Structured Analysis of Security in Ubiquitous Computing
نویسندگان
چکیده
This paper is aimed at presenting a detailed structured analysis of security for UbiComp Systems. UbiComp aims at embedding computational devices in everyday artifacts; elements of “real-world” security are therefore evaluated. A classification of security attacks is proposed, comparing and contrasting them with those popularized in the classical security paradigm. Challenges associated with securing “context” as well as exploiting it in security solutions are discussed. We then separate different areas of concern for UbiComp security, with an evaluation of existing technologies and work in progress.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملSecurity and Trust in Mobile Interactions: A Study of Users' Perceptions and Reasoning
This paper describes an investigation into the trust and security concerns of users who carry out interactions in ubiquitous and mobile computing environments. The study involved demonstrating an “electronic wallet” to pay for a meal in a simulated restaurant, and analyzing subjects’ responses based on structured interviews. We asked the users to rank-order five payment methods including three ...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کامل