Ubiquitous Security: Privacy versus Protection
نویسندگان
چکیده
In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling pervasive computing systems gain a foothold presence in becoming more flexible and, at the same time, more invisibly interconnected, system users may have to trade privacy and protection to gain full entry into this new information-laden environment. This paper examines the current state-of-the-shelf security components, which predominantly overlay wired and wireless networks that will support next generation pervasive systems with a defense-in-depth approach. Information technology “best practices” are considered, and privacy concerns within typical networks are discussed. An examination of emerging privacy protecting technologies is presented, and Radio Frequency Identification (RFID) tags and legal concerns are discussed to portray the asymmetry of information flow in pervasive systems that can impact our personal information privacy.
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملAn Architecture for Security and Protection of Big Data
The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computin...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملAn Overview of Approaches to Privacy Protection in RFID
Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas, and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time,...
متن کاملA Privacy Agent in Context-Aware Ubiquitous Computing Environments
This paper targets personal privacy protection in context-aware ubiquitous computing environments. It proposes a privacy agent technology to help notify people of relevant information disclosure, and to empower them to manage privacy with relative ease. In essence, the development of the privacy agent technology employs privacy terminology and policies specified in Platform for Privacy Preferen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006