close
one pixel image

Towards Security and Privacy for Pervasive Computing

About this sample

About this sample

close

Words: 3466 |

Pages: 8|

18 min read

Published: Dec 27, 2022

Words: 3466|Pages: 8|18 min read

Published: Dec 27, 2022

Table of contents

  1. Abstract
  2. Introduction
  3. Pervasive Computing Abstractions
  4. The Drawback
  5. Security Challenges and Necessities
  6. Challenges
  7. Extended Computing Boundary
  8. Privacy Problems
  9. User Interaction Problems
  10. Security Policies
  11. Security Necessities
  12. Transparency and Inconspicuousness
  13. Multilevel
  14. Context-Awareness
  15. Flexibility and Customizability
  16. Interoperability
  17. Dynamic Security Policies
  18. Access Control
  19. Conclusion and Future Directions
  20. References

In this paper we will discuss Pervasive Computing examples of application for security and privacy like like Bluetooth and Wi-Fi. Authors are students of the department of Computer Science at the California Institute of Technology.

Abstract

Pervasive computing environments with their interconnected devices and services promise seamless integration of digital infrastructure into our everyday lives. whereas the main target of current analysis is on the way to connect new devices and build helpful applications to enhance practicality, the safety and privacy problems in such environments haven't been explored in any depth. whereas ancient distributed computing analysis makes an attempt to abstract away physical location of users and resources, pervasive computing applications typically exploit physical location and alternative context data regarding users and resources to boost the user expertise. the requirement to share resources and collaborate introduces new sorts of interaction among users additionally as between the virtual and physical worlds. during this context, it becomes troublesome to separate physical security from digital security. Existing policies and mechanisms might not offer adequate guarantees to traumatize new exposures and vulnerabilities introduced by the pervasive computing paradigm. during this paper we tend to explore the challenges for building security and privacy into pervasive computing environments, describe our image implementation that addresses a number of these problems, and propose some directions for future work.

Introduction

We square measure witnessing the birth of a revolutionary computing paradigm that guarantees to possess a profound impact on the method we tend to act with computers, devices, physical areas, and people. This new technology envisions a world wherever embedded processors, computers, sensors, and digital communications square measure cheap commodities that square measure on the market everyplace. This eliminates time and place barriers by creating services on the market to users anytime and anyplace.

Pervasive computing can surround users with a cushy Associate in Nursing convenient data atmosphere that merges physical and procedure infrastructures into an integrated home ground. This home ground can feature a proliferation of tons of or thousands of computing devices and sensors which will offer new practicality, provide specialized services, and boost productivity and interaction. Context-awareness can allow this home ground to require on the responsibility of serving users, by trade itself to their preferences additionally as activity tasks and cluster activities in step with the character of the physical house. we tend to term this dynamic, information-rich home ground Associate in Nursing “active house.” at intervals this house, people might act with versatile applications which will follow the user, outline and management the operate of the house, or collaborate with remote users and applications.

The realization of this computing paradigm isn't way fetched. a median person nowadays already owns large numbers of client devices, electronic gadgets, and gizmos that have already got processors, microcontrollers, and memory chips embedded into them, like VCRs, TVs, washers and dryers. The vehicles we tend to use on commonplace have already got an outsized range of embedded computers handling totally different subsystems of the vehicle, like ABS (Anti-lock Braking System) and parapsychology (Electronic Stability Program). Technologies like Bluetooth and Wi-Fi build it doable to engraft networking capabilities into any tiny devices while not problem. In effect, these technologies facilitate build networking rather more general and realizable even on elementary devices, like toasters and paperclips.

Pervasive Computing Abstractions

To have a higher understanding of the challenges related to securing pervasive computing environments, it's vital to list the salient options of pervasive computing. These embrace the subsequent.

