big Data • Cannot rely on significantly more efficient image compression algorithms • Must rely on edge-side storage of high quality HD video • Must use video content analysis (VCA) to filter important footage out (thumbnails or short clips) • Describe meaningful events by means of effectively searchable metadata
  • 18. Extracting interesting information on site Understand locally and communicate only if needed Smart cameras can filter out significant events to reduce the quantity of data streamed to the data center even with limited bandwidth
  • 19. Blob Motion Tracking Tracking & Trajectory Smoke detection Fire detection Face detection Crowd detection Number Plate Recognition Lost and Found Detection Traffic Controls Origin, Blind, Darkness Alarm Panic Detection Available features: The Smart Products What can be done today
  • 20. Accurate image analysis: now possible since it is made on RAW images coming from the sensor Smart Products Internal Architecture Local high resolution storage and external streaming with adaptive bandwidth. Broadband connection not required Bidirectional communication layer, encrypted and automatic. Secure and reliable Internet connectivity Virtualized data centre software with Private or Public Cloud deployment. The control room is everywhere an Internet connection is available
  • 21. Similar problem: the search for Higgs boson CERN - LHC accelerator • Bunches of protons and antiprotons crossing 40 million times per second generate about 20 collisions per crossing totaling about 1 billion collisions per second • The frequency of producing a Higgs boson is extremely rare: once in 1013 = 10 000 000 000 000 interactions or one every 3 hours ATLAS experiment • ~100 million electronic channels • If all data would be recorded, this would fill 100 000 CDs per second, a stack which could reach to the moon and back twice each year. • Online data filtering is then a must • Level 1 trigger filters down to about 75 000 events per second. • Level 2 trigger reduces it to about 2 000 events per second. • The Event Filter then selects for permanent storage about 200 “interesting” events per second.
  • 22. The correct approach • Normalize and correlate information from heterogeneous sources to extract meaningful and actionable results • Merge information from widely distributed different providers and organizations
  • 23. Architectural requirements • Distributed uncompromised information • Hierarchical online filtering • Centralized database indexing with simple and efficient search methods for multiple distributed tenants • Extraction of readily actionable information • Possibility to instruct the devices on the field to execute online and offline queries based on requests issued by tenants in the cloud
  • 24. Database indexing in the cloud • Thumbnails – vehicles, license plates, persons, faces, etc. • Metadata – Number plates, face recognition, etc. • Classification and profiling – Person • Age, Gender, Etnicity, Height • Mood, Facial expressions – Vehicle • Car, Bike, Motorcycle, Bus, Van, RV, Truck • Manufacturer, Model
  • 25. Actionable feedback generation • Correlation – Timestamping (synchronized) – Georeferentiation (Indoor, Outdoor) – Identification • RF, NFC, BLE, wifi, cellular, loyalty card • Voice and Biometrics – Third party databases • Publicly accessible data • Crowdsurced data • Data accessible only by Governmental Entities
  • 26. How to get there • The investments and the time needed to achieve the described scenario are certainly very large • It is important, then, to devise effective ways to normalize, merge and analyze data coming from existing systems preserving most of the prior investments
  • 27. Thanks for your attention Any questions?

Hinweis der Redaktion

  1. How can some information be secure if it is available in the cloud
  2. Probably, the CLOUD, today, is more of a marketing buzzword than a well defined technological concept Asking ten different people what the cloud is, you are likely to get ten or, maybe, eleven different answers In the field of electronic security the term has been often abused gaining an inappropriate meaning or, worse, a negative misconception
  3. It is not affordable/practical to monitor a large number of cameras both for costs of involved resources and for human inability to cope with prolonged attention. According to research, the average professional operator attention drops to only 40% after only 30 minutes. In case of multiple sites spread in the territory local monitoring is too costly and centralized monitoring becomes a must.
  4. In a security system the interesting events worth being looked at or saved are, on average, in the order of minutes per week of a few cameras
  5. All the new HD video surveillance cameras installed worldwide in 2013 have produced 413 Petabytes (1 PB = 1000 TB) worth of data and are expected to produce more than double in just four years, expanding to 859 PB in 2017
  6. http://www.channel4.com/news/london-bombings-cctv-captures-bombers-before-attack http://www.officialconfusion.com/77/investigation/policestatements/180705metinvest.html http://www.boston.com/news/nation/washington/articles/2007/08/12/us_doles_out_millions_for_street_cameras/?page=full
  7. The belief that the CLOUD is just something related to remote storage is widespread in the security market It probably comes from the most common use of the cloud for storing large files, e.g.: File storage/sharing = CLOUD = DropBox
  8. Centralized storage is in most cases unpractical and often impossible because of the sheer size of produced data and limitations in available bandwidth The mentioned amount is enough to fill 92.1 million single-sided, single-layer DVDs or it’s four times the amount of photo and video data stored on Facebook as of February 2012. Transferring and storing large amounts of video to the cloud or to a remote data center is economically unsustainable
  9. The surveillance business is adopting several technologies designed to accommodate and mitigate the rising tide of data. New data compression algorithms. For example, the High Efficiency Video Coding (HEVC) standard—also known as H.265—has been claimed to double the data compression ratio when compared to H.264. Video content analysis (VCA) can be used to filter important events out rather than simply recording continuously. Nevertheless recording of HD images will only be feasible locally moving at a central location only important images and metadata produced by VCA and biometrics
  10. Only the capacity to normalize security data coming from heterogeneous sources and to correlate the gathered information to be compared against known patterns will allow to extract meaningful results which could be actionable in a timely manner It should ideally be possible in widely distributed systems to merge information coming from different providers and organizations