A Study on Secure Contents Using in Intelligent Urban Computing
نویسندگان
چکیده
Ubiquitous computing only allows services of fixed or local area and it just provides services without status information of the device upon user request. Thus, it is difficult to react immediately with users changes. Since urban computing is on higher system instead of ubiquitous, it can usually provide users the organic behavior with reference from devices physical states information. Also, it provides the services by considering the user’s devices and environments near user’s location. That means the generated context during movement can be detected by sensor. Through this information the system guesses the user’s next move and the number of context increases upon user’s movement. Therefore, there are so many users / devices to attack in urban computing. However, existing urban computing is insufficiency to process the security module. Therefore, we suggest the way to secure contents in urban computing.
منابع مشابه
A Study on Secure Contents Using in Urban Computing
Urban computing provides the services by considering of user’s devices and environments near user’s location. That means that it can be detected their moving by sensor the generated contexts during user moving. And they can guess the user’s next moving through these detected contexts. During user’s moving, there are getting more increase the number of contexts. And the more increase the number ...
متن کاملToward the Design of Rural Intelligent Public Transportation System Rural Public Transportation of Iran
In order to improve the level of intelligence, availability, being on demand, convenience, information and humanization of rural public transportation systems, they are more willing to use modern information and communicative technologies. In addition to management services, intelligent transportation systems can provide passengers, drivers, travel agencies and other institutions with other ser...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کامل