93,282 research outputs found

    Pervasive Computing and Communication Technologies for U-learning

    Get PDF
    The development of digital information transfer, storage and communication methods influnces a significant effect on education. The assimilation of pervasive computing and communication technologies marks another great step forward, with Ubiquitous Learning (U-learning) emerging for next generation learners. In the evolutionary view the 5G (or beyond 4G) wireless mobile systems will be capable of supporting wwww allowing a highly flexible network and  will be able to solve the data traffic and wireless spectrum problems for  U- learning in the near future

    Enhancing Security in Cloud Computing

    Get PDF
    Cloud computing is emerging field because of its performance, high availability, least cost and many others. In cloud computing, the data will be stored in storage provided by service providers. But still many business companies are not willing to adopt cloud computing technology due to lack of proper security control policy and weakness in safeguard which lead to many vulnerability in cloud computing. This paper has been written to focus on the problem of data security. Service providers must have a viable way to protect their clients' data, especially to prevent the data from disclosure by unauthorized insiders. To ensure the security of users' data in the cloud, we propose an effective and flexible scheme with two salient features, opposing to its predecessors. Avoiding unauthorized access to user's data by signaling user by sending message to his/her mobile number at the start of transaction. Displaying fake information in case of unsuccessful login for avoiding further login trials by intrusion (Honeypot). Keywords: Cloud Computing, Authentication, Honeypo

    Wifi AP Based Secure Data Sharing Among Smartphones And Computer System

    Get PDF
    Smartphones operate independently of each other, using only local computing, sensing, networking, and storage capabilities and functions provided by remote Internet services. It is generally difficult or expensive for one smartphone to share data and computing resources with another. Coordinating smartphone data and computing would allow mobile applications to utilize the capabilities of an entire smartphone cloud while avoiding global network bottlenecks. In many cases, processing mobile data in-place and transferring it directly between smartphones would be more efficient and less susceptible to network limitations than offloading data and processing to remote servers. The main objective of this paper is to introduce a methodology to provide flexible media content sharing by exploiting collaborative amongst WiFi devices via the temporarily-established links over the local server which is based on heterogeneous mobile which is having different mobile platform, users connected to the server like computer System via Wi-Fi. The realized prototype devices altogether show improved sharing performance by supporting two-times more concurrent devices at target media quality when compared with conventional non-collaborative. In this the client and local server will upload or retrieve the data in authenticated and in confidential manner. The proposed method is based on sending/receiving data between client server via Wi-Fi connection without the need of taking any service from mobile service provider and without the use of internet connection. DOI: 10.17762/ijritcc2321-8169.160411

    Attribute Based Secured and Efficient Cloud Storage Middleware for Mobile Cloud Computing using PDP

    Get PDF
    Today handheld devices are playing more vital roles in the people�s daily lives with the fast development of wireless technology. All these devices use Internet for fetching & accessing services. Many current applications are being deployed on Cloud to save hardware & software cost. Mobile cloud has become remarkable cloud service model; in which, mobile devices are used as the information collecting and processing nodes for the cloud infrastructure. Cloud has become the pervasive digital platform for many network applications in their quest to provide a single unified digital platform. In this paper, we present insignificant Cloud-based storage framework. This framework will provide an easy-to-use file navigation service for attribute-based fill querying. Simultaneously, it incorporates an effective structure for users to verify their data integrity, which can relieve much load from mobile devices. Experimental simulations show that the proposed framework is effective to provide flexible data sharing in mobile computing environments

    Context-sensitive mobile database summarisation

    Get PDF
    In mobile computing environments, as a result of the reduced capacity of local storage, it is commonly not feasible to replicate entire datasets on each mobile unit. In addition, reliable, secure and economical access to central servers is not always possible. Moreover, since mobile computers are designed to be portable, they are also physically small and thus often unable to hold or process the large amounts of data held in centralised databases. As many systems are only as useful as the data they can process, the support provided by database and system management middleware for applications in mobile environments is an important driver for the uptake of this technology by application providers and thus also for the wider use of the technology. One of the approaches to maximize the available storage is through the use of database summarisation. To date, most strategies for reducing data volumes have used compression techniques that ignore the semantics of the data. Those that do not use data compression techniques adopt structural (i.e. data and use-independent) methods. In this paper, we outline the special constraints imposed on storing information in mobile databases and provide a flexible data summarisation policy. The method works by assigning a level of priority to each data item through the setting of a number of parameters. The paper discusses some policies for setting these parameters and some implementation strategies.Bedford Park, South Australi

    Designing an architecture for secure sharing of personal health records : a case of developing countries

    Get PDF
    Includes bibliographical references.While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite the usual problems of poor infrastructure, PHR systems designed for the developing world need to conform to users with different models of security and literacy than those designed for developed world. This study investigated a PHR system distributed across mobile devices with a security model and an interface that supports the usage and concerns of low literacy users in developing countries. The main question addressed in this study is: “Can personal health records be stored securely and usefully on mobile phones?” In this study, mobile phones were integrated into the PHR architecture that we/I designed because the literature reveals that the majority of the population in developing countries possess mobile phones. Additionally, mobile phones are very flexible and cost efficient devices that offer adequate storage and computing capabilities to users for typically communication operations. However, it is also worth noting that, mobile phones generally do not provide sufficient security mechanisms to protect the user data from unauthorized access

    Cloud-assisted body area networks: state-of-the-art and future challenges

    Get PDF
    Body area networks (BANs) are emerging as enabling technology for many human-centered application domains such as health-care, sport, fitness, wellness, ergonomics, emergency, safety, security, and sociality. A BAN, which basically consists of wireless wearable sensor nodes usually coordinated by a static or mobile device, is mainly exploited to monitor single assisted livings. Data generated by a BAN can be processed in real-time by the BAN coordinator and/or transmitted to a server-side for online/offline processing and long-term storing. A network of BANs worn by a community of people produces large amount of contextual data that require a scalable and efficient approach for elaboration and storage. Cloud computing can provide a flexible storage and processing infrastructure to perform both online and offline analysis of body sensor data streams. In this paper, we motivate the introduction of Cloud-assisted BANs along with the main challenges that need to be addressed for their development and management. The current state-of-the-art is overviewed and framed according to the main requirements for effective Cloud-assisted BAN architectures. Finally, relevant open research issues in terms of efficiency, scalability, security, interoperability, prototyping, dynamic deployment and management, are discussed

    The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services

    Get PDF
    As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols. In addition to that, users are authenticated and charged by different means. The lack of implicit human computer interaction, context-awareness and standardisation places an enormous burden of complexity on the shoulders of the final users. The IST-Simplicity project aims at leveraging such problems by: i) automatically creating and customizing a user communication space; ii) adapting services to user terminal characteristics and to users preferences; iii) orchestrating network capabilities. The aim of this paper is to present the technical framework of the IST-Simplicity project. This paper is a thorough analysis and qualitative evaluation of the different technologies, standards and works presented in the literature related to the Simplicity system to be developed
    • …
    corecore