SlideShare a Scribd company logo
1 of 16
PRESENTED BY:
HATUM HUSSAIN Mirjat
 Pervasive computing (also called ubiquitous
computing) is the growing trend towards
embedding microprocessors in everyday
objects so they can communicate information.
The words pervasive and ubiquitous mean
"existing everywhere." Pervasive
computing devices are completely connected
and constantly available
 At their core, all models of ubiquitous computing share a vision of small, inexpensive,
robust networked processing devices, distributed at all scales throughout everyday life
and generally turned to distinctly common-place ends. For example, a domestic
ubiquitous computing environment might interconnect lighting and environmental
controls with personal biometric monitors woven into clothing so that illumination and
heating conditions in a room might be modulated, continuously and imperceptibly.
Another common scenario posits refrigerators "aware" of their suitably tagged contents,
able to both plan a variety of menus from the food actually on hand, and warn users of
stale or spoiled food.
 Ubiquitous computing presents challenges across computer science: in systems design
and engineering, in systems modeling, and in user interface design. Contemporary
human-computer interaction models
 three basic forms for ubiquitous system devices (see also smart device): tabs, pads and
boards.
 Tabs: wearable centimeter sized devices
 Pads: hand-held decimeter-sized devices
 Boards: meter sized interactive display devices.
 Manage information quickly, efficiently and
effortlessly
 Smart Environments will be embedded with
computing technologies that will be mostly out-of-
sight
 Removes complexity of new technologies
 Convenient access to revlevant information stored
on networks, allowing them to easily take action
anywhere, anytime.
 Environment will be supplemented with
interconned digital technologies. Interconnectivity
will eliminate mundane tasks
 Pervasive Computing is not entirely secure.
 Frequent line connections that are broken.
 Slow connections.
 Very expensive operating costs.
 Privacy is already a concern with the WWW
 Much more dramatic in ubiquitous computing
environment
 Unlimited coverage (sensors everywhere)
 Loss of awareness ( invisible computing)
 New type of data (location, health, habits,….)
 More Knowledge though context
 Anonymity hard to achieve
 Difficulty in explicit notice or consent by user
 Privacy is greatly complicated by ubiquitous
computing.
 Mechanisms such as location tracking, smart spaces,
and use of anathor monitor user actions on an
almost continuous basis.
 As a user becomes more dependent on a ubiquitous
computing system, the system becomes more
knowledgeable about that user’s movements,
behavior patterns and habits.
 Marc Langhenrich, “Privacy by Design:
principles of Privacy-Aware Ubiquitous
Systems,’’ in the proceding of Ubicomp 2001.
 Notice
 Adequate Security
 Access and Resourse
 The subject Whose information is collected
must be notified.
 Environment where it is often difficult for data
subjects to realize that data collection is
actually taking place
 Necessary to have not only mechanisms to
declare collection practices(i.e, privacy
politics),but also efficient ways to communiate
these to the user (i.e, ploicy announcement).
 Needs to provide a way for users to access their
personal information in a simple way through
standardized interfaces(i.e., data access).
 Users should be informed about the usage of
their data once it is stored, similar to call-lists
that are often part of monthly phone bills (i.e,
usage logs).
 It is not necessary to increase the security level
to an extent when it is not worth the intrusion.
 We need to employ robust security features
only in situation with highly sensitive data
transfer
 Financial transaction
 Transfer of medical informaton
 Privacy is possible in ubiquitous
computing environment
 Let people know about collections
 Let people query, update, delete their own data
 Let people know about each usage
 Solutions need not be perfect to be useful
 Trusting fair information practices
 Trusting collectors to keep their promises
 Trusting the legal system
 Removal of wires in the networks computing
available to every where
 Information can be accessed when and where it
is needed
 But still privacy and security major drawbacks
of the ubiquitous computing.
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy

More Related Content

What's hot

HCI 3e - Ch 11: User support
HCI 3e - Ch 11:  User supportHCI 3e - Ch 11:  User support
HCI 3e - Ch 11: User supportAlan Dix
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
HCI - Case Study - Digital Fridge
HCI - Case Study - Digital FridgeHCI - Case Study - Digital Fridge
HCI - Case Study - Digital FridgeFurrukh Ali Baig
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interactionAlan Dix
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoTJitendra Tomar
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6Alan Dix
 
HCI 3e - Ch 15: Task analysis
HCI 3e - Ch 15:  Task analysisHCI 3e - Ch 15:  Task analysis
HCI 3e - Ch 15: Task analysisAlan Dix
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paperJayanth Vinay
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: ParadigmsAlan Dix
 
Marketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolutionMarketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolutionSherif El Touny
 
Design rules Human computer interaction.ppt
Design rules Human computer interaction.pptDesign rules Human computer interaction.ppt
Design rules Human computer interaction.pptSohail735908
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation supportAlan Dix
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...VijiPriya Jeyamani
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCIsawsan slii
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software processAlan Dix
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsDevanand Hariperumal
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition MethodHafsa Tahir
 

What's hot (20)

Understanding IoT
Understanding IoTUnderstanding IoT
Understanding IoT
 
HCI 3e - Ch 11: User support
HCI 3e - Ch 11:  User supportHCI 3e - Ch 11:  User support
HCI 3e - Ch 11: User support
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
HCI - Case Study - Digital Fridge
HCI - Case Study - Digital FridgeHCI - Case Study - Digital Fridge
HCI - Case Study - Digital Fridge
 
