SlideShare une entreprise Scribd logo
1  sur  25
Ubiquitous Computing
              ……Providing computations and
              communications everywhere !!




                    April 2012
       Presenter : 09BCE035 Arpan Patel
            Guide: Dr. S.N. Pradhan
        Nirma University of Technology
Flow of Presentation:
- Issues & Challenges in Ubiquitous Computing
  (The Problem Space!)
      Research Thrusts
      Design & Implementation Problems

- Solutions for Certain Problems

- Various Other Applications

- The Future of Ubiquitous Computing

- Conclusion
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Security and trust issues in ubiquitous environments:

     • Security implies protecting corporate resources
       against threats and attacks.
     • Security goals includes:
        - Access control
        - Data confidentiality and integrity
        - Availability of services
        - Accountability of actions
     • Various solutions that are used includes:
        - Firewalls
        - Virtual private network



                                                         18
Solutions for Security and Privacy
• Sandboxing
   - executing code in a restricted and safe environment.
   - restricting access from the code to operating system
   functionality.
   - highly effective but at the expense of flexibility.

• Certification
   - Trusting the code as safe on someone else opinion.
   - Most often code being signed by a large corporation.

•   The Volume of transmitted data should be kept
    Minimum

•   Data that require transmission should be encrypted and
    sent anonymously (without reference to the owner)
                                                            19
Proof Carrying Code (PCC)
 Attaches additional data to a piece of code which can be
  interpreted as a proof of a particular property.
 Verify the proof and check whether or not it is valid.
 Requires no certification , no restrictions so it strikes effective
  balance bet security &flexibility.



                 Direct Code Analysis
 Direct analyses of executable code on client machine.
 Removes the need to depend on the external trust of
  organizations.
 Full flexibility and security.

                                                                    20
• Biometrics
It is the science of verifying and establishing the identity of an individual
through physiological features or behavioral traits.
Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns
Behavioral Biometrics: Handwriting, Signature, Speech, Gait
Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy)

• Biometrics offers a promising solution for reliable and uniform
  identification and verification of an individual. These traits are
  unique to an individual and hence cannot be misused, lost or
  stolen. Biometrics are based on established scientific principles as
  a basis for authentication.

• Advantages:
   –   Uniqueness
   –   No need to remember passwords or carry tokens
   –   Biometrics cannot be lost, stolen or forgotten
   –   Security has to be incorporated in the design stage
   –   Traditional authentication and access control paradigms cannot scale to
       numerous and ubiquitous devices                                   21
Some Possible Applications
Pervasive Computing involving Hybrid (Regular and
Sensor Network-based) Internet works for:
• Natural disaster-specific warning purposes like:
  Tsunami Warning, Forest Fire Warning, Volcanic
  Eruption Warning, Flood-warning etc
• Large-scale monitoring and tracking purposes like:
  Wildlife monitoring, Baggage / cargo monitoring,
  Intelligent Transportation Systems, Inter-planetary
  Networks, Intelligent Transportation Systems,
  Wearable and Vehicular Computing
Future of Ubiquitous Computing:
• Pervasive computing is the next generation computing
  environments with information & communication technology
  everywhere, for everyone, at all times.

• Information and communication technology will be an
  integrated part of our environments: from toys, milk cartons
  and desktops to cars, factories and whole city areas - with
  integrated processors, sensors, and actuators connected via
  high-speed networks and combined with new visualization
  devices ranging from projections directly into the eye to large
  panorama displays.

• Pervasive computing goes beyond the traditional user
  interfaces, on the one hand imploding them into small
  devices and appliances, and on the other hand exploding
  them onto large scale walls, buildings and furniture.
                                                            23
Conclusion
• Today, people's experience of computer technology is, for the most
  part, time-consuming and frustrating. Researchers are looking to
  address the increasing, sometimes overwhelming, complexity that
  comes with digital living and will explore ways to measurably
  simplify the digital experience.

• Much research has yet to be done to determine how to simplify
  technology. The challenge grows as devices become more capable
  and thus more complex. The complexity increases substantially as
  users demand that their digital devices work together seamlessly.
  Researchers are starting to leverage machine learning and new
  networking and data access techniques to address the challenge of
  making digital living less frustrating and more intuitive.




