Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure and Private Service Discovery in Pervasive Computing Environments

View through CrossRef
With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing. Every year, billions of computing devices are built. They are ubiquitously deployed and are gracefully integrated with people and their environments. Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other. Authentication for pervasive service discovery is difficult. In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes. It encodes hundreds of authentication messages in a novel code word form. Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people. A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first. We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.
Title: Secure and Private Service Discovery in Pervasive Computing Environments
Description:
With the convergence of embedded computers and wireless communication, pervasive computing has become the inevitable future of computing.
Every year, billions of computing devices are built.
They are ubiquitously deployed and are gracefully integrated with people and their environments.
Service discovery is an essential step for the devices to properly discover, configure, and communicate with each other.
Authentication for pervasive service discovery is difficult.
In this chapter, we introduce a user-centric service discovery model, called PrudentExposure, which automates authentication processes.
It encodes hundreds of authentication messages in a novel code word form.
Perhaps the most serious challenge for pervasive service discovery is the integration of computing devices with people.
A critical privacy challenge can be expressed as a “chicken-andegg problem”: both users and service providers want the other parties to expose sensitive information first.
We discuss how a progressive and probabilistic model can protect both users’ and service providers’ privacy.

Related Results

Tools for interdisciplinary design of pervasive computing
Tools for interdisciplinary design of pervasive computing
PurposeTo be successful, pervasive computing requires a balance of computing, design, and business requirements to be considered throughout the design process. Achieving this synth...
Meta Model Context Based Space for Ubiquitous Computing
Meta Model Context Based Space for Ubiquitous Computing
Pervasive computing is a paradigm that focuses on the availability of computer resources anytime anywhere for any application and supports integration of computing services into ev...
Service-Oriented Architectures for Pervasive Computing
Service-Oriented Architectures for Pervasive Computing
The vision of pervasive computing is to create and manage computational spaces where large numbers of heterogeneous devices collaborate transparently to serve the user tasks all th...
Sensor Networks in Pervasive Healthcare Computing
Sensor Networks in Pervasive Healthcare Computing
Advances in wireless sensor networking (WSN) have opened up new opportunities in distributed informatics. Pervasive healthcare, based on WSN, is an emerging technology area with gr...
Location‐aware middle agents in pervasive computing
Location‐aware middle agents in pervasive computing
In the vision of pervasive computing, numerous heterogeneous devices, various information services, and users performing daily activities are physically co‐located in a environment...
Cognitive Pervasive Service Composition Applied to Predatory Crime Deterrence
Cognitive Pervasive Service Composition Applied to Predatory Crime Deterrence
Pervasive service composition is useful in many scenarios, for instance, in urban planning or controlled harvest. Currently, there is no standard to develop solutions using pervasi...
Advancements in Quantum Computing and Information Science
Advancements in Quantum Computing and Information Science
Abstract: The chapter "Advancements in Quantum Computing and Information Science" explores the fundamental principles, historical development, and modern applications of quantum co...
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
THE IMPACT OF CLOUD COMPUTING ON CONSTRUCTION PROJECT DELIVERY ABUJA NIGERIA
Cloud computing is the delivery of computing services, such as storage, processing power, and software applications, via the internet. Cloud computing offers various advantages and...

Back to Top