SlideShare a Scribd company logo
CCTV in the Cloud
By Riccardo Mazzurco (www.linkedin.com/in/mazzurco)
Oxymoron or paradigm shift?
The CLOUD... what is it?
The CLOUD: a foggy concept
More of marketing
buzzwords than well
defined technologies
People have different
ideas on the meaning
of these terms
In videosurveillance
the term CLOUD have
been too often abused
Advantages of a CLOUD based infrastructure
• No need of in-house computing infrastructure
• No need of skilled staff for installation, maintenance and troubleshooting
• Reliability. The provider takes care of:
– Redundancy
– Contuinuity of operations
– Backups
– Disaster recovery
Costs scalability of a CLOUD based architecture
• No initial investment
• Predictable costs
• Pay only what you use/need
• Grow or shrink computing power, storage and bandwidth on demand
Geography
independent
Unlimited tenants
Accessibility of Cloud Architectures
Evolution of CCTV
Ever growing number number of cameras
Human surveillance is not affordable or feasible
A real waste of resources
Interesting events are just
a tiny part of the recorded video
HD CCTV = BIG DATA
• Data generated by video surveillance has grown to
practically unmanageable amounts
Real life case: July 2005 London bombings
The recordings were
examined for weeks by
human operators trying to
find a clue in the thousands
and thousands hours of
footage.
Weeks of recordings of
hundredths diverse CCTV
systems where collected
from diverse sources: city
center control, shops,
banks, etc.
CCTV and the CLOUD
Common misconceptions
CLOUD is not just remote storage or
accessing applications via web browser
Why cloud storage of video is not viable?
Sheer size of
produced data
Costs of storage
and transfer
Limited available
bandwidth
Moving mountains around...
… extremely rare, just like a speck of gold lost in tons
of rock
Miners don’t move mountains of rock around! They
bring mining equipment close to where gold ore is dug
Meaningful images are…
So... what now?!
Dealing with Big Data
• Cannot rely on significantly more efficient image
compression algorithms
• Must rely on edge-side storage of high quality HD
video
• Must use video content analysis (VCA) to filter
important footage out (thumbnails or short clips)
• Describe meaningful events by means of effectively
searchable metadata
Extracting interesting information on site
Understand locally and communicate only if needed
Smart cameras can filter
out significant events to
reduce the quantity of data
streamed to the data
center even with limited
bandwidth
Blob Motion Tracking
Tracking & Trajectory
Smoke detection
Fire detection
Face detection
Crowd detection
Number Plate Recognition
Lost and Found Detection
Traffic Controls
Origin, Blind, Darkness Alarm Panic Detection
Available features:
The Smart Products
What can be done today
Accurate image
analysis:
now possible since it is
made on RAW images
coming from the
sensor
Smart Products
Internal Architecture
Local high resolution
storage and external
streaming with
adaptive bandwidth.
Broadband connection
not required
Bidirectional
communication layer,
encrypted and
automatic.
Secure and reliable
Internet connectivity
Virtualized data centre
software with Private
or Public Cloud
deployment.
The control room is
everywhere an
Internet connection is
available
Similar problem: the search for Higgs boson
CERN - LHC accelerator
• Bunches of protons and
antiprotons crossing 40 million
times per second generate about
20 collisions per crossing totaling
about 1 billion collisions per
second
• The frequency of producing a
Higgs boson is extremely rare:
once in 1013 = 10 000 000 000 000
interactions or one every 3 hours
ATLAS experiment
• ~100 million electronic channels
• If all data would be recorded, this
would fill 100 000 CDs per second,
a stack which could reach to the
moon and back twice each year.
• Online data filtering is then a must
• Level 1 trigger filters down to
about 75 000 events per second.
• Level 2 trigger reduces it to about
2 000 events per second.
• The Event Filter then selects for
permanent storage about 200
“interesting” events per second.
The correct approach
• Normalize and correlate
information from
heterogeneous sources
to extract meaningful
and actionable results
• Merge information from
widely distributed
different providers and
organizations
Architectural requirements
• Distributed uncompromised information
• Hierarchical online filtering
• Centralized database indexing with simple and efficient search
methods for multiple distributed tenants
• Extraction of readily actionable information
• Possibility to instruct the devices on the field to execute online
and offline queries based on requests issued by tenants in the
cloud
Database indexing in the cloud
• Thumbnails
– vehicles, license plates, persons, faces, etc.
• Metadata
– Number plates, face recognition, etc.
• Classification and profiling
– Person
• Age, Gender, Etnicity, Height
• Mood, Facial expressions
– Vehicle
• Car, Bike, Motorcycle, Bus, Van, RV, Truck
• Manufacturer, Model
Actionable feedback generation
• Correlation
– Timestamping (synchronized)
– Georeferentiation (Indoor, Outdoor)
– Identification
• RF, NFC, BLE, wifi, cellular, loyalty card
• Voice and Biometrics
– Third party databases
• Publicly accessible data
• Crowdsurced data
• Data accessible only by Governmental Entities
How to get there
• The investments and the time needed to achieve the described scenario are
certainly very large
• It is important, then, to devise effective ways to normalize, merge and
analyze data coming from existing systems preserving most of the prior
investments
Thanks for your attention
Any questions?

