75 research outputs found
"Cooperative Museum using Push Technology via Bluetooth"
This paper comprises of five parts. Those parts are the Introduction, Literature Review,
Methodology, Results and Discussion and lastly the Conclusion and Future Work. In
the introduction chapter of the research, there is a background of study regarding the
location based system. Along with the background of study, it is included with the
problem statement of the projectwhich comprises of the identification of the problems
involved and as well as the significant of the project. Not only that, the objectives of the
study made are also included where the objectives and scope of study are discussed.
There are also discussions about the relevancy of the project and the feasibility of the
project withinthe scope and time frame of the project. As for the second chapter of this
paper which is the Literature Review, there are a few supporting information included
to describe the topics under the research for this project. Those topics are regarding
Location Based Systems, Bluetooth technology, Context-Aware computing, and push
concept. Proceeding to the third chapter of the paper, there is a review on the
methodology that has been used to plan, analyze, design and implement this whole
project and tools are used in order to develop this project. Next up is the Results and
Discussion section where discussions will be made on the issues stated in the
Methodology section. In the Results and Discussion chapter, there are results taken
from the questionnaires taken from the analysis phase and also the results from the
design and implementation phase that are taken from the Methodology chapter. As for
the last chapter of this report, the Conclusion and Future Work discussed the overall
conclusion and also future work or future enhancements that are intended to do for this
project
"Cooperative Museum using Push Technology via Bluetooth"
This paper comprises of five parts. Those parts are the Introduction, Literature Review,
Methodology, Results and Discussion and lastly the Conclusion and Future Work. In
the introduction chapter of the research, there is a background of study regarding the
location based system. Along with the background of study, it is included with the
problem statement of the projectwhich comprises of the identification of the problems
involved and as well as the significant of the project. Not only that, the objectives of the
study made are also included where the objectives and scope of study are discussed.
There are also discussions about the relevancy of the project and the feasibility of the
project withinthe scope and time frame of the project. As for the second chapter of this
paper which is the Literature Review, there are a few supporting information included
to describe the topics under the research for this project. Those topics are regarding
Location Based Systems, Bluetooth technology, Context-Aware computing, and push
concept. Proceeding to the third chapter of the paper, there is a review on the
methodology that has been used to plan, analyze, design and implement this whole
project and tools are used in order to develop this project. Next up is the Results and
Discussion section where discussions will be made on the issues stated in the
Methodology section. In the Results and Discussion chapter, there are results taken
from the questionnaires taken from the analysis phase and also the results from the
design and implementation phase that are taken from the Methodology chapter. As for
the last chapter of this report, the Conclusion and Future Work discussed the overall
conclusion and also future work or future enhancements that are intended to do for this
project
Discovering location based services: A unified approach for heterogeneous indoor localization systems
The technological solutions and communication capabilities offered by the Internet of
Things paradigm, in terms of raising availability of wearable devices, the ubiquitous internet connection, and the presence on the market of service-oriented solutions, have allowed
a wide proposal of Location Based Services (LBS). In a close future, we foresee that companies and service providers will have developed reliable solutions to address indoor positioning, as basis for useful location based services. These solutions will be different from
each other and they will adopt different hardware and processing techniques. This paper
describes the proposal of a unified approach for Indoor Localization Systems that enables
the cooperation between heterogeneous solutions and their functional modules. To this
end, we designed an integrated architecture that, abstracting its main components, allows
a seamless interaction among them. Finally, we present a working prototype of such architecture, which is based on the popular Telegram application for Android, as an integration
demonstrator. The integration of the three main phases –namely the discovery phase, the
User Agent self-configuration, and the indoor map retrieval/rendering– demonstrates the
feasibility of the proposed integrated architectur
Recommended from our members
Preserving Privacy in Mobile Environments
Technology is improving day-by-day and so is the usage of mobile devices. Every activity that would involve manual and paper transactions can now be completed in seconds using your ngertips. On one hand, life has become fairly convenient with the help of mobile devices, whereas on the other hand privacy of the data and the transactions occurring in the process have been under continuous threat. Mobile devices connect to a number of service providers for various reasons. These could include downloading data, online purchasing or could be just used to browse information which may be irrelevant at a later point. Access to critical and sensitive information may be available at a number of places. In case of a mobile device, the information may be available with the service provider. Service Provider could be in the form of any web portal. In all such scenarios, passing the information or data from the service provider into the mobile device is a major challenge, as the data/information cannot be sent in plain text format. The con dentiality and integrity of the data needs to be protected and hence, the service provider must convert the data into an encrypted format before passing it onto the mobile device, to prevent risks from sniffing and unauthorized disclosure of data. Preserving the location of the individual user of any mobile device has also been the concern for a number of researchers.