HCI 3e - Ch 3: The interaction
HCI 3e - Ch 3:  The interactionHCI 3e - Ch 3:  The interaction
HCI 3e - Ch 3: The interaction
 
IoT
IoTIoT
IoT
 
1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT1. Internet of Things - M2M to IoT
1. Internet of Things - M2M to IoT
 
HCI - Chapter 6
HCI - Chapter 6HCI - Chapter 6
HCI - Chapter 6
 
HCI 3e - Ch 15: Task analysis
HCI 3e - Ch 15:  Task analysisHCI 3e - Ch 15:  Task analysis
HCI 3e - Ch 15: Task analysis
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
HCI 3e - Ch 4: Paradigms
HCI 3e - Ch 4:  ParadigmsHCI 3e - Ch 4:  Paradigms
HCI 3e - Ch 4: Paradigms
 
Marketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolutionMarketing reimagined within the fourth industrial revolution
Marketing reimagined within the fourth industrial revolution
 
Design rules Human computer interaction.ppt
Design rules Human computer interaction.pptDesign rules Human computer interaction.ppt
Design rules Human computer interaction.ppt
 
HCI 3e - Ch 8: Implementation support
HCI 3e - Ch 8:  Implementation supportHCI 3e - Ch 8:  Implementation support
HCI 3e - Ch 8: Implementation support
 
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...Human Computer Interaction Chapter 3 HCI in the Software Process and  Design ...
Human Computer Interaction Chapter 3 HCI in the Software Process and Design ...
 
Evaluation techniques in HCI
Evaluation techniques in HCIEvaluation techniques in HCI
Evaluation techniques in HCI
 
HCI 3e - Ch 6: HCI in the software process
HCI 3e - Ch 6:  HCI in the software processHCI 3e - Ch 6:  HCI in the software process
HCI 3e - Ch 6: HCI in the software process
 
Internet of things (IOT) | Future Trends
Internet of things (IOT) | Future TrendsInternet of things (IOT) | Future Trends
Internet of things (IOT) | Future Trends
 
Vein Recognition Method
Vein Recognition MethodVein Recognition Method
Vein Recognition Method
 

Similar to Ubiquitous computing-and-its-privacy

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingHoneyson Joseph
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 

Similar to Ubiquitous computing-and-its-privacy (20)

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
O017328693
O017328693O017328693
O017328693
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

Ubiquitous computing-and-its-privacy

  • 2.  Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available
  • 3.  At their core, all models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life and generally turned to distinctly common-place ends. For example, a domestic ubiquitous computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly. Another common scenario posits refrigerators "aware" of their suitably tagged contents, able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food.  Ubiquitous computing presents challenges across computer science: in systems design and engineering, in systems modeling, and in user interface design. Contemporary human-computer interaction models  three basic forms for ubiquitous system devices (see also smart device): tabs, pads and boards.  Tabs: wearable centimeter sized devices  Pads: hand-held decimeter-sized devices  Boards: meter sized interactive display devices.
  • 4.
  • 5.  Manage information quickly, efficiently and effortlessly  Smart Environments will be embedded with computing technologies that will be mostly out-of- sight  Removes complexity of new technologies  Convenient access to revlevant information stored on networks, allowing them to easily take action anywhere, anytime.  Environment will be supplemented with interconned digital technologies. Interconnectivity will eliminate mundane tasks
  • 6.  Pervasive Computing is not entirely secure.  Frequent line connections that are broken.  Slow connections.  Very expensive operating costs.
  • 7.  Privacy is already a concern with the WWW  Much more dramatic in ubiquitous computing environment  Unlimited coverage (sensors everywhere)  Loss of awareness ( invisible computing)  New type of data (location, health, habits,….)  More Knowledge though context  Anonymity hard to achieve  Difficulty in explicit notice or consent by user
  • 8.  Privacy is greatly complicated by ubiquitous computing.  Mechanisms such as location tracking, smart spaces, and use of anathor monitor user actions on an almost continuous basis.  As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.
  • 9.  Marc Langhenrich, “Privacy by Design: principles of Privacy-Aware Ubiquitous Systems,’’ in the proceding of Ubicomp 2001.  Notice  Adequate Security  Access and Resourse
  • 10.  The subject Whose information is collected must be notified.  Environment where it is often difficult for data subjects to realize that data collection is actually taking place  Necessary to have not only mechanisms to declare collection practices(i.e, privacy politics),but also efficient ways to communiate these to the user (i.e, ploicy announcement).
  • 11.  Needs to provide a way for users to access their personal information in a simple way through standardized interfaces(i.e., data access).  Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e, usage logs).
  • 12.  It is not necessary to increase the security level to an extent when it is not worth the intrusion.  We need to employ robust security features only in situation with highly sensitive data transfer  Financial transaction  Transfer of medical informaton
  • 13.  Privacy is possible in ubiquitous computing environment  Let people know about collections  Let people query, update, delete their own data  Let people know about each usage  Solutions need not be perfect to be useful  Trusting fair information practices  Trusting collectors to keep their promises  Trusting the legal system
  • 14.  Removal of wires in the networks computing available to every where  Information can be accessed when and where it is needed  But still privacy and security major drawbacks of the ubiquitous computing.