2. Pervasive computing (also called ubiquitous
computing) is the growing trend towards
embedding microprocessors in everyday
objects so they can communicate information.
The words pervasive and ubiquitous mean
"existing everywhere." Pervasive
computing devices are completely connected
and constantly available
3. At their core, all models of ubiquitous computing share a vision of small, inexpensive,
robust networked processing devices, distributed at all scales throughout everyday life
and generally turned to distinctly common-place ends. For example, a domestic
ubiquitous computing environment might interconnect lighting and environmental
controls with personal biometric monitors woven into clothing so that illumination and
heating conditions in a room might be modulated, continuously and imperceptibly.
Another common scenario posits refrigerators "aware" of their suitably tagged contents,
able to both plan a variety of menus from the food actually on hand, and warn users of
stale or spoiled food.
Ubiquitous computing presents challenges across computer science: in systems design
and engineering, in systems modeling, and in user interface design. Contemporary
human-computer interaction models
three basic forms for ubiquitous system devices (see also smart device): tabs, pads and
boards.
Tabs: wearable centimeter sized devices
Pads: hand-held decimeter-sized devices
Boards: meter sized interactive display devices.
4.
5. Manage information quickly, efficiently and
effortlessly
Smart Environments will be embedded with
computing technologies that will be mostly out-of-
sight
Removes complexity of new technologies
Convenient access to revlevant information stored
on networks, allowing them to easily take action
anywhere, anytime.
Environment will be supplemented with
interconned digital technologies. Interconnectivity
will eliminate mundane tasks
6. Pervasive Computing is not entirely secure.
Frequent line connections that are broken.
Slow connections.
Very expensive operating costs.
7. Privacy is already a concern with the WWW
Much more dramatic in ubiquitous computing
environment
Unlimited coverage (sensors everywhere)
Loss of awareness ( invisible computing)
New type of data (location, health, habits,….)
More Knowledge though context
Anonymity hard to achieve
Difficulty in explicit notice or consent by user
8. Privacy is greatly complicated by ubiquitous
computing.
Mechanisms such as location tracking, smart spaces,
and use of anathor monitor user actions on an
almost continuous basis.
As a user becomes more dependent on a ubiquitous
computing system, the system becomes more
knowledgeable about that user’s movements,
behavior patterns and habits.
9. Marc Langhenrich, “Privacy by Design:
principles of Privacy-Aware Ubiquitous
Systems,’’ in the proceding of Ubicomp 2001.
Notice
Adequate Security
Access and Resourse
10. The subject Whose information is collected
must be notified.
Environment where it is often difficult for data
subjects to realize that data collection is
actually taking place
Necessary to have not only mechanisms to
declare collection practices(i.e, privacy
politics),but also efficient ways to communiate
these to the user (i.e, ploicy announcement).
11. Needs to provide a way for users to access their
personal information in a simple way through
standardized interfaces(i.e., data access).
Users should be informed about the usage of
their data once it is stored, similar to call-lists
that are often part of monthly phone bills (i.e,
usage logs).
12. It is not necessary to increase the security level
to an extent when it is not worth the intrusion.
We need to employ robust security features
only in situation with highly sensitive data
transfer
Financial transaction
Transfer of medical informaton
13. Privacy is possible in ubiquitous
computing environment
Let people know about collections
Let people query, update, delete their own data
Let people know about each usage
Solutions need not be perfect to be useful
Trusting fair information practices
Trusting collectors to keep their promises
Trusting the legal system
14. Removal of wires in the networks computing
available to every where
Information can be accessed when and where it
is needed
But still privacy and security major drawbacks
of the ubiquitous computing.