Mobile devices have become an important tool in modern communication. Mobile and other handheld devices such as ipads and tablets have over taken laptops and desktops and hence there has been an increasing research interest in this area in recent years. This includes improving the quality of communication and the overall end-to-end data security in day-to-day transactions. Mobile devices continuously connect to di erent service providers for day-to-day needs such as online purchases, online banking and endless sur ng for information. In addition to this devices could be connecting to the service providers to receive or send sensitive information. At the Service Provider end, the data would be stored with the provider and Service Provider would only hand over the data if it con rms that the person requested it is authorized to receive the information. The exchange of data from one end of the network to the other is a major challenge due to malicious intruder mishandling of the data. Hence the con dentiality and integrity of the data needs to be protected either by transforming the sensitive information into a non-readable format or by converting into a cipher text.
Privacy has been an open problem for research as more and more information is getting leaked on a day-to-day basis. Through this thesis, I have tried to address a number of areas within the privacy realm where information and data access and sharing is a key concern along side the key aspect of location privacy. I have also tried to address the problems in the space of access control wherein I have proposed policy based languages and extensions for ensuring appropriate access control methodologies. The main goal and focus in this work has been to enforce the importance of location privacy in mobile environments and to propose solutions that resolve the problems of where and when to enforce location security. Another key goal of this work has been to create new access control and trust based solutions to ensure the right level of access to the right receiver of information. Through my research, I have explored the various privacy related attacks and suggested appropriate countermeasures for the same. In addition to proposing and showcasing solutions using policy languages for access control, I have also introduced geospatial access control solutions to ensure that the right user is accessing or requesting for the right information from the right location. This helps the appropriate and the right use of the information by the right resource. Through my thesis I have also given equal importance to the trust aspects of sharing information. I have created new trust assessment models to show how fused information can be handled and how can trust be imposed on the information provider and the information itself.
The main contribution of this thesis is to address the problems around protecting the data and individual's privacy and to propose solutions to mitigate these issues using new and novel techniques. They can be detailed as the following:
In privacy, there is always a privacy versus utility tradeo and in order to make use of utility, trust in the location is essential. Through this research I have developed i) novel attestation models and access control methodologies including Privacy Preferences Platform (P3P) extensions, ii) Extensible Access Control Markup Language (XACML) extensions and iii) Geospatial access control through GeoXACML. iv)I have created new methodologies to enforce location privacy and shown where best to enforce privacy. v)I have also shown that global attestation is very crucial for privacy and needs accurate methods in place to attest user's location information for access. vi) Fusing of location information is very crucial as there could be a number of similar or con icting information produced about a common source and it is very important to assess and evaluate the trust level in the information. I have proposed, developed and implemented a new trust assessment framework. This framework looks at the incoming information and passes it on to the rule engine in the framework to make some inferences and then the trust assessment module computes the trust score based on forward chaining or background chaining scheme. The framework is used to evaluate the trust on the fused information in a streaming setup. vii) I have created new solutions to look at the similarity pro les and create identity enforcement through pro ling. I have shown methods of anonymisation for location privacy and identity privacy
A manifesto for future generation cloud computing: research directions for the next decade
The Cloud computing paradigm has revolutionised the computer science horizon during the past decade and has enabled the emergence of computing as the fifth utility. It has captured significant attention of academia, industries, and government bodies. Now, it has emerged as the backbone of modern economy by offering subscription-based services anytime, anywhere following a pay-as-you-go model. This has instigated (1) shorter establishment times for start-ups, (2) creation of scalable global enterprise applications, (3) better cost-to-value associativity for scientific and high performance computing applications, and (4) different invocation/execution models for pervasive and ubiquitous applications. The recent technological developments and paradigms such as serverless computing, software-defined networking, Internet of Things, and processing at network edge are creating new opportunities for Cloud computing. However, they are also posing several new challenges and creating the need for new approaches and research strategies, as well as the re-evaluation of the models that were developed to address issues such as scalability, elasticity, reliability, security, sustainability, and application models. The proposed manifesto addresses them by identifying the major open challenges in Cloud computing, emerging trends, and impact areas. It then offers research directions for the next decade, thus helping in the realisation of Future Generation Cloud Computing