More Related Content

PPTX
Transpeye Overview V1 (1)
Mick Prendergast
 
PDF
Adaptive Security and Incident Response - A Business-Driven Approach
AlgoSec
 
PPTX
Jaxxon consulting presentation
Darrin Jackson
 
PPTX
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
PDF
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
PPTX
199 baseline security
Darrin Jackson
 
PPTX
10 Steps to Architecting a Sustainable SCADA System
Inductive Automation
 
PDF
HP ArcSight Demonstrating ROI For a SIEM Solution
rickkaun
 
Transpeye Overview V1 (1)
Mick Prendergast
 
Adaptive Security and Incident Response - A Business-Driven Approach
AlgoSec
 
Jaxxon consulting presentation
Darrin Jackson
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
SteveAtHPE
 
Migrating and Managing Security Policies in a Segmented Data Center
AlgoSec
 
199 baseline security
Darrin Jackson
 
10 Steps to Architecting a Sustainable SCADA System
Inductive Automation
 
HP ArcSight Demonstrating ROI For a SIEM Solution
rickkaun
 

What's hot (20)

PPTX
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
PPTX
Application visibility across the security estate the value and the vision ...
AlgoSec
 
PDF
Webinar: How automation can transform the way you manage your network securit...
AlgoSec
 
PDF
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Mahbubul Alam
 
PDF
Security a Revenue Center: How Security Can Drive Your Business
shira koper
 
PPTX
IIOT on Variable Frequency Drives
muthamizh adhithan
 
PDF
Monitoring the Pixel-Serving Architecture at Quantcast
ThousandEyes
 
PDF
Spark tg Contact Center Solution
Bilal Husain
 
PPTX
DTS Services
David A. Le Roy
 
PDF
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
PPTX
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
PDF
Deliver solutions cv_vebtech
SvetlanaUsikava
 
PDF
Harness the Power of Microsoft Azure
RBA
 
PDF
DCMS AKCP Product Presentation
Fanky Christian
 
PPTX
Federal Webinar: Improve IT Service Management and help meet Federal Standards
SolarWinds
 
PDF
Managed Cloud and the MSP Market
Solarwinds N-able
 
PPTX
DNSFilter Webinar: Decentralized Security
DNSFilter
 
PPTX
Lisa Guess - Embracing the Cloud
centralohioissa
 
PPTX
A business driven approach to security policy management a technical perspec...
AlgoSec
 
PPTX
Stay One Step Ahead of Cyber Threats - Check Point
MarcoTechnologies
 
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
Application visibility across the security estate the value and the vision ...
AlgoSec
 
Webinar: How automation can transform the way you manage your network securit...
AlgoSec
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Mahbubul Alam
 
Security a Revenue Center: How Security Can Drive Your Business
shira koper
 
IIOT on Variable Frequency Drives
muthamizh adhithan
 
Monitoring the Pixel-Serving Architecture at Quantcast
ThousandEyes
 
Spark tg Contact Center Solution
Bilal Husain
 
DTS Services
David A. Le Roy
 
Cloud Services & the Development of ISO/IEC 27018
Corporacion Colombia Digital
 
2019 01-30 Firewalls Ablaze? Put Out Network Security Audit & Compliance Fires
Liraz Goldstein
 
Deliver solutions cv_vebtech
SvetlanaUsikava
 
Harness the Power of Microsoft Azure
RBA
 
DCMS AKCP Product Presentation
Fanky Christian
 
Federal Webinar: Improve IT Service Management and help meet Federal Standards
SolarWinds
 
Managed Cloud and the MSP Market
Solarwinds N-able
 
DNSFilter Webinar: Decentralized Security
DNSFilter
 
Lisa Guess - Embracing the Cloud
centralohioissa
 
A business driven approach to security policy management a technical perspec...
AlgoSec
 