                                                                   24
References
• M. Satyanarayanan, “Pervasive Computing: Vision and
  Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml
• http://indus.wikia.com/wiki/Main_Page
• http://www.cc.gatech.edu/fce/pubs/icse99/final.html
• Mark Weiser. "The world is not a desktop". Interactions;
  January 1997; pp. 7-8.
• Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE
  Computer, October 1999.
• Mark Weiser, "Some Computer Science Problems in Ubiquitous
  Computing," Communications of the ACM, July 1997. (reprinted
  as "Ubiquitous Computing". Nikkei Electronics; December 6,
  1997; pp. 137-143.)
• Mark Weiser, "The Computer for the Twenty-First Century,"
  Scientific American, pp. 94-10, September 1991
                                                              25

Contenu connexe

Tendances

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingOMAN1991
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingabhisheksaini
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 

Tendances (20)

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 

Similaire à Ubiquitous computing presentation 2

Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasFulvio Corno
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptxjaspreetkaur908049
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 

Similaire à Ubiquitous computing presentation 2 (20)

Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Access controls
Access controlsAccess controls
Access controls
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 

Plus de Arpan Patel

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPArpan Patel
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)Arpan Patel
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Arpan Patel
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Arpan Patel
 

Plus de Arpan Patel (6)

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Codecs
CodecsCodecs
Codecs
 
Codecs
CodecsCodecs
Codecs
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Ubiquitous computing presentation 2

  • 1. Ubiquitous Computing ……Providing computations and communications everywhere !! April 2012 Presenter : 09BCE035 Arpan Patel Guide: Dr. S.N. Pradhan Nirma University of Technology
  • 2. Flow of Presentation: - Issues & Challenges in Ubiquitous Computing (The Problem Space!)  Research Thrusts  Design & Implementation Problems - Solutions for Certain Problems - Various Other Applications - The Future of Ubiquitous Computing - Conclusion
  • 3.
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. Security and trust issues in ubiquitous environments: • Security implies protecting corporate resources against threats and attacks. • Security goals includes: - Access control - Data confidentiality and integrity - Availability of services - Accountability of actions • Various solutions that are used includes: - Firewalls - Virtual private network 18
  • 19. Solutions for Security and Privacy • Sandboxing - executing code in a restricted and safe environment. - restricting access from the code to operating system functionality. - highly effective but at the expense of flexibility. • Certification - Trusting the code as safe on someone else opinion. - Most often code being signed by a large corporation. • The Volume of transmitted data should be kept Minimum • Data that require transmission should be encrypted and sent anonymously (without reference to the owner) 19
  • 20. Proof Carrying Code (PCC)  Attaches additional data to a piece of code which can be interpreted as a proof of a particular property.  Verify the proof and check whether or not it is valid.  Requires no certification , no restrictions so it strikes effective balance bet security &flexibility. Direct Code Analysis  Direct analyses of executable code on client machine.  Removes the need to depend on the external trust of organizations.  Full flexibility and security. 20
  • 21. • Biometrics It is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns Behavioral Biometrics: Handwriting, Signature, Speech, Gait Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy) • Biometrics offers a promising solution for reliable and uniform identification and verification of an individual. These traits are unique to an individual and hence cannot be misused, lost or stolen. Biometrics are based on established scientific principles as a basis for authentication. • Advantages: – Uniqueness – No need to remember passwords or carry tokens – Biometrics cannot be lost, stolen or forgotten – Security has to be incorporated in the design stage – Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices 21
  • 22. Some Possible Applications Pervasive Computing involving Hybrid (Regular and Sensor Network-based) Internet works for: • Natural disaster-specific warning purposes like: Tsunami Warning, Forest Fire Warning, Volcanic Eruption Warning, Flood-warning etc • Large-scale monitoring and tracking purposes like: Wildlife monitoring, Baggage / cargo monitoring, Intelligent Transportation Systems, Inter-planetary Networks, Intelligent Transportation Systems, Wearable and Vehicular Computing
  • 23. Future of Ubiquitous Computing: • Pervasive computing is the next generation computing environments with information & communication technology everywhere, for everyone, at all times. • Information and communication technology will be an integrated part of our environments: from toys, milk cartons and desktops to cars, factories and whole city areas - with integrated processors, sensors, and actuators connected via high-speed networks and combined with new visualization devices ranging from projections directly into the eye to large panorama displays. • Pervasive computing goes beyond the traditional user interfaces, on the one hand imploding them into small devices and appliances, and on the other hand exploding them onto large scale walls, buildings and furniture. 23
  • 24. Conclusion • Today, people's experience of computer technology is, for the most part, time-consuming and frustrating. Researchers are looking to address the increasing, sometimes overwhelming, complexity that comes with digital living and will explore ways to measurably simplify the digital experience. • Much research has yet to be done to determine how to simplify technology. The challenge grows as devices become more capable and thus more complex. The complexity increases substantially as users demand that their digital devices work together seamlessly. Researchers are starting to leverage machine learning and new networking and data access techniques to address the challenge of making digital living less frustrating and more intuitive. 24
  • 25. References • M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml • http://indus.wikia.com/wiki/Main_Page • http://www.cc.gatech.edu/fce/pubs/icse99/final.html • Mark Weiser. "The world is not a desktop". Interactions; January 1997; pp. 7-8. • Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE Computer, October 1999. • Mark Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, July 1997. (reprinted as "Ubiquitous Computing". Nikkei Electronics; December 6, 1997; pp. 137-143.) • Mark Weiser, "The Computer for the Twenty-First Century," Scientific American, pp. 94-10, September 1991 25