Extending Computing Boundaries. whereas ancient computing encompassed hardware and package entities, pervasive computing extends the boundaries of computing to incorporate physical areas, building infrastructures, and therefore the devices contained at intervals. This aims to rework boring areas into interactive, dynamic, and programmable areas that square measure coordinated through a package infrastructure and inhabited with an outsized range of mobile users and devices.

Invisibility and non-intrusiveness. In current computing models, computers square measure still the main target of attention. In effect, individuals got to amendment a number of their behavior and therefore the method they perform tasks in order that these tasks will be processed. to spice up productivity, it's vital that computing machinery disappear and leave the spotlight. Computers ought to mix within the background permitting individuals to perform their duties while not having machines at the middle of their focus.

Creating good and sentient areas. A dirt of invisible embedded devices and sensors square measure incorporated to show physical areas into active, good surroundings that may sense, “see,” and “hear,” effectively, creating the house sentient and adaptable . Ultimately, the house ought to become intelligent enough to know users’ intent Associate in Nursingd become an integral a part of users’ daily life.

Context awareness. A pervasive computing atmosphere ought to be able to capture the various context and situational data and integrate them with users and devices. this permits the active house to require on the responsibility of serving users and mechanically trade itself to satisfy their expectations and preferences.

Mobility and flexibility. To be really present, the pervasive computing atmosphere ought to be as mobile as its users. It ought to be able to adapt itself to environments with scarce resources, whereas having the ability to evolve and extend over again resources become on the market.

The Drawback

Current analysis in pervasive computing focuses on building infrastructures for managing active areas, connecting new devices, or building helpful applications to enhance practicality. Security and privacy problems in such environments, however, haven't been explored exhaustive. Indeed, many researchers and practitioners have admitted that security and privacy during this new computing paradigm square measure real issues. Langheinrich warns North American nation regarding the likelihood of Associate in Nursing writer nightmare during which current pervasive computing analysis continues on while not considering privacy within the system. Stajano notices that whereas researchers square measure busy wondering the killer applications for pervasive computing, cyber-criminals and pc villains square measure already considering new, ingenious attacks that aren't doable in ancient computing environments. Kagal et al. admit that securing pervasive computing environments presents challenges at several levels.

The exact same options that build pervasive computing environments convenient and powerful build them prone to new security and privacy threats. ancient security mechanisms and policies might not offer adequate guarantees to traumatize the new exposures and vulnerabilities.

In this paper we tend to address a number of these problems as follows. In Section two we tend to explore the challenges for building security and privacy into pervasive computing environments. In Section three we tend to describe our image implementation that addresses a number of these problems. In Section four we tend to propose some directions for future work and conclude.

Security Challenges and Necessities

In this section, we tend to refer the key challenges and necessities for securing pervasive computing environments.

Challenges

As mentioned before, extra| the extra options and therefore the extended practicality that pervasive computing offers build it susceptible to additional vulnerabilities and exposures. Below, we tend to mention these options that add further burden to the safety scheme.

Extended Computing Boundary

Traditional computing is confined to the virtual computing world wherever information and programs reside. Current distributed computing analysis tends to abstract away physical locations of users and resources. Pervasive computing, however, extends its reach on the far side the procedure infrastructure and makes an attempt to cover the surrounding physical areas additionally. Pervasive computing applications typically exploit physical location and alternative context data regarding users and resources to boost the user expertise. underneath such situations, data and physical security become mutually beneficial. As a result, such environments become susceptible to additional severe security threats that may threaten individuals and instrumentality within the physical world the maximum amount as they'll threaten their information and programs within the virtual world. Therefore, ancient mechanisms that focus just on digital security become inadequate.

Privacy Problems

The physical reach of pervasive computing makes protective users’ privacy a far tougher task. Augmenting active areas with active sensors and actuators permits the development of additional intelligent areas and computing capabilities that square measure really present. Through numerous sensors and embedded devices, active areas will mechanically be tailored to users’ preferences and may capture and utilize context data absolutely. sadly, this terribly feature may threaten the privacy of users severely. for example, this capability will be exploited by intruders, malicious insiders, or maybe curious system directors to trace or electronically stalk specific users. the whole system currently becomes a distributed closed-circuit television that may capture an excessive amount of data regarding users.

