SlideShare a Scribd company logo
1 of 25
Ubiquitous Computing
              ……Providing computations and
              communications everywhere !!




                    April 2012
       Presenter : 09BCE035 Arpan Patel
            Guide: Dr. S.N. Pradhan
        Nirma University of Technology
Flow of Presentation:
- Issues & Challenges in Ubiquitous Computing
  (The Problem Space!)
      Research Thrusts
      Design & Implementation Problems

- Solutions for Certain Problems

- Various Other Applications

- The Future of Ubiquitous Computing

- Conclusion
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Security and trust issues in ubiquitous environments:

     • Security implies protecting corporate resources
       against threats and attacks.
     • Security goals includes:
        - Access control
        - Data confidentiality and integrity
        - Availability of services
        - Accountability of actions
     • Various solutions that are used includes:
        - Firewalls
        - Virtual private network



                                                         18
Solutions for Security and Privacy
• Sandboxing
   - executing code in a restricted and safe environment.
   - restricting access from the code to operating system
   functionality.
   - highly effective but at the expense of flexibility.

• Certification
   - Trusting the code as safe on someone else opinion.
   - Most often code being signed by a large corporation.

•   The Volume of transmitted data should be kept
    Minimum

•   Data that require transmission should be encrypted and
    sent anonymously (without reference to the owner)
                                                            19
Proof Carrying Code (PCC)
 Attaches additional data to a piece of code which can be
  interpreted as a proof of a particular property.
 Verify the proof and check whether or not it is valid.
 Requires no certification , no restrictions so it strikes effective
  balance bet security &flexibility.



                 Direct Code Analysis
 Direct analyses of executable code on client machine.
 Removes the need to depend on the external trust of
  organizations.
 Full flexibility and security.

                                                                    20
• Biometrics
It is the science of verifying and establishing the identity of an individual
through physiological features or behavioral traits.
Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns
Behavioral Biometrics: Handwriting, Signature, Speech, Gait
Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy)

• Biometrics offers a promising solution for reliable and uniform
  identification and verification of an individual. These traits are
  unique to an individual and hence cannot be misused, lost or
  stolen. Biometrics are based on established scientific principles as
  a basis for authentication.

• Advantages:
   –   Uniqueness
   –   No need to remember passwords or carry tokens
   –   Biometrics cannot be lost, stolen or forgotten
   –   Security has to be incorporated in the design stage
   –   Traditional authentication and access control paradigms cannot scale to
       numerous and ubiquitous devices                                   21
Some Possible Applications
Pervasive Computing involving Hybrid (Regular and
Sensor Network-based) Internet works for:
• Natural disaster-specific warning purposes like:
  Tsunami Warning, Forest Fire Warning, Volcanic
  Eruption Warning, Flood-warning etc
• Large-scale monitoring and tracking purposes like:
  Wildlife monitoring, Baggage / cargo monitoring,
  Intelligent Transportation Systems, Inter-planetary
  Networks, Intelligent Transportation Systems,
  Wearable and Vehicular Computing
Future of Ubiquitous Computing:
• Pervasive computing is the next generation computing
  environments with information & communication technology
  everywhere, for everyone, at all times.

• Information and communication technology will be an
  integrated part of our environments: from toys, milk cartons
  and desktops to cars, factories and whole city areas - with
  integrated processors, sensors, and actuators connected via
  high-speed networks and combined with new visualization
  devices ranging from projections directly into the eye to large
  panorama displays.

• Pervasive computing goes beyond the traditional user
  interfaces, on the one hand imploding them into small
  devices and appliances, and on the other hand exploding
  them onto large scale walls, buildings and furniture.
                                                            23
Conclusion
• Today, people's experience of computer technology is, for the most
  part, time-consuming and frustrating. Researchers are looking to
  address the increasing, sometimes overwhelming, complexity that
  comes with digital living and will explore ways to measurably
  simplify the digital experience.

• Much research has yet to be done to determine how to simplify
  technology. The challenge grows as devices become more capable
  and thus more complex. The complexity increases substantially as
  users demand that their digital devices work together seamlessly.
  Researchers are starting to leverage machine learning and new
  networking and data access techniques to address the challenge of
  making digital living less frustrating and more intuitive.




                                                                   24
References
• M. Satyanarayanan, “Pervasive Computing: Vision and
  Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml
• http://indus.wikia.com/wiki/Main_Page
• http://www.cc.gatech.edu/fce/pubs/icse99/final.html
• Mark Weiser. "The world is not a desktop". Interactions;
  January 1997; pp. 7-8.
• Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE
  Computer, October 1999.
• Mark Weiser, "Some Computer Science Problems in Ubiquitous
  Computing," Communications of the ACM, July 1997. (reprinted
  as "Ubiquitous Computing". Nikkei Electronics; December 6,
  1997; pp. 137-143.)
• Mark Weiser, "The Computer for the Twenty-First Century,"
  Scientific American, pp. 94-10, September 1991
                                                              25

