Upload
hatum-hussain
View
180
Download
0
Embed Size (px)
Citation preview
what is ubiquitous computing Pervasive computing (also
called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available
Core concepts At their core, all models of ubiquitous computing share a vision of small,
inexpensive, robust networked processing devices, distributed at all scales throughout everyday life and generally turned to distinctly common-place ends. For example, a domestic ubiquitous computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly. Another common scenario posits refrigerators "aware" of their suitably tagged contents, able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food.
Ubiquitous computing presents challenges across computer science: in systems design and engineering, in systems modeling, and in user interface design. Contemporary human-computer interaction models
three basic forms for ubiquitous system devices (see also smart device): tabs, pads and boards.
Tabs: wearable centimeter sized devices Pads: hand-held decimeter-sized devices Boards: meter sized interactive display devices.
ADVANTAGES OF UBIQUITOUS COMPUTING
Manage information quickly, efficiently and effortlessly
Smart Environments will be embedded with computing technologies that will be mostly out-of-sight
Removes complexity of new technologies Convenient access to revlevant information
stored on networks, allowing them to easily take action anywhere, anytime.
Environment will be supplemented with interconned digital technologies. Interconnectivity will eliminate mundane tasks
DISADVANTAGES OF UBIQUITOUS COMPUTING
Pervasive Computing is not entirely secure.
Frequent line connections that are broken.
Slow connections.
Very expensive operating costs.
privacy challenges (1) Privacy is already a concern with the
WWW Much more dramatic in ubiquitous
computing environment Unlimited coverage (sensors everywhere) Loss of awareness ( invisible computing) New type of data (location, health, habits,
….) More Knowledge though context Anonymity hard to achieve Difficulty in explicit notice or consent by
user
Privacy challenges (2) Privacy is greatly complicated by
ubiquitous computing. Mechanisms such as location tracking, smart
spaces, and use of anathor monitor user actions on an almost continuous basis.
As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.
Three guiding principles Marc Langhenrich, “Privacy by Design:
principles of Privacy-Aware Ubiquitous Systems,’’ in the proceding of Ubicomp 2001.
Notice
Adequate Security
Access and Resourse
Notice (openness) The subject Whose information is collected
must be notified.
Environment where it is often difficult for data subjects to realize that data collection is actually taking place
Necessary to have not only mechanisms to declare collection practices(i.e, privacy politics),but also efficient ways to communiate these to the user (i.e, ploicy announcement).
Access and Resource Needs to provide a way for users to
access their personal information in a simple way through standardized interfaces(i.e., data access).
Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e, usage logs).
Adequate Security It is not necessary to increase the
security level to an extent when it is not worth the intrusion.
We need to employ robust security features only in situation with highly sensitive data transfer
Financial transaction Transfer of medical informaton
Privacy in ubiquitous computing
Privacy is possible in ubiquitous computing environment
Let people know about collections Let people query, update, delete their own data Let people know about each usage Solutions need not be perfect to be
useful Trusting fair information practices Trusting collectors to keep their promises Trusting the legal system
CONCULUSION Removal of wires in the networks
computing available to every where
Information can be accessed when and where it is needed
But still privacy and security major drawbacks of the ubiquitous computing.