16
UBIQUITOUS COMPUTING SYSTEM AND ITS PRIVACY PRESENTED BY: HATUM HUSSAIN Mirjat

Ubiquitous computing-and-its-privacy

Embed Size (px)

Citation preview

UBIQUITOUS COMPUTING SYSTEM AND ITS PRIVACY

PRESENTED BY: HATUM HUSSAIN Mirjat

what is ubiquitous computing Pervasive computing (also

called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available

Core concepts At their core, all models of ubiquitous computing share a vision of small,

inexpensive, robust networked processing devices, distributed at all scales throughout everyday life and generally turned to distinctly common-place ends. For example, a domestic ubiquitous computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly. Another common scenario posits refrigerators "aware" of their suitably tagged contents, able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food.

Ubiquitous computing presents challenges across computer science: in systems design and engineering, in systems modeling, and in user interface design. Contemporary human-computer interaction models

three basic forms for ubiquitous system devices (see also smart device): tabs, pads and boards.

Tabs: wearable centimeter sized devices Pads: hand-held decimeter-sized devices Boards: meter sized interactive display devices.

ADVANTAGES OF UBIQUITOUS COMPUTING

Manage information quickly, efficiently and effortlessly

Smart Environments will be embedded with computing technologies that will be mostly out-of-sight

Removes complexity of new technologies Convenient access to revlevant information

stored on networks, allowing them to easily take action anywhere, anytime.

Environment will be supplemented with interconned digital technologies. Interconnectivity will eliminate mundane tasks

DISADVANTAGES OF UBIQUITOUS COMPUTING

Pervasive Computing is not entirely secure.

Frequent line connections that are broken.

Slow connections.

Very expensive operating costs.

privacy challenges (1) Privacy is already a concern with the

WWW Much more dramatic in ubiquitous

computing environment Unlimited coverage (sensors everywhere) Loss of awareness ( invisible computing) New type of data (location, health, habits,

….) More Knowledge though context Anonymity hard to achieve Difficulty in explicit notice or consent by

user

Privacy challenges (2) Privacy is greatly complicated by

ubiquitous computing. Mechanisms such as location tracking, smart

spaces, and use of anathor monitor user actions on an almost continuous basis.

As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.

Three guiding principles Marc Langhenrich, “Privacy by Design:

principles of Privacy-Aware Ubiquitous Systems,’’ in the proceding of Ubicomp 2001.

Notice

Adequate Security

Access and Resourse

Notice (openness) The subject Whose information is collected

must be notified.

Environment where it is often difficult for data subjects to realize that data collection is actually taking place

Necessary to have not only mechanisms to declare collection practices(i.e, privacy politics),but also efficient ways to communiate these to the user (i.e, ploicy announcement).

Access and Resource Needs to provide a way for users to

access their personal information in a simple way through standardized interfaces(i.e., data access).

Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e, usage logs).

Adequate Security It is not necessary to increase the

security level to an extent when it is not worth the intrusion.

We need to employ robust security features only in situation with highly sensitive data transfer

Financial transaction Transfer of medical informaton

Privacy in ubiquitous computing

Privacy is possible in ubiquitous computing environment

Let people know about collections Let people query, update, delete their own data Let people know about each usage Solutions need not be perfect to be

useful Trusting fair information practices Trusting collectors to keep their promises Trusting the legal system

CONCULUSION Removal of wires in the networks

computing available to every where

Information can be accessed when and where it is needed

But still privacy and security major drawbacks of the ubiquitous computing.