Stay One Step Ahead of Cyber Threats - Check Point
MarcoTechnologies
 
Ad

Viewers also liked (19)

PDF
State Monitoring System by Kipod
Oleg Romanovich
 
PDF
Kipod eng 14-06-2016
Oleg Romanovich
 
PPTX
Club segmentation
Oleg Romanovich
 
PPTX
desired report
Oleg Romanovich
 
PDF
VMukti - Executive Briefing-1
Hardik Sanghvi
 
PDF
VMukti Catalogue - V 2.1 - 2016 (1)
Hardik Sanghvi
 
PDF
Kipod - Intelligent video analytics as a service
Oleg Romanovich
 
PPTX
Monitoring on premise biz talk applications using cloud based power bi saas
BizTalk360
 
PPTX
Internet Protocol Based Closed Circuit Video Monitoring System
harshivaishu
 
PDF
ZumIn Secure
Invertedi Analytics
 
PPT
Presentation file
Videoguy
 
PPSX
ACTi Hosted Video in Cloud Computing
ACTi
 
PPSX
Remote Working
Payal Kataria
 
PPTX
5 Steps We Used to Set up Remote Working Successfully
Tom Blondies
 
PDF
Cloud Connector configuration guide with Sonus cloud link
Thomas Poett
 
PPTX
Cctv ip surveillance system
A Total Communication Solutions Provider
 
PPT
Cloud Computing Integration Introduction
toryharis
 
PDF
Eagle Eye Surveillance Analysis Solution
The Knowledge Compass, Inc.
 
PPTX
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
CopperEgg
 
State Monitoring System by Kipod
Oleg Romanovich
 
Kipod eng 14-06-2016
Oleg Romanovich
 
Club segmentation
Oleg Romanovich
 
desired report
Oleg Romanovich
 
VMukti - Executive Briefing-1
Hardik Sanghvi
 
VMukti Catalogue - V 2.1 - 2016 (1)
Hardik Sanghvi
 
Kipod - Intelligent video analytics as a service
Oleg Romanovich
 
Monitoring on premise biz talk applications using cloud based power bi saas
BizTalk360
 
Internet Protocol Based Closed Circuit Video Monitoring System
harshivaishu
 
ZumIn Secure
Invertedi Analytics
 
Presentation file
Videoguy
 
ACTi Hosted Video in Cloud Computing
ACTi
 
Remote Working
Payal Kataria
 
5 Steps We Used to Set up Remote Working Successfully
Tom Blondies
 
Cloud Connector configuration guide with Sonus cloud link
Thomas Poett
 
Cctv ip surveillance system
A Total Communication Solutions Provider
 
Cloud Computing Integration Introduction
toryharis
 
Eagle Eye Surveillance Analysis Solution
The Knowledge Compass, Inc.
 
Cloud Monitoring 101 - The Five Key Elements to Effective Cloud Monitoring
CopperEgg
 
Ad

Similar to CCTV in the CLOUD (20)

PDF
DevOps in IoT
Dmitry Lavrinenko
 
PDF
Kalix: Tackling the The Cloud to Edge Continuum
Jonas Bonér
 
PDF
InSource 2017 Roadshow: Analyzing Data
InSource Solutions
 
PPTX
Digital Transformation in 2018: DX 4 3-2-1
James Kelly
 
PDF
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
PPTX
Fog computing
Ankit_ap
 
PDF
Internet of Things
Aniekan Akpaffiong
 
PPT
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
PDF
Making Actionable Decisions at the Network's Edge
Cognizant
 
PDF
System Support for Internet of Things
HarshitParkar6677
 
PPTX
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
RahulJain989779
 
PPTX
Nathan Hiscock - Architecting secure, scalable, cost-efficient computer visio...
AWS Chicago
 
PPTX
Nathan Hiscock Architecting secure, scalable, cost-efficient computer vision...
AWS Chicago
 
PDF
General introduction to IoTCrawler
IoTCrawler
 
PDF
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA (European Emergency Number Association)
 
PPTX
Cloud computing
Aamir chouhan
 
PPTX
Cloud Computing in Business and facts
Arun Ganesh
 
PPTX
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Henrique Centieiro
 
PPTX
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
National Institute of Technolgy(REC) warangal
 
