{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:29Z","timestamp":1750309589394,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,17]]},"DOI":"10.1145\/3723178.3723202","type":"proceedings-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T07:16:47Z","timestamp":1749194207000},"page":"177-182","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Real-Time Framework for Secure Storage of Surveillance Video Data in Cloud Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-0646-4785","authenticated-orcid":false,"given":"Shivam","family":"Gupta","sequence":"first","affiliation":[{"name":"IIT(ISM), Dhanbad, Dhanbad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9432-0387","authenticated-orcid":false,"given":"Bhaskar","family":"Biswas","sequence":"additional","affiliation":[{"name":"IIT(ISM), Dhanbad, Dhanbad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4229-0715","authenticated-orcid":false,"given":"Arup Kumar","family":"Pal","sequence":"additional","affiliation":[{"name":"IIT(ISM) DHANBAD, Dhanbad, India"}]}],"member":"320","published-online":{"date-parts":[[2025,6,6]]},"reference":[{"unstructured":"[n. d.]. VIRAT. https:\/\/viratdata.org\/ (Date last accessed 2-May-2024).","key":"e_1_3_3_1_2_2"},{"doi-asserted-by":"crossref","unstructured":"Ijaz Ahmad Wooyeol Choi and Seokjoo Shin. 2023. Comprehensive Analysis of Compressible Perceptual Encryption Methods\u2014Compression and Encryption Perspectives. Sensors 23 8 (2023) 4057.","key":"e_1_3_3_1_3_2","DOI":"10.3390\/s23084057"},{"unstructured":"EC Amazon. 2015. Amazon web services. Available in: http:\/\/aws. amazon. com\/es\/ec2\/(November 2012) 39 (2015).","key":"e_1_3_3_1_4_2"},{"doi-asserted-by":"crossref","unstructured":"Ifeoluwapo Aribilola Mamoona\u00a0Naveed Asghar Nadia Kanwal Martin Fleury and Brian Lee. 2022. Securecam: Selective detection and encryption enabled application for dynamic camera surveillance videos. IEEE Transactions on Consumer Electronics (2022).","key":"e_1_3_3_1_5_2","DOI":"10.36227\/techrxiv.21354003.v1"},{"doi-asserted-by":"crossref","unstructured":"Xiaochun Cao Meili Ma Xiaojie Guo Ling Du and Dongdai Lin. 2015. A new encryption scheme for surveillance videos. Frontiers of Computer Science 9 (2015) 765\u2013777.","key":"e_1_3_3_1_6_2","DOI":"10.1007\/s11704-015-3362-4"},{"unstructured":"Joan Daemen and Vincent Rijmen. 1999. AES proposal: Rijndael. (1999).","key":"e_1_3_3_1_7_2"},{"doi-asserted-by":"crossref","unstructured":"Mousa Farajallah Guillaume Gautier Wassim Hamidouche Olivier D\u00e9forges and Safwan El\u00a0Assad. 2022. Selective encryption of the versatile video coding standard. IEEE Access 10 (2022) 21821\u201321835.","key":"e_1_3_3_1_8_2","DOI":"10.1109\/ACCESS.2022.3149599"},{"doi-asserted-by":"crossref","unstructured":"Alem Fitwi Yu Chen and Sencun Zhu. 2021. Enforcing privacy preservation on edge cameras using lightweight video frame scrambling. IEEE Transactions on Services Computing 16 1 (2021) 276\u2013287.","key":"e_1_3_3_1_9_2","DOI":"10.1109\/TSC.2021.3135352"},{"doi-asserted-by":"crossref","unstructured":"Jianting Guo Peijia Zheng and Jiwu Huang. 2017. An efficient motion detection and tracking scheme for encrypted surveillance videos. ACM Transactions on Multimedia Computing Communications and Applications (TOMM) 13 4 (2017) 1\u201323.","key":"e_1_3_3_1_10_2","DOI":"10.1145\/3131342"},{"unstructured":"Xiaofei He Lixiang Li Haipeng Peng and Fenghua Tong. 2024. An Efficient Image Privacy Preservation Scheme for Smart City Applications Using Compressive Sensing and Multi-Level Encryption. IEEE Transactions on Intelligent Transportation Systems (2024).","key":"e_1_3_3_1_11_2"},{"doi-asserted-by":"publisher","key":"e_1_3_3_1_12_2","DOI":"10.1109\/WACV57701.2024.00685"},{"doi-asserted-by":"crossref","unstructured":"Haitong Lou Xuehu Duan Junmei Guo Haiying Liu Jason Gu Lingyun Bi and Haonan Chen. 2023. DC-YOLOv8: small-size object detection algorithm based on camera sensor. Electronics 12 10 (2023) 2323.","key":"e_1_3_3_1_13_2","DOI":"10.3390\/electronics12102323"},{"unstructured":"Rajdeep Mukherjee Omer Tripp Ben Liblit and Michael Wilson. 2022. Static analysis for AWS best practices in Python code. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2205.04432 (2022).","key":"e_1_3_3_1_14_2"},{"unstructured":"Amos\u00a0R Omondi. 1999. Floating-point arithmetic and the IEEE-754 standard I: Number-system design. Informatica(Ljubljana) 23 3 (1999) 413\u2013429.","key":"e_1_3_3_1_15_2"},{"doi-asserted-by":"crossref","unstructured":"R Roselinkiruba T Sree\u00a0Sharmila and JK\u00a0Josephine Julina. 2024. An efficient Moving object Encryption Compression and Interpolation technique for video steganography. Multimedia Tools and Applications (2024) 1\u201331.","key":"e_1_3_3_1_16_2","DOI":"10.1007\/s11042-023-17930-1"},{"doi-asserted-by":"crossref","unstructured":"Fatma\u00a0M Talaat and Hanaa ZainEldin. 2023. An improved fire detection approach based on YOLO-v8 for smart cities. Neural Computing and Applications 35 28 (2023) 20939\u201320954.","key":"e_1_3_3_1_17_2","DOI":"10.1007\/s00521-023-08809-1"},{"key":"e_1_3_3_1_18_2","volume-title":"Amazon Web Services in Action: An in-depth guide to AWS","author":"Wittig Andreas","year":"2023","unstructured":"Andreas Wittig and Michael Wittig. 2023. Amazon Web Services in Action: An in-depth guide to AWS. Simon and Schuster."},{"doi-asserted-by":"crossref","unstructured":"Hui Xu Xiaojun Tong Zhu Wang Miao Zhang Yang Liu and Jing Ma. 2020. Robust video encryption for h. 264 compressed bitstream based on cross-coupled chaotic cipher. Multimedia Systems 26 4 (2020) 363\u2013381.","key":"e_1_3_3_1_19_2","DOI":"10.1007\/s00530-020-00648-7"},{"unstructured":"Jin-Yong Yu and Young-Gab Kim. 2023. Coding unit-based region of interest encryption in HEVC\/h. 265 video. IEEE Access (2023).","key":"e_1_3_3_1_20_2"}],"event":{"acronym":"ICCA 2024","name":"ICCA 2024: 3rd International Conference on Computing Advancements","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the 3rd International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723202","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3723178.3723202","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:56:46Z","timestamp":1750298206000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3723178.3723202"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"references-count":19,"alternative-id":["10.1145\/3723178.3723202","10.1145\/3723178"],"URL":"https:\/\/doi.org\/10.1145\/3723178.3723202","relation":{},"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"2025-06-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}