A Study on Secure Contents Using in Intelligent Urban Computing

نویسندگان

  • Hoon Ko
  • Jongmyung Choi
  • Maricel O. Balitanas
  • Tai-hoon Kim
  • Carlos Ramos
چکیده

Ubiquitous computing only allows services of fixed or local area and it just provides services without status information of the device upon user request. Thus, it is difficult to react immediately with users changes. Since urban computing is on higher system instead of ubiquitous, it can usually provide users the organic behavior with reference from devices physical states information. Also, it provides the services by considering the user’s devices and environments near user’s location. That means the generated context during movement can be detected by sensor. Through this information the system guesses the user’s next move and the number of context increases upon user’s movement. Therefore, there are so many users / devices to attack in urban computing. However, existing urban computing is insufficiency to process the security module. Therefore, we suggest the way to secure contents in urban computing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Study on Secure Contents Using in Urban Computing

Urban computing provides the services by considering of user’s devices and environments near user’s location. That means that it can be detected their moving by sensor the generated contexts during user moving. And they can guess the user’s next moving through these detected contexts. During user’s moving, there are getting more increase the number of contexts. And the more increase the number ...

متن کامل

Toward the Design of Rural Intelligent Public Transportation System Rural Public Transportation of Iran

In order to improve the level of intelligence, availability, being on demand, convenience, information and humanization of rural public transportation systems, they are more willing to use modern information and communicative technologies. In addition to management services, intelligent transportation systems can provide passengers, drivers, travel agencies and other institutions with other ser...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010