Pervasive Computing Applications and Security – A Deep Insight

S. Magesh, Sujatha Jamuna Anand, Niveditha V.R, Y. Pavan Kumar Reddy, P. Rajakumar
{"title":"Pervasive Computing Applications and Security – A Deep Insight","authors":"S. Magesh, Sujatha Jamuna Anand, Niveditha V.R, Y. Pavan Kumar Reddy, P. Rajakumar","doi":"10.3233/apc210193","DOIUrl":null,"url":null,"abstract":"Pervasive computing has made life easy with communication devices. Today devise collaboration has enhanced everywhere in this environment. It has made computing devices invisible and the services. This pervasive framework provides applications with interactions, numerous cooperation and accessibility, and integration. The proposed work enumerates the applications, pervasive security challenges. It provides security predicaments by assigning certificate credentials, access controls, trust management, and some security techniques to overcome the security paradigms in these distributed networks with IoT and the pervasive computing framework. The work also encounters security perplexities in handling the security threats and user interaction issues. Nevertheless, security techniques are listed for various pervasive applications in distinct domains such as healthcare, industries, and transforming sensitive information. The smart applications with smart environments perhaps force towards the new technologies in the pervasive computing outlook. The work also embedded with middleware with the context-based situation in these pervasive applications","PeriodicalId":429440,"journal":{"name":"Recent Trends in Intensive Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Recent Trends in Intensive Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/apc210193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Pervasive computing has made life easy with communication devices. Today devise collaboration has enhanced everywhere in this environment. It has made computing devices invisible and the services. This pervasive framework provides applications with interactions, numerous cooperation and accessibility, and integration. The proposed work enumerates the applications, pervasive security challenges. It provides security predicaments by assigning certificate credentials, access controls, trust management, and some security techniques to overcome the security paradigms in these distributed networks with IoT and the pervasive computing framework. The work also encounters security perplexities in handling the security threats and user interaction issues. Nevertheless, security techniques are listed for various pervasive applications in distinct domains such as healthcare, industries, and transforming sensitive information. The smart applications with smart environments perhaps force towards the new technologies in the pervasive computing outlook. The work also embedded with middleware with the context-based situation in these pervasive applications
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
普适计算应用与安全——深入洞察
普适计算使通信设备的生活变得轻松。今天,在这种环境中,设计协作无处不在。它使计算设备和服务变得不可见。这个普及框架为应用程序提供了交互、大量协作和可访问性以及集成。建议的工作列举了应用程序、普遍的安全挑战。它通过分配证书凭据、访问控制、信任管理和一些安全技术来克服这些具有物联网和普摄计算框架的分布式网络中的安全范式,从而提供了安全困境。在处理安全威胁和用户交互问题时,也遇到了安全难题。不过,本文列出了针对不同领域(如医疗保健、工业和转换敏感信息)中的各种普及应用程序的安全技术。具有智能环境的智能应用程序可能会推动普适计算前景中的新技术。在这些普及的应用程序中,还嵌入了基于上下文的中间件
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Enhancing Agricultural Product Supply Chain Management Using Blockchain Technology: Concept An Image Encryption Technique Based on Logistic Sine Map and an Encrypted Image Retrieval Using DCT Frequency Study on SDN with Security Issues Using Mininet Smart Ambulance System with Remote Knowledge Communications Through Cloud Diabetes Risk Forecasting Using Logistic Regression
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1