PPTX
Secure you
Fatin Chowdhury
 
DevOps in IoT
Dmitry Lavrinenko
 
Kalix: Tackling the The Cloud to Edge Continuum
Jonas Bonér
 
InSource 2017 Roadshow: Analyzing Data
InSource Solutions
 
Digital Transformation in 2018: DX 4 3-2-1
James Kelly
 
EMEA10: Trepidation in Moving to the Cloud
CompTIA UK
 
Fog computing
Ankit_ap
 
Internet of Things
Aniekan Akpaffiong
 
ICRTITCS-2012 Conference Publication
Tejaswi Agarwal
 
Making Actionable Decisions at the Network's Edge
Cognizant
 
System Support for Internet of Things
HarshitParkar6677
 
11-Module-4 Opportunities and Challenges, Architectures for convergence,Data ...
RahulJain989779
 
Nathan Hiscock - Architecting secure, scalable, cost-efficient computer visio...
AWS Chicago
 
Nathan Hiscock Architecting secure, scalable, cost-efficient computer vision...
AWS Chicago
 
General introduction to IoTCrawler
IoTCrawler
 
EENA2019: Track3 session2 Enabling agility in the PSAP and the wider response...
EENA (European Emergency Number Association)
 
Cloud computing
Aamir chouhan
 
Cloud Computing in Business and facts
Arun Ganesh
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Henrique Centieiro
 
EDGE devices_ ERTOS_ IOT_ presentation_P.pptx
National Institute of Technolgy(REC) warangal
 
Secure you
Fatin Chowdhury
 

CCTV in the CLOUD

  • 1. CCTV in the Cloud By Riccardo Mazzurco (www.linkedin.com/in/mazzurco) Oxymoron or paradigm shift?
  • 3. The CLOUD: a foggy concept More of marketing buzzwords than well defined technologies People have different ideas on the meaning of these terms In videosurveillance the term CLOUD have been too often abused
  • 4. Advantages of a CLOUD based infrastructure • No need of in-house computing infrastructure • No need of skilled staff for installation, maintenance and troubleshooting • Reliability. The provider takes care of: – Redundancy – Contuinuity of operations – Backups – Disaster recovery
  • 5. Costs scalability of a CLOUD based architecture • No initial investment • Predictable costs • Pay only what you use/need • Grow or shrink computing power, storage and bandwidth on demand
  • 8. Ever growing number number of cameras Human surveillance is not affordable or feasible
  • 9. A real waste of resources Interesting events are just a tiny part of the recorded video
  • 10. HD CCTV = BIG DATA • Data generated by video surveillance has grown to practically unmanageable amounts
  • 11. Real life case: July 2005 London bombings The recordings were examined for weeks by human operators trying to find a clue in the thousands and thousands hours of footage. Weeks of recordings of hundredths diverse CCTV systems where collected from diverse sources: city center control, shops, banks, etc.
  • 12. CCTV and the CLOUD
  • 13. Common misconceptions CLOUD is not just remote storage or accessing applications via web browser
  • 14. Why cloud storage of video is not viable? Sheer size of produced data Costs of storage and transfer Limited available bandwidth
  • 15. Moving mountains around... … extremely rare, just like a speck of gold lost in tons of rock Miners don’t move mountains of rock around! They bring mining equipment close to where gold ore is dug Meaningful images are…
  • 17. Dealing with Big Data • Cannot rely on significantly more efficient image compression algorithms • Must rely on edge-side storage of high quality HD video • Must use video content analysis (VCA) to filter important footage out (thumbnails or short clips) • Describe meaningful events by means of effectively searchable metadata
  • 18. Extracting interesting information on site Understand locally and communicate only if needed Smart cameras can filter out significant events to reduce the quantity of data streamed to the data center even with limited bandwidth
  • 19. Blob Motion Tracking Tracking & Trajectory Smoke detection Fire detection Face detection Crowd detection Number Plate Recognition Lost and Found Detection Traffic Controls Origin, Blind, Darkness Alarm Panic Detection Available features: The Smart Products What can be done today
  • 20. Accurate image analysis: now possible since it is made on RAW images coming from the sensor Smart Products Internal Architecture Local high resolution storage and external streaming with adaptive bandwidth. Broadband connection not required Bidirectional communication layer, encrypted and automatic. Secure and reliable Internet connectivity Virtualized data centre software with Private or Public Cloud deployment. The control room is everywhere an Internet connection is available
  • 21. Similar problem: the search for Higgs boson CERN - LHC accelerator • Bunches of protons and antiprotons crossing 40 million times per second generate about 20 collisions per crossing totaling about 1 billion collisions per second • The frequency of producing a Higgs boson is extremely rare: once in 1013 = 10 000 000 000 000 interactions or one every 3 hours ATLAS experiment • ~100 million electronic channels • If all data would be recorded, this would fill 100 000 CDs per second, a stack which could reach to the moon and back twice each year. • Online data filtering is then a must • Level 1 trigger filters down to about 75 000 events per second. • Level 2 trigger reduces it to about 2 000 events per second. • The Event Filter then selects for permanent storage about 200 “interesting” events per second.
  • 22. The correct approach • Normalize and correlate information from heterogeneous sources to extract meaningful and actionable results • Merge information from widely distributed different providers and organizations
  • 23. Architectural requirements • Distributed uncompromised information • Hierarchical online filtering • Centralized database indexing with simple and efficient search methods for multiple distributed tenants • Extraction of readily actionable information • Possibility to instruct the devices on the field to execute online and offline queries based on requests issued by tenants in the cloud
  • 24. Database indexing in the cloud • Thumbnails – vehicles, license plates, persons, faces, etc. • Metadata – Number plates, face recognition, etc. • Classification and profiling – Person • Age, Gender, Etnicity, Height • Mood, Facial expressions – Vehicle • Car, Bike, Motorcycle, Bus, Van, RV, Truck • Manufacturer, Model
  • 25. Actionable feedback generation • Correlation – Timestamping (synchronized) – Georeferentiation (Indoor, Outdoor) – Identification • RF, NFC, BLE, wifi, cellular, loyalty card • Voice and Biometrics – Third party databases • Publicly accessible data • Crowdsurced data • Data accessible only by Governmental Entities
  • 26. How to get there • The investments and the time needed to achieve the described scenario are certainly very large • It is important, then, to devise effective ways to normalize, merge and analyze data coming from existing systems preserving most of the prior investments
  • 27. Thanks for your attention Any questions?