More Related Content

What's hot

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingOMAN1991
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingabhisheksaini
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 

What's hot (20)

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 

Similar to Ubiquitous computing presentation 2

Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceRui M. Barreira
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar PresentationCertrec
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxS .Ali Raza
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasFulvio Corno
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptxjaspreetkaur908049
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptxchWaqasZahid
 

Similar to Ubiquitous computing presentation 2 (20)

Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Access controls
Access controlsAccess controls
Access controls
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 

More from Arpan Patel

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPArpan Patel
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)Arpan Patel
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Arpan Patel
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Arpan Patel
 

More from Arpan Patel (6)

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Codecs
CodecsCodecs
Codecs
 
Codecs
CodecsCodecs
Codecs
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Ubiquitous computing presentation 2

  • 1. Ubiquitous Computing ……Providing computations and communications everywhere !! April 2012 Presenter : 09BCE035 Arpan Patel Guide: Dr. S.N. Pradhan Nirma University of Technology
  • 2. Flow of Presentation: - Issues & Challenges in Ubiquitous Computing (The Problem Space!)  Research Thrusts  Design & Implementation Problems - Solutions for Certain Problems - Various Other Applications - The Future of Ubiquitous Computing - Conclusion
  • 3.
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. Security and trust issues in ubiquitous environments: • Security implies protecting corporate resources against threats and attacks. • Security goals includes: - Access control - Data confidentiality and integrity - Availability of services - Accountability of actions • Various solutions that are used includes: - Firewalls - Virtual private network 18
  • 19. Solutions for Security and Privacy • Sandboxing - executing code in a restricted and safe environment. - restricting access from the code to operating system functionality. - highly effective but at the expense of flexibility. • Certification - Trusting the code as safe on someone else opinion. - Most often code being signed by a large corporation. • The Volume of transmitted data should be kept Minimum • Data that require transmission should be encrypted and sent anonymously (without reference to the owner) 19
  • 20. Proof Carrying Code (PCC)  Attaches additional data to a piece of code which can be interpreted as a proof of a particular property.  Verify the proof and check whether or not it is valid.  Requires no certification , no restrictions so it strikes effective balance bet security &flexibility. Direct Code Analysis  Direct analyses of executable code on client machine.  Removes the need to depend on the external trust of organizations.  Full flexibility and security. 20
  • 21. • Biometrics It is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns Behavioral Biometrics: Handwriting, Signature, Speech, Gait Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy) • Biometrics offers a promising solution for reliable and uniform identification and verification of an individual. These traits are unique to an individual and hence cannot be misused, lost or stolen. Biometrics are based on established scientific principles as a basis for authentication. • Advantages: – Uniqueness – No need to remember passwords or carry tokens – Biometrics cannot be lost, stolen or forgotten – Security has to be incorporated in the design stage – Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices 21
  • 22. Some Possible Applications Pervasive Computing involving Hybrid (Regular and Sensor Network-based) Internet works for: • Natural disaster-specific warning purposes like: Tsunami Warning, Forest Fire Warning, Volcanic Eruption Warning, Flood-warning etc • Large-scale monitoring and tracking purposes like: Wildlife monitoring, Baggage / cargo monitoring, Intelligent Transportation Systems, Inter-planetary Networks, Intelligent Transportation Systems, Wearable and Vehicular Computing
  • 23. Future of Ubiquitous Computing: • Pervasive computing is the next generation computing environments with information & communication technology everywhere, for everyone, at all times. • Information and communication technology will be an integrated part of our environments: from toys, milk cartons and desktops to cars, factories and whole city areas - with integrated processors, sensors, and actuators connected via high-speed networks and combined with new visualization devices ranging from projections directly into the eye to large panorama displays. • Pervasive computing goes beyond the traditional user interfaces, on the one hand imploding them into small devices and appliances, and on the other hand exploding them onto large scale walls, buildings and furniture. 23
  • 24. Conclusion • Today, people's experience of computer technology is, for the most part, time-consuming and frustrating. Researchers are looking to address the increasing, sometimes overwhelming, complexity that comes with digital living and will explore ways to measurably simplify the digital experience. • Much research has yet to be done to determine how to simplify technology. The challenge grows as devices become more capable and thus more complex. The complexity increases substantially as users demand that their digital devices work together seamlessly. Researchers are starting to leverage machine learning and new networking and data access techniques to address the challenge of making digital living less frustrating and more intuitive. 24
  • 25. References • M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml • http://indus.wikia.com/wiki/Main_Page • http://www.cc.gatech.edu/fce/pubs/icse99/final.html • Mark Weiser. "The world is not a desktop". Interactions; January 1997; pp. 7-8. • Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE Computer, October 1999. • Mark Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, July 1997. (reprinted as "Ubiquitous Computing". Nikkei Electronics; December 6, 1997; pp. 137-143.) • Mark Weiser, "The Computer for the Twenty-First Century," Scientific American, pp. 94-10, September 1991 25