Internet of Things Applications - From Research and Innovation to Market Deployment
The book aims to provide a broad overview of various topics of Internet of Things from the research, innovation and development priorities to enabling technologies, nanoelectronics, cyber physical systems, architecture, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from technology to international cooperation and the global "state of play".The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level. Internet of Things is creating a revolutionary new paradigm, with opportunities in every industry from Health Care, Pharmaceuticals, Food and Beverage, Agriculture, Computer, Electronics Telecommunications, Automotive, Aeronautics, Transportation Energy and Retail to apply the massive potential of the IoT to achieving real-world solutions. The beneficiaries will include as well semiconductor companies, device and product companies, infrastructure software companies, application software companies, consulting companies, telecommunication and cloud service providers. IoT will create new revenues annually for these stakeholders, and potentially create substantial market share shakeups due to increased technology competition. The IoT will fuel technology innovation by creating the means for machines to communicate many different types of information with one another while contributing in the increased value of information created by the number of interconnections among things and the transformation of the processed information into knowledge shared into the Internet of Everything. The success of IoT depends strongly on enabling technology development, market acceptance and standardization, which provides interoperability, compatibility, reliability, and effective operations on a global scale. The connected devices are part of ecosystems connecting people, processes, data, and things which are communicating in the cloud using the increased storage and computing power and pushing for standardization of communication and metadata. In this context security, privacy, safety, trust have to be address by the product manufacturers through the life cycle of their products from design to the support processes. The IoT developments address the whole IoT spectrum - from devices at the edge to cloud and datacentres on the backend and everything in between, through ecosystems are created by industry, research and application stakeholders that enable real-world use cases to accelerate the Internet of Things and establish open interoperability standards and common architectures for IoT solutions. Enabling technologies such as nanoelectronics, sensors/actuators, cyber-physical systems, intelligent device management, smart gateways, telematics, smart network infrastructure, cloud computing and software technologies will create new products, new services, new interfaces by creating smart environments and smart spaces with applications ranging from Smart Cities, smart transport, buildings, energy, grid, to smart health and life. Technical topics discussed in the book include: • Introduction• Internet of Things Strategic Research and Innovation Agenda• Internet of Things in the industrial context: Time for deployment.• Integration of heterogeneous smart objects, applications and services• Evolution from device to semantic and business interoperability• Software define and virtualization of network resources• Innovation through interoperability and standardisation when everything is connected anytime at anyplace• Dynamic context-aware scalable and trust-based IoT Security, Privacy framework• Federated Cloud service management and the Internet of Things• Internet of Things Application
Privacy Protection and Mobility Enhancement in Internet
Indiana University-Purdue University Indianapolis (IUPUI)The Internet has substantially embraced mobility since last decade. Cellular data network carries majority of Internet mobile access traffic and become the de facto solution of accessing Internet in mobile fashion, while many clean-slate Internet mobility solutions were proposed but none of them has been largely deployed. Internet mobile users increasingly concern more about their privacy as both researches and real-world incidents show leaking of communication and location privacy could lead to serious consequences. Just the communication itself between mobile user and their peer users or websites could leak considerable privacy of mobile user, such as location history, to other parties.
Additionally, comparing to ordinary Internet access, connecting through cellular network yet provides equivalent connection stability or longevity.
In this research we proposed a novelty paradigm that leverages concurrent far-side proxies to maximize network location privacy protection and minimize interruption and performance penalty brought by mobility.To avoid the deployment feasibility hurdle we also investigated the root causes impeding popularity of existing Internet mobility proposals and proposed guidelines on how to create an economical feasible solution for this goal.
Based on these findings we designed a mobility support system offered as a value-added service by mobility service providers and built on elastic infrastructure that leverages various cloud aided designs, to satisfy economic feasibility and explore the architectural trade-offs among service QoS, economic viability, security and privacy
- …