A Framework for Secure Knowledge Management in Pervasive Computing
نویسندگان
چکیده
A feature common to many pervasive computing scenarios is that devices acquire information about their environment from peers through short-range ad-hoc wireless connections and use it to maintain a model of their current context. A fundamental issue in such situations, is that knowledge obtained from peer devices may vary in reliability with devices providing incorrect data either inadvertently out of ignorance or other limitations or intentionally in pursuit of malicious or self-serving goals. We describe a heuristic based on a Bayesian approach to infer which of the received answers is most likely to be correct. The suggested answers and the reputation values of the sources themselves are used to determine the most likely answer. We have implemented the techniques and evaluated them in a prototype system using the Glomosim network simulator, and show that our scheme improves data accuracy in low trust environments.
منابع مشابه
ارائه چارچوبی برای سیستم مدیریت دانش در محیط رایانش ابری و وب 2.0
Today, data, information and knowledge are very important assets for the Organizations and the effective management of knowledge is considered a way to gain and sustain a competitive advantage in a highly dynamic environment of the organizations. With the growth of information and communication technologies, cloud computing and Web 2.0, as new Phenomena, recommend helpful solutions in the field...
متن کاملA Framework for Evaluating Cloud Computing User’s Satisfaction in Information Technology Management
Cloud computing is a new discussion in enterprise IT. It has already become popular in terms of distributed technology in some companies. It enables managers to setup and run the intended businesses by avoiding excessive spending on computers, software and hiring expert staff, which proves to be cost effective. Cloud computing also helps users pay for the IT services without spending massive am...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA review of methods for resource allocation and operational framework in cloud computing
The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008