39,171 research outputs found

    Intentions: a confident-based interaction design for smart spaces

    Get PDF
    The paradigm of ubiquitous computing has become a reference for the design of Smart Spaces. Current trends in Ambient Intelligence are increasingly related to the scope of Internet of Things. This paradigm has the potential to support cost-effective solutions in the fields of telecare, e-health and Ambient Assisted Living. Nevertheless, ubiquitous computing does not provide end users with a role for proactive interactions with the environment. Thus, the deployment of smart health care services at a private space like the home is still unsolved. This PhD dissertation aims to define a person-environment interaction model to foster acceptability and users confidence in private spaces by applying the concept of user-centred security and the human performance model of seven stages of action

    Data Security and Access Control Mechanisms in Cloud: A Review

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. This paper addresses study of privacy preservation issues and also provides an idea to how to overcome the issues. Also it provides a brief survey on various Robust Access Privilege Control mechanism used for providing privacy in cloud storage

    Multi-Authority Access Control Mechanisms in Cloud: A Review

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. This paper addresses study of privacy preservation issues and also provides an idea to how to overcome the issues. Also it provides a brief survey on various Robust Access Privilege Control mechanism used for providing privacy in cloud storage

    Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems

    Get PDF
    AbstractThe term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a long way ahead to become a pervasive reality. One of the reasons for this may be the lack of widely accepted formal models capable of capturing and analyzing the complexity of the new paradigm. We propose a simple Petri Net based model to study some of its main characteristics. We model both devices and software components as a special kind of coloured Petri Nets, located in locations, that can move to other locations and synchronize with other co-located nets, offering and requesting services. We obtain an amenable model for ubiquitous computing, due to its graphical representation. We present our proposal in a progressive way, first presenting a basic model where coordination is formalized by the synchronized firing of pairs of compatible transitions that offer and request a specific service, and ad hoc networks are modeled by constraining mobility by the dynamic acquisition of locality names. Next, we introduce a mechanism for the treatment of robust security properties, namely the generation of fresh private names, to be used for authentication properties

    Security Enhancement in Cloud System by Anonymous Request Access

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. There is the issue of legitimate responsibility for information (If a client stores some information in the cloud, can the cloud supplier benefit from it?). Numerous Terms of Service assentions are quiet on the topic of proprietorship. Physical control of the PC hardware (private cloud) is more secure than having the gear off site and under another person's control (open cloud). This conveys awesome motivation to open distributed computing administration suppliers to organize building and keeping up solid administration of secure administration. This paper addresses design of proposed system

    Agent oriented AmI engineering

    Get PDF

    The Mundane Computer: Non-Technical Design Challenges Facing Ubiquitous Computing and Ambient Intelligence

    Full text link
    Interdisciplinary collaboration, to include those who are not natural scientists, engineers and computer scientists, is inherent in the idea of ubiquitous computing, as formulated by Mark Weiser in the late 1980s and early 1990s. However, ubiquitous computing has remained largely a computer science and engineering concept, and its non-technical side remains relatively underdeveloped. The aim of the article is, first, to clarify the kind of interdisciplinary collaboration envisaged by Weiser. Second, the difficulties of understanding the everyday and weaving ubiquitous technologies into the fabric of everyday life until they are indistinguishable from it, as conceived by Weiser, are explored. The contributions of Anne Galloway, Paul Dourish and Philip Agre to creating an understanding of everyday life relevant to the development of ubiquitous computing are discussed, focusing on the notions of performative practice, embodied interaction and contextualisation. Third, it is argued that with the shift to the notion of ambient intelligence, the larger scale socio-economic and socio-political dimensions of context become more explicit, in contrast to the focus on the smaller scale anthropological study of social (mainly workplace) practices inherent in the concept of ubiquitous computing. This can be seen in the adoption of the concept of ambient intelligence within the European Union and in the focus on rebalancing (personal) privacy protection and (state) security in the wake of 11 September 2001. Fourth, the importance of adopting a futures-oriented approach to discussing the issues arising from the notions of ubiquitous computing and ambient intelligence is stressed, while the difficulty of trying to achieve societal foresight is acknowledged

    Context Aware Computing for The Internet of Things: A Survey

    Get PDF
    As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.Comment: IEEE Communications Surveys & Tutorials Journal, 201
    • …
    corecore