SlideShare a Scribd company logo
Ubiquitous Computing
              ……Providing computations and
              communications everywhere !!




                    April 2012
       Presenter : 09BCE035 Arpan Patel
            Guide: Dr. S.N. Pradhan
        Nirma University of Technology
Flow of Presentation:
- Issues & Challenges in Ubiquitous Computing
  (The Problem Space!)
      Research Thrusts
      Design & Implementation Problems

- Solutions for Certain Problems

- Various Other Applications

- The Future of Ubiquitous Computing

- Conclusion
4
5
6
7
8
9
10
11
12
13
14
15
16
17
Security and trust issues in ubiquitous environments:

     • Security implies protecting corporate resources
       against threats and attacks.
     • Security goals includes:
        - Access control
        - Data confidentiality and integrity
        - Availability of services
        - Accountability of actions
     • Various solutions that are used includes:
        - Firewalls
        - Virtual private network



                                                         18
Solutions for Security and Privacy
• Sandboxing
   - executing code in a restricted and safe environment.
   - restricting access from the code to operating system
   functionality.
   - highly effective but at the expense of flexibility.

• Certification
   - Trusting the code as safe on someone else opinion.
   - Most often code being signed by a large corporation.

•   The Volume of transmitted data should be kept
    Minimum

•   Data that require transmission should be encrypted and
    sent anonymously (without reference to the owner)
                                                            19
Proof Carrying Code (PCC)
 Attaches additional data to a piece of code which can be
  interpreted as a proof of a particular property.
 Verify the proof and check whether or not it is valid.
 Requires no certification , no restrictions so it strikes effective
  balance bet security &flexibility.



                 Direct Code Analysis
 Direct analyses of executable code on client machine.
 Removes the need to depend on the external trust of
  organizations.
 Full flexibility and security.

                                                                    20
• Biometrics
It is the science of verifying and establishing the identity of an individual
through physiological features or behavioral traits.
Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns
Behavioral Biometrics: Handwriting, Signature, Speech, Gait
Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy)

• Biometrics offers a promising solution for reliable and uniform
  identification and verification of an individual. These traits are
  unique to an individual and hence cannot be misused, lost or
  stolen. Biometrics are based on established scientific principles as
  a basis for authentication.

• Advantages:
   –   Uniqueness
   –   No need to remember passwords or carry tokens
   –   Biometrics cannot be lost, stolen or forgotten
   –   Security has to be incorporated in the design stage
   –   Traditional authentication and access control paradigms cannot scale to
       numerous and ubiquitous devices                                   21
Some Possible Applications
Pervasive Computing involving Hybrid (Regular and
Sensor Network-based) Internet works for:
• Natural disaster-specific warning purposes like:
  Tsunami Warning, Forest Fire Warning, Volcanic
  Eruption Warning, Flood-warning etc
• Large-scale monitoring and tracking purposes like:
  Wildlife monitoring, Baggage / cargo monitoring,
  Intelligent Transportation Systems, Inter-planetary
  Networks, Intelligent Transportation Systems,
  Wearable and Vehicular Computing
Future of Ubiquitous Computing:
• Pervasive computing is the next generation computing
  environments with information & communication technology
  everywhere, for everyone, at all times.

• Information and communication technology will be an
  integrated part of our environments: from toys, milk cartons
  and desktops to cars, factories and whole city areas - with
  integrated processors, sensors, and actuators connected via
  high-speed networks and combined with new visualization
  devices ranging from projections directly into the eye to large
  panorama displays.

• Pervasive computing goes beyond the traditional user
  interfaces, on the one hand imploding them into small
  devices and appliances, and on the other hand exploding
  them onto large scale walls, buildings and furniture.
                                                            23
Conclusion
• Today, people's experience of computer technology is, for the most
  part, time-consuming and frustrating. Researchers are looking to
  address the increasing, sometimes overwhelming, complexity that
  comes with digital living and will explore ways to measurably
  simplify the digital experience.

• Much research has yet to be done to determine how to simplify
  technology. The challenge grows as devices become more capable
  and thus more complex. The complexity increases substantially as
  users demand that their digital devices work together seamlessly.
  Researchers are starting to leverage machine learning and new
  networking and data access techniques to address the challenge of
  making digital living less frustrating and more intuitive.