In some environments, like homes and clinics, there's typically Associate in Nursing abundance of sensitive and private data that has to be secured. Moreover, there square measure sure things once individuals don't need to be half-track.

User Interaction Problems

One of the most characteristics of pervasive applications may be a richer user-interface for interaction between users and therefore the house. a spread of multimedia system mechanisms square measure used for input and output, and to manage the physical aspects of the house. At any purpose of your time, the set of users within the house affects the safety properties of the house. due to the character of those interactions, users within the house cannot simply be prevented from seeing and hearing things happening in it, therefore this needs to be taken into consideration whereas coming up with access management mechanisms. we tend to believe that the access management mechanisms ought to enable teams of users and devices to use the house during a manner that facilitates collaboration, whereas implementing the acceptable access management policies and preventing unauthorized use. therefore, the physical and “virtual” aspects of access management for such areas got to be thought of along.

Security Policies

It is vital in pervasive computing to possess a versatile and convenient methodology for outlining and managing security policies during a dynamic and versatile fashion. Policy Management tools offer directors the flexibility to specify, implement, and enforce rules to exercise larger management over the behavior of entities in their systems. Currently, most network policies square measure enforced by systems director’s exploitation tools supported scripting applications that tell through lists of low-level interfaces and alter values of entity-specific system variables. The policy management package maintains Associate in Nursing thorough info of corresponding device and resource interfaces. With the proliferation of heterogeneous device-specific and vendor-specific interfaces, these tools may have to be updated of times to accommodate new hardware or package, and therefore the system generally becomes troublesome to manage. As a result, general purpose low-level management tools square measure restricted in their practicality, and square measure forced to implement solely generic or coarse-grained policies.

Since most policy management tools traumatize these low-level interfaces, directors might not have a transparent image of the ramifications of their policy management actions. Dependencies among objects will cause sudden aspect effects and undesirable behavior. Further, the revealing of security policies is also a breach of security. as an example, knowing whether or not the system is on the lookout for Associate in Nursing entrant may truly be a secret. Thus, unauthorized personnel mustn't be able to recognize what the safety policy may become underneath a particular circumstance.

Security Necessities

To traumatize the new vulnerabilities introduced by pervasive computing, security and privacy guarantees in pervasive computing environments ought to be such and written early into the look method instead of being thought of as add-ons or afterthoughts. Previous efforts in retrofitting security and obscurity into existing systems have tested to be inefficient and ineffective. the net and Wi-Fi square measure 2 such examples each of that still suffer from inadequate security. during this section, we tend to shortly mention the vital necessities required for a security scheme for pervasive computing environments.

Transparency and Inconspicuousness

The put attentiveness of pervasive computing is to rework users into top quality entities, United Nations agency now not have to be compelled to exert abundant of their attention to computing machinery. Therefore, even the safety scheme ought to be clear to some level, mixing into the background while not distracting users an excessive amount of.

Multilevel

When it involves security, one size doesn't work all. Hence, the safety design deployed ought to be able to offer totally different levels of security services supported system policy, context data, environmental things, temporal circumstances, on the market resources, etc. In some instances, this could go against the time. situations that need a higher-level of assurance or larger security might need users to act with the safety scheme expressly by, say, authenticating themselves employing a style of means that to spice up system’s confidence.

Context-Awareness

Often, ancient security is somewhat static and context insensitive. Pervasive computing integrates context and situational data, remodeling the computing atmosphere into a sentient house. the safety aspects of it are not any exceptions. Security services ought to build intensive use of context data on the market. as an example, access management selections might depend upon time or special circumstances. Context information will offer valuable data for intrusion detection mechanisms. The principal of “need to know” ought to be applied on temporal and situational basis. for example, security policies ought to be able to amendment dynamically to limit the permissions to the days or things after they square measure required. However, viewing what the safety policy may become during a specific time or underneath a selected state of affairs mustn't be doable. additionally, there's a requirement to verify the credibleness and integrity of the context data no heritable. this can be typically necessary so as to thwart false context data obtained from scallywag or run-down sensors.