Editor's Notes

  • #2: How can some information be secure if it is available in the cloud
  • #4: Probably, the CLOUD, today, is more of a marketing buzzword than a well defined technological concept Asking ten different people what the cloud is, you are likely to get ten or, maybe, eleven different answers In the field of electronic security the term has been often abused gaining an inappropriate meaning or, worse, a negative misconception
  • #9: It is not affordable/practical to monitor a large number of cameras both for costs of involved resources and for human inability to cope with prolonged attention. According to research, the average professional operator attention drops to only 40% after only 30 minutes. In case of multiple sites spread in the territory local monitoring is too costly and centralized monitoring becomes a must.
  • #10: In a security system the interesting events worth being looked at or saved are, on average, in the order of minutes per week of a few cameras
  • #11: All the new HD video surveillance cameras installed worldwide in 2013 have produced 413 Petabytes (1 PB = 1000 TB) worth of data and are expected to produce more than double in just four years, expanding to 859 PB in 2017
  • #12: http://www.channel4.com/news/london-bombings-cctv-captures-bombers-before-attack http://www.officialconfusion.com/77/investigation/policestatements/180705metinvest.html http://www.boston.com/news/nation/washington/articles/2007/08/12/us_doles_out_millions_for_street_cameras/?page=full
  • #14: The belief that the CLOUD is just something related to remote storage is widespread in the security market It probably comes from the most common use of the cloud for storing large files, e.g.: File storage/sharing = CLOUD = DropBox
  • #15: Centralized storage is in most cases unpractical and often impossible because of the sheer size of produced data and limitations in available bandwidth The mentioned amount is enough to fill 92.1 million single-sided, single-layer DVDs or it’s four times the amount of photo and video data stored on Facebook as of February 2012. Transferring and storing large amounts of video to the cloud or to a remote data center is economically unsustainable
  • #18: The surveillance business is adopting several technologies designed to accommodate and mitigate the rising tide of data. New data compression algorithms. For example, the High Efficiency Video Coding (HEVC) standard—also known as H.265—has been claimed to double the data compression ratio when compared to H.264. Video content analysis (VCA) can be used to filter important events out rather than simply recording continuously. Nevertheless recording of HD images will only be feasible locally moving at a central location only important images and metadata produced by VCA and biometrics
  • #23: Only the capacity to normalize security data coming from heterogeneous sources and to correlate the gathered information to be compared against known patterns will allow to extract meaningful results which could be actionable in a timely manner It should ideally be possible in widely distributed systems to merge information coming from different providers and organizations