Privacy and Trust Issues in Context-Aware Pervasive Computing

Author(s):  
Pierre E. Abi-Char ◽  
Bachar El-Hassan ◽  
Mounir Mokhtari

The growing evolution of information and communication technology (ICT) systems towards more pervasive and ubiquitous infrastructures contribute significantly to the deployment of services anywhere, at anytime and for anyone. To provide personalized services in such infrastructures, we should consider both user’s privacy and security requirements and context-awareness environment. This can be really achieved owing to context awareness systems which allow us to benefit from sensing and mobile technologies to derive more accurate data about the user and his/her location. While the availability of contextual information may introduce new threats against security and privacy, it can also be used to improve dynamic, adaptive and autonomic aspects of security, and user privacy. Moreover, context-aware information offers new opportunities for the establishment of trust relationship among involved entities (e.g., users, devices, and platforms). As context awareness represents new challenges and new opportunities regarding privacy, trust and security of users in pervasive computing environments (PCE), the main purpose of this chapter aims to survey each of the involved issues to understand and address the interdependencies among them.

Author(s):  
Amina HAMEURLAINE ◽  
Samiha Brahimi

This chapter is consecrated to provide background information that encompass the basic concepts of context-aware pervasive computing systems. The major challenges that researchers need to consider when conducting research in context-aware pervasive computing systems and the most interesting approaches that can be used in order to deal with these challenges are reviewed. This chapter describes also the basic design principles of context-aware pervasive systems and depicts different models for representing and reasoning upon contextual information and an overview of the most known development frameworks of context-aware systems and application adaptation is presented too. Moreover, this chapter describes the usefulness of using context-awareness in ubiquitous healthcare domain and the major challenges in using context-awareness in this domain. The well-known works that have been proposed in the field of Ubiquitous healthcare are discussed too.


Author(s):  
Prajit Kumar Das ◽  
Dibyajyoti Ghosh ◽  
Pramod Jagtap ◽  
Anupam Joshi ◽  
Tim Finin

Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling dynamic context sharing on mobile platforms have led to the emergence of a new class of mobile applications that can access and share embedded sensor and context data. Most of the time such data is used for providing tailored services to the user but it can lead to serious breaches of privacy. We use Semantic Web technologies to create a rich notion of context. We also discuss challenges for context aware mobile platforms and present approaches to manage data flow on these devices using semantically rich fine-grained context-based policies that allow users to define their privacy and security need using tools we provide.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


2012 ◽  
pp. 1141-1166
Author(s):  
Milan Petkovic ◽  
Luan Ibraimi

The introduction of e-Health and extramural applications in the personal healthcare domain has raised serious concerns about security and privacy of health data. Novel digital technologies require other security approaches in addition to the traditional “purely physical” approach. Furthermore, privacy is becoming an increasing concern in domains that deal with sensitive information such as healthcare, which cannot absorb the costs of security abuses in the system. Once sensitive information about an individual’s health is uncovered and social damage is done, there is no way to revoke the information or to restitute the individual. Therefore, in addition to legal means, it is very important to provide and enforce privacy and security in healthcare by technological means. In this chapter, the authors analyze privacy and security requirements in healthcare, explain their importance and review both classical and novel security technologies that could fulfill these requirements.


2011 ◽  
pp. 1040-1050
Author(s):  
James M. Laffey ◽  
Christopher J. Amelung

Context-aware activity notification systems have potential to improve and support the social experience of online learning. The authors of this chapter have developed a Context-aware Activity Notification System (CANS) that monitors online learning activities and represents relevant contextual information by providing notification and making the learning activity salient to other participants. The chapter describes previous efforts to develop and support online learning context awareness systems; it also defines the critical components and features of such a system. It is argued that notification systems can provide methods for using the context of activity to support members’ understanding of the meaning of activity. When designed and implemented effectively, CANS can turn course management systems (CMS) into technologies of social interaction to support the social requirements of learning.


Author(s):  
M. Fahim Ferdous Khan ◽  
Ken Sakamura

Context-awareness is a quintessential feature of ubiquitous computing. Contextual information not only facilitates improved applications, but can also become significant security parameters – which in turn can potentially ensure service delivery not to anyone anytime anywhere, but to the right person at the right time and place. Specially, in determining access control to resources, contextual information can play an important role. Access control models, as studied in traditional computing security, however, have no notion of context-awareness; and the recent works in the nascent field of context-aware access control predominantly focus on spatio-temporal contexts, disregarding a host of other pertinent contexts. In this paper, with a view to exploring the relationship of access control and context-awareness in ubiquitous computing, the authors propose a comprehensive context-aware access control model for ubiquitous healthcare services. They explain the design, implementation and evaluation of the proposed model in detail. They chose healthcare as a representative application domain because healthcare systems pose an array of non-trivial context-sensitive access control requirements, many of which are directly or indirectly applicable to other context-aware ubiquitous computing applications.


Author(s):  
Bessam Abdulrazak ◽  
Patrice Roy ◽  
Charles Gouin-Vallerand ◽  
Yacine Belala ◽  
Sylvain Giroux

Context-aware software provides adapted services to users or other software components. On the other hand, Autonomic Pervasive Computing uses context to reduce the complexity of pervasive system utilization, management and maintenance. This paper describes two context-awareness models, the macro and micro approaches, that define and integrate contextual views of individual pervasive components (micro level) and global knowledge of the system (macro level), and provides a more detailed overview of a micro Context-aware programming model for open smart space problems. These models are presented and compared with respect to their ability to meet the requirements of the Autonomic Pervasive Computing concept of the four selves.


Author(s):  
Abdullahi Arabo ◽  
Qi Shi ◽  
Madjid Merabti

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. In this article, the authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.


2009 ◽  
pp. 56-64
Author(s):  
Jun Sun ◽  
Marshall Scott Poole

Advances in wireless network and multimedia technologies enable mobile commerce (m-commerce) information service providers to know the location and surroundings of mobile consumers through GPS-enabled and camera-embedded cell phones. Context awareness has great potential for creating new service modes and improving service quality in m-commerce. To develop and implement successful context-aware applications in m-commerce, it is critical to understand the concept of the “context” of mobile consumers and how to access and utilize contextual information in an appropriate way. This article dissects the context construct along both the behavioral and physical dimensions from the perspective of mobile consumers, developing a classification scheme for various types of consumer contexts. Based on this classification scheme, it discusses three types of context-aware applications—noninteractive mode, interactive mode and community mode—and describes newly proposed applications as examples of each.


Author(s):  
Jun Sun ◽  
Marshall Scott Poole

Advances in wireless network and multimedia technologies enable mobile commerce (m-commerce) information service providers to know the location and surroundings of mobile consumers through GPS-enabled and camera-embedded cell phones. Context awareness has great potential for creating new service modes and improving service quality in m-commerce. To develop and implement successful context-aware applications in m-commerce, it is critical to understand the concept of the “context” of mobile consumers and how to access and utilize contextual information in an appropriate way. This article dissects the context construct along both the behavioral and physical dimensions from the perspective of mobile consumers, developing a classification scheme for various types of consumer contexts. Based on this classification scheme, it discusses three types of context-aware applications—non-interactive mode, interactive mode and community mode—and describes newly proposed applications as examples of each.


Sign in / Sign up

Export Citation Format

Share Document