Flexibility and Customizability

The security scheme ought to be versatile, adaptable, and customizable. It should be able to adapt to environments with extreme conditions and scarce resources, yet, it's able to evolve and supply extra practicality once additional resources become on the market. Tools for outlining and managing policies ought to be as dynamic because the atmosphere itself.

Interoperability

With many alternative security technologies egression and being deployed, the belief that a selected security mechanism can eventually prevail is imperfect. For that reason, it's necessary to support multiple security mechanisms and talk terms security necessities.

Dynamic Security Policies

To address the new challenges in process and managing security policies in pervasive computing environments, we tend to propose a brand new category of policies referred to as dynamic policies that square measure designed with specific information of system behavior, that specialize in the interactions between numerous system objects. we tend to develop behavioral descriptions of programs that may be sent across networks to alter a system’s package state, whereas protective sure security and privacy properties. These program modules correspond to the dynamic policy implementation, and may be implemented by execution them during a appropriate package context.

We explore the character of security guarantees that may be created regarding the system state before, during, and once the execution of dynamic policies. we tend to believe that security considerations have to be compelled to be integrated into models of system behavior, Associate in Nursing security policies got to kind an integral a part of system specifications. This analysis is crucial within the context of active areas and in alternative dynamic environments wherever operational parameters square measure perpetually ever-changing.

Dynamic policies change the creation of customizable programs that may be deployed on-the-fly, to enforce and implement sturdy security policies that may adapt to a ever-changing package atmosphere. In we tend to gift {a powerful sturdy a set of formal strategies and mechanisms that may be wont to produce policies with strong security guarantees, eliminating idea within the style and preparation of reactive security systems.

Access Control

Smart rooms square measure generally shared by different teams of users for various activities at different points in time. every activity-specific incarnation of a full of life house (such as a “classroom” or a “meeting”) is termed a “Virtual Space”. Access management policies and mechanisms square measure necessary to confirm that users solely use the resources (both hardware and software) in a full of life house in approved ways that, and to permit shared use of the house. These totally different virtual areas have variable access management necessities, and therefore the access management policies and mechanisms ought to enable seamless transitions between virtual areas, while not sacrificing security properties. additionally, the policies ought to be simple to assemble, enforce, and administer.

We square measure within the method of developing Associate in Nursing access system for Ge. Our access system supports customizable access management policies, and integrates physical and virtual aspects of the atmosphere into the access management call mechanisms. It will reconfigure a full of life house dynamically to support totally different access management policies for various virtual areas, looking on the set of users and therefore the activity being undertaken within the house. we tend to additionally offer dynamic support for specific cooperation between totally different users, teams of users, and devices.

Our system uses the RBAC model for policy configuration, and implements each discretionary and necessary access controls, providing flexibility and quality. we tend to outline 3 sorts of roles viz., system, space, and application roles. every role will be managed by a unique administrator, therefore providing redistributed administration.

Within every active house, access management policies square measure expressed in terms of house roles. The house administrator sets access management policies for resources at intervals a selected house. These policies square measure within the sort of access lists for resources at intervals the house, expressed in terms of house roles and permissions. once users enter an area, their system role is mapped into Associate in Nursing applicable house role mechanically.

We additionally build a particular notion of cooperation into our access management model exploitation the idea of the house mode. we tend to outline four distinct modes of collaboration in our model: individual, shared, supervised-use and cooperative, such as totally different levels of cooperation between users within the house United Nations agency don't essentially trust one another. The mode of the house depends on the users at intervals the house and therefore the activity being performed.

