Security challenges and requirements in ubiquitous computing

S. Tiwari, R. P. Sarang
{"title":"Security challenges and requirements in ubiquitous computing","authors":"S. Tiwari, R. P. Sarang","doi":"10.26671/ijirg.2023.2.12.101","DOIUrl":null,"url":null,"abstract":"Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work","PeriodicalId":118199,"journal":{"name":"International Journal of Innovative Research and Growth","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Innovative Research and Growth","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.26671/ijirg.2023.2.12.101","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. While the focus of current research is on how to connect new devices and build useful applications to improve functionality, the security and privacy issues in such environments have not been explored in any depth. While traditional distributed computing research attempts to abstract away physical location of users and resources, pervasive computing applications often exploit physical location and other context information about users and resources to enhance the user experience. The need to share resources and collaborate introduces new types of interaction among users as well as between the virtual and physical worlds. In this context, it becomes difficult to separate physical security from digital security. Existing policies and mechanisms may not provide adequate guarantees to deal with new exposures and vulnerabilities introduced by the pervasive computing paradigm. In this paper we explore the challenges for building security and privacy into pervasive computing environments, describe our prototype implementation that addresses some of these issues, and propose some directions for future work
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
普适计算中的安全挑战和需求
普适计算环境及其相互连接的设备和服务承诺将数字基础设施无缝集成到我们的日常生活中。虽然目前的研究重点是如何连接新设备和构建有用的应用程序来改进功能,但这种环境中的安全和隐私问题尚未得到深入探讨。传统的分布式计算研究试图抽象出用户和资源的物理位置,而普及计算应用程序通常利用物理位置和其他关于用户和资源的上下文信息来增强用户体验。共享资源和协作的需求在用户之间以及虚拟世界和物理世界之间引入了新的交互类型。在这种情况下,很难将物理安全和数字安全分开。现有的策略和机制可能无法提供足够的保证来处理普适计算范式引入的新暴露和漏洞。在本文中,我们探讨了在普适计算环境中构建安全和隐私的挑战,描述了解决其中一些问题的原型实现,并提出了未来工作的一些方向
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assessment of Micronutrient Deficiencies and their Impact on Maternal Health in Secunderabad Analyzing Global Terrorism Database for Identification of Terrorist Group Geomagnetic Storms in Relation to Magnetic Clouds, Hard X-Ray Solar Flares, and Disturbances in Interplanetary Magnetic Fields During 1996-2008 The generalized K-function and its recurrence relations Fractional calculus and generalized K-function
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1