                                                                   24
References
• M. Satyanarayanan, “Pervasive Computing: Vision and
  Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml
• http://indus.wikia.com/wiki/Main_Page
• http://www.cc.gatech.edu/fce/pubs/icse99/final.html
• Mark Weiser. "The world is not a desktop". Interactions;
  January 1997; pp. 7-8.
• Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE
  Computer, October 1999.
• Mark Weiser, "Some Computer Science Problems in Ubiquitous
  Computing," Communications of the ACM, July 1997. (reprinted
  as "Ubiquitous Computing". Nikkei Electronics; December 6,
  1997; pp. 137-143.)
• Mark Weiser, "The Computer for the Twenty-First Century,"
  Scientific American, pp. 94-10, September 1991
                                                              25

More Related Content

What's hot

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Priti Punia
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Abhinav Wagadre
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
OMAN1991
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
Govind Raj
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
Phearin Sok
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Kelly Zhang
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
Raquel Salcedo Gomes
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Bhupender Singh Jadon
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
abhisheksaini
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
Vishwajeet Vatharkar
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 

What's hot (20)

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 

Similar to Ubiquitous computing presentation 2

Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
Dr. Mazlan Abbas
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Henrique Centieiro
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
Access controls
Access controlsAccess controls
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
Rui M. Barreira
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
Ahmad Sharifi
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
aztechcouncil
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
vidhanPoddar1
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
Rameshkumar1829
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
Certrec
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
TEUNO
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
S .Ali Raza
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
nadoje
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
Fulvio Corno
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
jaspreetkaur908049
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Katedra Informatologii. Wydział Dziennikarstwa, Informacji i Bibliologii, Uniwersytet Warszawski
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Atifa Aqueel
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
chWaqasZahid
 
IT Fundamentals
IT FundamentalsIT Fundamentals

Similar to Ubiquitous computing presentation 2 (20)

Ambient Intelligence
Ambient IntelligenceAmbient Intelligence
Ambient Intelligence
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1ASDF WSS 2014 Keynote Speech 1
ASDF WSS 2014 Keynote Speech 1
 
Access controls
Access controlsAccess controls
Access controls
 
Sensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente IntelligenceSensor Networks and Ambiente Intelligence
Sensor Networks and Ambiente Intelligence
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Power Plants Security Webinar Presentation
Power Plants Security Webinar PresentationPower Plants Security Webinar Presentation
Power Plants Security Webinar Presentation
 
TEUNO Summit - Presentaciones
TEUNO Summit - PresentacionesTEUNO Summit - Presentaciones
TEUNO Summit - Presentaciones
 
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptxSecurity FJ_Exec_Strattegy_Comittee_V13.4.pptx
Security FJ_Exec_Strattegy_Comittee_V13.4.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
Ambient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application AreasAmbient Intelligence: Definitions and Application Areas
Ambient Intelligence: Definitions and Application Areas
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
IOT presentation.pptx
IOT presentation.pptxIOT presentation.pptx
IOT presentation.pptx
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 

More from Arpan Patel

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
Arpan Patel
 
Codecs
CodecsCodecs
Codecs
Arpan Patel
 
Codecs
CodecsCodecs
Codecs
Arpan Patel
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)Arpan Patel
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Arpan Patel
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Arpan Patel
 

More from Arpan Patel (6)

Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Codecs
CodecsCodecs
Codecs
 
Codecs
CodecsCodecs
Codecs
 
Internet 2 (technology)
Internet 2 (technology)Internet 2 (technology)
Internet 2 (technology)
 
Internet2 slide 3 (applications)
Internet2 slide 3 (applications)Internet2 slide 3 (applications)
Internet2 slide 3 (applications)
 
Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)Internet2 slide 1 (main slide)
Internet2 slide 1 (main slide)
 

Recently uploaded

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Recently uploaded (20)

Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Ubiquitous computing presentation 2

