Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

Pervasive computing devices are configured for anywhere at any time services to adapt the changes in the dynamic environment with respect to the user mobility. The paper proposes a salient model for a log based anonymity handling in pervasive networks. The model defines a resource registry and sensor object modeling. Associability between the nodes are configured with an allied user interface in the environment. Resource registry refers to a record of information about the sensor nodes. A log book is maintained to keep track of the service discovery issues. New device enquiry, registration and adaption are major issues in such pervasive devices. These issues lead to unacknowledged communication that causes anonymity. This paper defines and discusses the presence of anonymity in pervasive environments due to aforementioned issues.

Keywords :

:Pervasive Computing; Service Discovery; Anonymity; Middleware.

References :

[1] Vesa Kautto (2001), “Middleware for Pervasive Computing ” HUT, Telecommunications Software and Multimedia Laboratory.
[2] Christian Becker, Gregor Schiele, Holger Gubbels, and Kurt Rothermel “BASE -A Micro broker- Based Middleware for Pervasive Computing University of Stuttgart Institute of Parallel and Distributed Systems (IPVS), Breitwiesenstr. 20-22, 70565 Stuttgart, Germany
[3] Roberto Speicys Cardoso, Pierre-Guillaume Raverdy, and Valeŕie Issarny, “A Privacy-Aware Service Discovery Middleware for Pervasive Environments, Inria Rocquencourt 78153 Le Chesnay, France.
[4] Cardoso R.S., Raverdy, P.-G and Issarny, V., 2007, in IFIP International federation for Information Processing, Volume 238, Trust Management, eds, Etalle, S., Marsh S.,(Boston:Springer) pp 59-74
[5] Stelios Dritsas, Dimitris Gritzalis a, Costas Lambrinoudakis “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Volume 23 Issue 3, August 2006. pp 196-210
[6] Stephen S. Yau, Fariaz Karim, YuWang, Bin Wang, and Sandeep K.S. Gupta (July 2002), “Reconfigurable Context Sensitive Middleware for Pervasive Computing”, Arizona State Arizona State Volume 1 Issue 3, pp 33-40 .
[7] Seth Holloway, Drew Stovall, Jorge Lara-Garduno, and Christine Julien, “Opening Pervasive Computing to the Masses Using the SEAP Middleware ” Mobile and Pervasive Computing Group , The University of Texas at Austin , March 2009.
[8] R. Jason Weiss, and J. Philip Craiger (2002), “Ubiquitous Computing ”, University of Nebraska–Omaha, Volume 39, Number 4, pp. 44 - 52.
[9] Wassim Masri, Zoubir Mammeri (September 2007), "Middleware for Wireless Sensor Networks: A  Comparative Analysis," IFIP International Conference on Network and Parallel Computing Workshops. Pp 349-356
[10] Stephen S.Yau et al., (September 2002) Reconfigurable Context Sensitive Middleware for Pervasive Computing“, IEEE Pervasive Computing,. pp 33-40
[11] Tinghuai Ma et al., (2011) “Privacy Preserving in Ubiquitous Computing: Classification and Hierarchy”, COMSIS Journal, Vol 8, No. 4,. pp 1185-1206.
[12] Miyuki Imada, Masakatsu Ohta, Masayasu Yamaguchi, Sun Yong Kim, (2008) "LooM: An anonymity quantification method in pervasive computing environments", International Journal of Pervasive Computing and Communications, Vol. 4 Iss: 1, pp.110 – 123
[13] Chi Lin; Guowei Wu; Lin Yao; Zuosong Liu, "A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive Environments," Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on , vol., no., pp.943,948, 25-27 June 2012 doi: 10.1109/TrustCom.2012.19
[14] Trcek, D.; Brodnik, A., "Hard and soft security provisioning for computationally weak pervasive computing systems in E-health," Wireless Communications, IEEE , vol.20, no.4, pp.22,29, August 2013.doi: 10.1109/MWC.2013.6590047
[15] G.Radhamani, K.Vanitha and D.Rajeswari. “Classification and Handling of Anonymity in Pervasive Middleware”. International Journal of Computer Applications , Vol. 17, No.6, pp. 28-31, March 2011. Published by Foundation of Computer Science.

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.