This model of access management is helpful in developing access management policies that square measure applicable for cooperative applications that square measure common in such environments.

Conclusion and Future Directions

The shift to the pervasive computing paradigm brings forth new challenges to security and privacy, that can't be addressed by mere adaptation of existing security and privacy mechanisms. Unless security considerations square measure accommodated early within the style part, pervasive computing environments are rife with vulnerabilities and exposures. during this paper we tend to talked regarding a number of these challenges. we tend to additionally conferred some solutions in our image implementation.

The construction of complete, integrated pervasive environments and their real-life preparation square measure still things of the long run. Security in pervasive computing {is expected is predicted is Associate to be an integral a part of the entire system, that isn't completed however. It ought to be noted, however, that there's no single “magical” protocol or mechanism that may address all the safety problems and meet the wants and expectations of secure pervasive computing. Moreover, security itself consists of a spread of various and broad aspects every of which needs elaborate analysis and customized solutions. For these reasons, our image implementations aren't meant to be an answer for all issues. Instead, they represent milestones towards the development of a full- fledged security scheme.

Promising future directions embrace the event of formal specifications of fascinating behavior within the sort of security and privacy properties in pervasive computing. Access management, data flow, availableness, and secure protocols for authentication, non-repudiation, confidentiality and integrity will be per terms of system properties like safety and physiological property. it's additionally promising to include intelligence and automatic reasoning into the safety design. This “intelligent” security system would be able to build judgments and provides help in securing the atmosphere while not an excessive amount of intervention by users or directors. Therefore, we tend to square measure exploring the likelihood of incorporating machine-controlled reasoning and learning into the active areas security design, facultative it to perform intelligent inferences underneath totally different contexts despite the uncertainties that arise as a results of bridging the physical and virtual worlds.

Get a custom paper now from our expert writers.

We also are trying into the event of many middleware reflective object- homeward patterns that may support the various aspects of security, together with authentication, access control, anonymity, and policy management, additionally as the way to instantiate them with various mechanisms. Finally, as a result of it's troublesome to develop security models that involve individuals and physical areas, additional studies on integration virtual and physical security have to be compelled to be thought of.

References

  • International Standard [for] Information Technology-Telecommunications andinformation exchange between systems-Local and metropolitan area networksSpecific Requirements-Part 11: Wireless LAN Medium Access Control (MAC) andPhysical Layer (PHY) specifications,' IEEE, 1999.
  • M. Langheinrich, 'Privacy by Design - Principles of Privacy-Aware UbiquitousSystems,' presented at ACM UbiComp 2001, Atlanta, GA, 2001.
  • M. Langheinrich, 'A Privacy Awareness System for Ubiquitous ComputingEnvironments,' presented at 4th International Conference on Ubiquitous Computing,2002.
  • =F. Stajano, Security for Ubiquitous Computing: Halsted Press, 2002.[6] L. Kagal, T. Finin, and A. Joshi, 'Trust-Based Security in Pervasive ComputingEnvironments,' IEEE Computer, 2001.

Cite this Essay

Towards Security and Privacy for Pervasive Computing. (, ). GradesFixer. Retrieved November 20, 2024, from https://gradesfixer.com/free-admission-essays/towards-security-and-privacy-for-pervasive-computing/
“Towards Security and Privacy for Pervasive Computing.” GradesFixer, , gradesfixer.com/free-admission-essays/towards-security-and-privacy-for-pervasive-computing/
Towards Security and Privacy for Pervasive Computing. [online]. Available at: <https://gradesfixer.com/free-admission-essays/towards-security-and-privacy-for-pervasive-computing/> [Accessed 20 Nov. 2024].
Towards Security and Privacy for Pervasive Computing [Internet]. GradesFixer. [cited 2024 Nov 20]. Available from: https://gradesfixer.com/free-admission-essays/towards-security-and-privacy-for-pervasive-computing/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now