  • 1. Ubiquitous Computing ……Providing computations and communications everywhere !! April 2012 Presenter : 09BCE035 Arpan Patel Guide: Dr. S.N. Pradhan Nirma University of Technology
  • 2. Flow of Presentation: - Issues & Challenges in Ubiquitous Computing (The Problem Space!)  Research Thrusts  Design & Implementation Problems - Solutions for Certain Problems - Various Other Applications - The Future of Ubiquitous Computing - Conclusion
  • 3.
  • 4. 4
  • 5. 5
  • 6. 6
  • 7. 7
  • 8. 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 14. 14
  • 15. 15
  • 16. 16
  • 17. 17
  • 18. Security and trust issues in ubiquitous environments: • Security implies protecting corporate resources against threats and attacks. • Security goals includes: - Access control - Data confidentiality and integrity - Availability of services - Accountability of actions • Various solutions that are used includes: - Firewalls - Virtual private network 18
  • 19. Solutions for Security and Privacy • Sandboxing - executing code in a restricted and safe environment. - restricting access from the code to operating system functionality. - highly effective but at the expense of flexibility. • Certification - Trusting the code as safe on someone else opinion. - Most often code being signed by a large corporation. • The Volume of transmitted data should be kept Minimum • Data that require transmission should be encrypted and sent anonymously (without reference to the owner) 19
  • 20. Proof Carrying Code (PCC)  Attaches additional data to a piece of code which can be interpreted as a proof of a particular property.  Verify the proof and check whether or not it is valid.  Requires no certification , no restrictions so it strikes effective balance bet security &flexibility. Direct Code Analysis  Direct analyses of executable code on client machine.  Removes the need to depend on the external trust of organizations.  Full flexibility and security. 20
  • 21. • Biometrics It is the science of verifying and establishing the identity of an individual through physiological features or behavioral traits. Physical Biometrics: Fingerprint, Hand Geometry, Iris patterns Behavioral Biometrics: Handwriting, Signature, Speech, Gait Chemical/Biological Biometrics: Perspiration, Skin composition(spectroscopy) • Biometrics offers a promising solution for reliable and uniform identification and verification of an individual. These traits are unique to an individual and hence cannot be misused, lost or stolen. Biometrics are based on established scientific principles as a basis for authentication. • Advantages: – Uniqueness – No need to remember passwords or carry tokens – Biometrics cannot be lost, stolen or forgotten – Security has to be incorporated in the design stage – Traditional authentication and access control paradigms cannot scale to numerous and ubiquitous devices 21
  • 22. Some Possible Applications Pervasive Computing involving Hybrid (Regular and Sensor Network-based) Internet works for: • Natural disaster-specific warning purposes like: Tsunami Warning, Forest Fire Warning, Volcanic Eruption Warning, Flood-warning etc • Large-scale monitoring and tracking purposes like: Wildlife monitoring, Baggage / cargo monitoring, Intelligent Transportation Systems, Inter-planetary Networks, Intelligent Transportation Systems, Wearable and Vehicular Computing
  • 23. Future of Ubiquitous Computing: • Pervasive computing is the next generation computing environments with information & communication technology everywhere, for everyone, at all times. • Information and communication technology will be an integrated part of our environments: from toys, milk cartons and desktops to cars, factories and whole city areas - with integrated processors, sensors, and actuators connected via high-speed networks and combined with new visualization devices ranging from projections directly into the eye to large panorama displays. • Pervasive computing goes beyond the traditional user interfaces, on the one hand imploding them into small devices and appliances, and on the other hand exploding them onto large scale walls, buildings and furniture. 23
  • 24. Conclusion • Today, people's experience of computer technology is, for the most part, time-consuming and frustrating. Researchers are looking to address the increasing, sometimes overwhelming, complexity that comes with digital living and will explore ways to measurably simplify the digital experience. • Much research has yet to be done to determine how to simplify technology. The challenge grows as devices become more capable and thus more complex. The complexity increases substantially as users demand that their digital devices work together seamlessly. Researchers are starting to leverage machine learning and new networking and data access techniques to address the challenge of making digital living less frustrating and more intuitive. 24
  • 25. References • M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” http://www.fincher.org/tips/web/Pervasive.shtml • http://indus.wikia.com/wiki/Main_Page • http://www.cc.gatech.edu/fce/pubs/icse99/final.html • Mark Weiser. "The world is not a desktop". Interactions; January 1997; pp. 7-8. • Mark Weiser, "Hot Topics: Ubiquitous Computing" IEEE Computer, October 1999. • Mark Weiser, "Some Computer Science Problems in Ubiquitous Computing," Communications of the ACM, July 1997. (reprinted as "Ubiquitous Computing". Nikkei Electronics; December 6, 1997; pp. 137-143.) • Mark Weiser, "The Computer for the Twenty-First Century," Scientific American, pp. 94-10, September 1991 25