Balancing transparency, efficiency and security in pervasive systems
نویسندگان
چکیده
This chapter will survey pervasive computing with a look at how its constraint for transparency affects issues of resource management and security. The goal of pervasive computing is to render computing transparent, such that computing resources are ubiquitously offered to the user and services are proactively performed for a user without his or her intervention. The task of integrating computing infrastructure into everyday life without making it excessively invasive brings about tradeoffs between flexibility and robustness, efficiency and effectiveness, as well as autonomy and reliability. While not the primary goal of pervasive computing, efficiency in resource management should be considered in order to best utilize a limited set of resources (bandwidth, computing, etc.) as to avoid congestion and avoid creating a visible and distracting bottleneck in the eyes of the user. As solutions to efficiently manage the resources in a pervasive computing environment, three techniques will be examined: the distributed caching and sharing of data between mobile hosts, the broadcasting of services by public service providers, and the ability for mobile hosts to adaptively adjust the quality of offered services. Likewise, security is often an afterthought in many computing projects, though it should be of high consideration in a pervasive environment where users share public resources to operate on private data. Specifically, how can a user be authenticated in this environment with minimal or no user intervention? Solutions such as single sign-on via smartcards and biometrics will be examined to carry out authentication in a pervasive environment. As the feasibility of ubiquitous computing and its real potential for mass applications are still a matter of controversy, this chapter will look into the underlying issues of resource management and authentication to discover how these can be handled in a least invasive fashion. The discussion will be closed by an overview of the solutions proposed by current pervasive computing efforts, both in the area of generic platforms and for dedicated applications such as pervasive education and healthcare.
منابع مشابه
Security, confidentiality, and privacy of information in the field of health with data EPR embedding in medical MRI images based on HVS model
the development of new technology and modern equipment has led to the development of telemedicine systems. As a result, there are dangers such as publishing patient information and intentionally or unintentionally, medical information. The forensic organization, as one of the powerful arms of the judiciary, pursues important cases in the medical and psychiatric commissions to take steps to rea...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملXExt3: The Design and Implementation of a Security Enhanced Ext3 File System
In this paper we develop an extended Ext3(XExt3) which means security enhanced file system. It can be used in generic Linux systems or trusted operating systems (TOS) as a file system. The XExt3 file system can protect data of a computer system from physical theft by encrypting them. We concentrate on balancing security, transparency and portability while minimizing computational overheads. For...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملPathology of electronic health record from the sociological perspective (qualitative research among health experts in 1398)
Technological progress and changes have affected the field of medicine and health. Also, the electronic health record is used for convenience of treatment, prevention and diagnosis, but it has advantages and disadvantages that we have studied them in this research. Method: Qualitative research methods and Grounded theory were used for the sociological study of electronic health record, and in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Advances in Computers
دوره 73 شماره
صفحات -
تاریخ انتشار 2008