Upgrade 2023: Scaling the future
March 16, 2023 // Upgrade 2023
Using Attribute-Based Encryption (ABE) to Protect Privacy in Surveillance Camera Images
Jean-Philippe Cabay, Senior Associate Data Scientist, NTT Belgium; Pascal Mathis, TS Implementation Engineer (L3)/Tech Lead, NTT Belgium
Summary
Practical Applications for Using Attribute-Based Encryption (ABE) to Protect Privacy
Attribute-based encryption dates to research published by NTT Research CIS Lab Director Brent Waters in 2005. Today, it’s close to coming to fruition in practical products, including a novel video privacy use case presented at the recent NTT Research Upgrade 2023 event.
Pascal Mathis, TS Implementation Engineer (L3), and Jean-Philippe Cabay, Senior Associate Data Scientist, both with NTT Belgium, were the winners of an ABE hackathon sponsored by NTT Research. Their work focused on using ABE to provide differing levels of access to a video to provide advanced privacy protection.
The idea stemmed from an incident at a metro station in Belgium when a man pushed someone onto the tracks. “Video footage from a surveillance camera leaked onto the internet with the faces of everybody there, completely visible,” Cabay said. “This story made us think about who really has access to those cameras.” He noted a Metro employee leaked the footage.
With ABE, different components of a file – or, as Mathis and Cabay showed, an image or video – can be encrypted according to varying policies. In practice, that means one person may be authorized to see all the components, another some subset, and a third a different subset.
In the example the pair demonstrated at Upgrade 2023, they showed a video they shot only a short time earlier of Cabay walking down a nearby San Francisco street. Some cars, license plates, people, and so on are clearly visible.
They demonstrated how different components could be blurred, making them unrecognizable. By assigning policies to each component, they could authorize different people to be able to decrypt certain components to make them accessible.
For example, perhaps a certain level of police officer would be authorized to see faces, while a different level could see license plates, and so on. For the sake of the demo, they used a simple drop-down menu to demonstrate the various levels of authentication. In practice, each person wishing to view the video would need to provide authentication at the appropriate level for whatever content they wanted to view.
Given the level of sophistication behind the cryptographic functions at play, it was impressive how quickly the authentications happened in the demo – and the fact that they clearly put the video together in just a short time prior to the conference.
Cabay also noted the video encryption technology could have applications beyond security footage. In the medical field, the technology could be used to control who has access to which components of CT and MRI scans, which contain myriad sensitive patient data, including name, age, medical condition and so on. Similarly, artificial intelligence technology could be used to scan anomalies in a series of CT scans, without compromising patient privacy.
In the financial sector, banks could use ABE to protect sensitive information in various scanned documents, such as social security and account numbers.
Beyond the theoretical, he said NTT Belgium is at work on several actual client projects that incorporate ABE technology. One involves monitoring the flow of people in a hospital without compromising anyone’s privacy, while another is a surveillance application to protect a manufacturing plant. A third is a project in Brussels involving the use of smart cameras while remaining in compliance with the EU General Data Protection Regulation (GDPR) on data protection and privacy.
Jean-Philippe Cabay is a Senior Associate Data Scientist at NTT based in Belgium. He is a certified predictive modeler (SAS Enterprise Miner 14), and with his expertise in computer vision he has acheived several First Place commendations at various sponsored hackathons. He holds a Master of Science degree in Data Sciences and Engineering from the University of Liège, Belgium.
Pascal Mathis received his PhD in computer science from Strasbourg University in France. As an associate professor for 15 years at ICube laboratory in Strasbourg, his research focused on artificial intelligence techniques for geometric modeling. He then worked in companies on numerous R&D projects such as real-time systems for the automotive industry and fraud detection in the telecom industry. He joined NNT in 2021 where he is involved in projects of the Client Innovation Center.

Kei Karasawa
NTT Research Vice President of Strategy
Kei Karasawa has been leading research and development (R&D) at NTT for more than 20 years. He is currently the vice president of strategy at NTT Research, Inc. From 2015–2019, he worked with the R&D planning department at NTT and built cooperative relationships with NTT operating companies around the world to deploy NTT R&D technology to global markets. He led applied R&D at NTT EAST from 2011–2015 and put the technology into practice in developing network services. Prior to that, he researched network software technologies, implemented patented software, such as security and distributed systems, and developed commercial services for the Next Generation Network. In 2005, he conducted basic research on cryptography and information processing as a visiting scholar, with Prof. Dan Boneh, in the Security Laboratory at Stanford University. He holds a doctorate of engineering in data-driven parallel computer technology and has extensive knowledge and experience in information processing-related technologies, from basic technology to applications. Personal interests include sports, like tennis and golf, and travelling with his wife and kids.
MORE videos from NTT's upgrade summit, september 2021
- Vipul Goyal: Towards Accountability in CRS Generation
- Dan Boneh: Using Cryptography to Meet Requirements for Use of Aggregate Data While Protecting Privacy
- Amit Sahai: The Mathematics Behind Program Obfuscation
- Justin Holmgren: Public-Coin Time and Space-Efficient Arguments
- Yuichiro Kamada: Dynamic User Competition in the Bitcoin Market
- Stefano Tessaro: The t-wise Independence of Substitution Permutation Networks
- Sanjam Garg: What is the Exact Security of the Signal Protocol?
- Nadia Heninger: Breaking the Lattice Barrier for the Hidden Number Problem