Trustworthy Data Sharing in Collaborative Pervasive Computing Environments

2006 ◽  
pp. 265-281 ◽  
Author(s):  
Stephen S. Yau

Collaborative Pervasive Computing Applications (COPCAs) can greatly improve the investigative capabilities and productivity of scientists and engineers. Users of COPCAs usually form groups to collaboratively perform their tasks using various computing devices, including desktop computers, pocket PCs, and/or smart phones, over Mobile Ad hoc Networks (MANET), LAN, and the Internet. These users usually share various types of data, including research ideas (documents), experimental and statistical data (numerical data, graphics, stream audio/video). A very important issue for sharing data in Collaborative Pervasive Computing Environments (COPCEs) is trustworthiness. To support trustworthy data sharing among groups of users of COPCAs, secure group communication, trustworthyshared data discovery, flexible access control mechanisms, effective data replication, data quality assurance mechanisms, and intrusion detection mechanisms are needed. In this chapter, the challenges, current state-of-the-art, and future research directions for trustworthy data sharing in COPCEs are presented. In particular, discussions will be focused on research issues and future research directions for trustworthy shared data discovery and flexible access control in service-based COPCAs.

2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2011 ◽  
pp. 192-205
Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


Author(s):  
Helena Halas ◽  
Tomaž Klobucar

This chapter explores the influence of pervasive computing on companies and their businesses, with the main stress on business models. The role of business models for companies is presented. Introduction to pervasive computing and a survey of existing e-business models classifications are used as a base for our research. The main characteristics of today’s business models are discussed and a method for evaluating business models characteristics is proposed. We concentrate on characteristics of pervasive computing and their influence on companies’ business processes and business models. The present and future business characteristics and business models are briefly compared, and future research directions on pervasive computing and business models are presented.


Author(s):  
Varun G. Menon

Opportunistic routing uses the broadcasting nature of the wireless medium to increase the number of potential forwarding nodes in the network. This, in turn improves the delivery rate and reliability of data transmission in the network. Compared to all previous classes of protocols, opportunistic routing offers numerous advantages which is exploited by the latest applications for efficient communication and resource sharing in dynamic ad hoc networks. The objective of this research work is to review and classify all the major opportunistic routing protocols proposed for dynamic ad hoc networks. Further the issues and challenges with each of these existing protocol is discussed and future research directions are put forward.


Sign in / Sign up

Export Citation Format

Share Document