VIRTUAL WALL As sensor-rich pervasive environments become more common, users’ privacy
#1

[attachment=13660]
[attachment=13661]
INTRODUCTION
PERVASIVE ENVIRONMENT

Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT).
Pervasive computing involves three converging areas of
ICT:
Computing (‘devices’),
Communication (‘connectivity’) and
User interfaces.
VIRTUAL WALL
As sensor-rich pervasive environments become more common, users’ privacy will be at Increased risk. Sensors can record a user’s activities and personal information such as heart rate, body temperature, and even conversations. Users may unwittingly leave “Digital footprints” that can threaten their privacy
DIGITAL FOOTPRINTS
A Digital Footprint is the data trace or trail left by someone activity in a digital environment.
Digital Footprints are invisible but provide data on what you have done, where the person has been, how long they stayed, both via the web and by location (geography), how often, the route or routine and increasingly who with, your social crowd.
LEVEL OF TRANSARENCY FOR VIRTUAL WALL
TRANSPARENT
OPAQUE
TRANSLUCENT
TRANSPARENT VIRTUAL WALL
Alice and Bob are aware of their physical privacy within the meeting room, but sensors are leaking personal footprints to the pervasive environment.
TRANSLUCENT VIRTUAL WALL
Alice and Bob deploy a translucent virtual wall to prevent unwanted disclosure of personal footprints.
ARCHITECTURE
Our system consist of :-
Context server.
Client.
Sensing infrastructure.
Users instantiate walls by contacting the context server, which then use the virtual walls
to regulate access to footprints.
SECURITY ASSUMPTIONS
Trusted context server.
Secure location claim.
Sensor security.
VIRTUAL WALL MODEL
PLACES
FOOTPRINTS
QUERIES
VIRTUAL WALL
VIRTUAL WALL INTERACTION
Two virtual walls conflict if there exists a queries for whom two or more different transparencies apply for access to a particular digital footprint.
These conflicts can occur
between different walls owned by the same user.
by an opaque wall of one user that contradicts the transparent or translucent virtual walls of other users.
between different walls for different owners for a group-owned personal footprint.
LIMITATION OF MODEL
Virtual wall control all footprints within the personal and general categories uniformly. Users may want finer-grained control over some footprints and specialized mechanisms could be used in conjunction with virtual walls. We leave such a hybrid approach to future work.
Our model does not address multiple queries.
FUTURE WORK
The following challenges and opportunities for future work:-
Creating walls: It may be cumbersome for users to constantly think about deploying virtual walls for every place they visit.
Group ownership: A group of users may want to create a shared virtual wall to control footprints related to the group
User disruption :Opaque walls, and possibly group walls in the future, require input from and feedback to users.
Mobile places: One can envision mobile places, such as a bus enriched with sensors.For instance, the bus may be parked inside a building and so be affected by virtual walls around that building.We would like to explore the semantics of virtual walls for mobile places, and how they interact with static places.
Data perturbation: It may be desirable to perturb footprints when using translucent walls.
Deception :User studies in location privacy have identified the need for deception,where users can lie about their location
CONCLUSION
Virtual walls control the spread of personal and general contextual data, or “footprints,” and offer privacy analogous to that afforded by physical walls. . We formalized the semantics of access control using virtual walls, and evaluated our model through a user study. Our results indicate that the model is easy to understand and easy to use . Privacy in sensor-rich environments is an important problem that might affect the deployment of such environments. Based on our results, we believe that virtual walls are a promising metaphor for specifying usable privacy policies in pervasive environments.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ppts for cse on topic virtual real system in mobile environments, 2 web 2 0 is a set of philosophies that provide web users with a deep and rich experience others say it s a new collection of, top colleges to become a, how to become a rupayan cover woman, become a green engineer, atlantic technology in wall, fox interviews wall street,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,162 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,565 26-02-2015, 08:03 PM
Last Post: Guest
  Virtual keyboard computer science crazy 3 3,493 17-09-2014, 10:23 PM
Last Post: seminar report asees
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 116 82,119 03-04-2014, 11:39 PM
Last Post: seminar report asees
  Hardware for image processing - Basics Eye – Human vision sensor ppt computer topic 0 7,763 25-03-2014, 11:12 PM
Last Post: computer topic
  pervasive computing full report computer science technology 11 18,420 02-03-2013, 11:34 AM
Last Post: seminar details
  Bluetooth Based Smart Sensor Networks (Download Full Seminar Report) Computer Science Clay 75 53,861 16-02-2013, 10:16 AM
Last Post: seminar details
  An Overview of Virtual Reality ( Download Full Seminar Report ) computer science crazy 1 5,740 07-01-2013, 11:16 AM
Last Post: seminar details
  WISENET-Wireless Sensor Network (Download Seminar Report) Computer Science Clay 70 48,741 05-01-2013, 11:06 AM
Last Post: seminar details
  Virtual Reality Electrical Fan 2 2,515 11-06-2012, 03:30 PM
Last Post: seminar details

Forum Jump: