SlideShare a Scribd company logo
1 of 16
PRESENTED BY:
HATUM HUSSAIN Mirjat
 Pervasive computing (also called ubiquitous
computing) is the growing trend towards
embedding microprocessors in everyday
objects so they can communicate information.
The words pervasive and ubiquitous mean
"existing everywhere." Pervasive
computing devices are completely connected
and constantly available
 At their core, all models of ubiquitous computing share a vision of small, inexpensive,
robust networked processing devices, distributed at all scales throughout everyday life
and generally turned to distinctly common-place ends. For example, a domestic
ubiquitous computing environment might interconnect lighting and environmental
controls with personal biometric monitors woven into clothing so that illumination and
heating conditions in a room might be modulated, continuously and imperceptibly.
Another common scenario posits refrigerators "aware" of their suitably tagged contents,
able to both plan a variety of menus from the food actually on hand, and warn users of
stale or spoiled food.
 Ubiquitous computing presents challenges across computer science: in systems design
and engineering, in systems modeling, and in user interface design. Contemporary
human-computer interaction models
 three basic forms for ubiquitous system devices (see also smart device): tabs, pads and
boards.
 Tabs: wearable centimeter sized devices
 Pads: hand-held decimeter-sized devices
 Boards: meter sized interactive display devices.
 Manage information quickly, efficiently and
effortlessly
 Smart Environments will be embedded with
computing technologies that will be mostly out-of-
sight
 Removes complexity of new technologies
 Convenient access to revlevant information stored
on networks, allowing them to easily take action
anywhere, anytime.
 Environment will be supplemented with
interconned digital technologies. Interconnectivity
will eliminate mundane tasks
 Pervasive Computing is not entirely secure.
 Frequent line connections that are broken.
 Slow connections.
 Very expensive operating costs.
 Privacy is already a concern with the WWW
 Much more dramatic in ubiquitous computing
environment
 Unlimited coverage (sensors everywhere)
 Loss of awareness ( invisible computing)
 New type of data (location, health, habits,….)
 More Knowledge though context
 Anonymity hard to achieve
 Difficulty in explicit notice or consent by user
 Privacy is greatly complicated by ubiquitous
computing.
 Mechanisms such as location tracking, smart spaces,
and use of anathor monitor user actions on an
almost continuous basis.
 As a user becomes more dependent on a ubiquitous
computing system, the system becomes more
knowledgeable about that user’s movements,
behavior patterns and habits.
 Marc Langhenrich, “Privacy by Design:
principles of Privacy-Aware Ubiquitous
Systems,’’ in the proceding of Ubicomp 2001.
 Notice
 Adequate Security
 Access and Resourse
 The subject Whose information is collected
must be notified.
 Environment where it is often difficult for data
subjects to realize that data collection is
actually taking place
 Necessary to have not only mechanisms to
declare collection practices(i.e, privacy
politics),but also efficient ways to communiate
these to the user (i.e, ploicy announcement).
 Needs to provide a way for users to access their
personal information in a simple way through
standardized interfaces(i.e., data access).
 Users should be informed about the usage of
their data once it is stored, similar to call-lists
that are often part of monthly phone bills (i.e,
usage logs).
 It is not necessary to increase the security level
to an extent when it is not worth the intrusion.
 We need to employ robust security features
only in situation with highly sensitive data
transfer
 Financial transaction
 Transfer of medical informaton
 Privacy is possible in ubiquitous
computing environment
 Let people know about collections
 Let people query, update, delete their own data
 Let people know about each usage
 Solutions need not be perfect to be useful
 Trusting fair information practices
 Trusting collectors to keep their promises
 Trusting the legal system
 Removal of wires in the networks computing
available to every where
 Information can be accessed when and where it
is needed
 But still privacy and security major drawbacks
of the ubiquitous computing.
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy

More Related Content

What's hot

Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pravallika Reddy
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesRaquel Salcedo Gomes
 
pervasive computing
pervasive computingpervasive computing
pervasive computingSweety Singh
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingKelly Zhang
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingOMAN1991
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItRob Manson
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challengesiosrjce
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computinglogus2k
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computingsemicircle
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Argus Labs
 

What's hot (20)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Pervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & ChallengesPervasive Computing Applications And Its Security Issues & Challenges
Pervasive Computing Applications And Its Security Issues & Challenges
 
Context-Aware Computing
Context-Aware ComputingContext-Aware Computing
Context-Aware Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
Digital Marketing First 2014 - Context Aware Computing and Cross Channel Pers...
 

Viewers also liked

Letter of Appreciation
Letter of AppreciationLetter of Appreciation
Letter of AppreciationStefan Angelov
 
Office Depot - Oct 2008
Office Depot - Oct 2008Office Depot - Oct 2008
Office Depot - Oct 2008Heather Ingram
 
Rebranding thinkThin
Rebranding thinkThinRebranding thinkThin
Rebranding thinkThinAmanda Lopez
 
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"Алексей Солнцев "Компетенции IT-специалиста XXI столетия"
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"DataArt
 
GLPCAwards2015-KonradRzadzinski
GLPCAwards2015-KonradRzadzinskiGLPCAwards2015-KonradRzadzinski
GLPCAwards2015-KonradRzadzinskiKonrad Rzadzinski
 
Артикуляционная гимнастика. Советы родителям
Артикуляционная гимнастика. Советы родителямАртикуляционная гимнастика. Советы родителям
Артикуляционная гимнастика. Советы родителямir_556
 
презентация
презентация презентация
презентация olga080974
 
Demographics and target audience
Demographics and target audienceDemographics and target audience
Demographics and target audiencetomball2211
 
Retail Management by devesh bagga v1.0
Retail Management by devesh bagga v1.0Retail Management by devesh bagga v1.0
Retail Management by devesh bagga v1.0Devesh Bagga
 

Viewers also liked (14)

Tugas4 gerian[2]
Tugas4 gerian[2]Tugas4 gerian[2]
Tugas4 gerian[2]
 
Letter of Appreciation
Letter of AppreciationLetter of Appreciation
Letter of Appreciation
 
Office Depot - Oct 2008
Office Depot - Oct 2008Office Depot - Oct 2008
Office Depot - Oct 2008
 
Office Max - Nov 2008
Office Max - Nov 2008Office Max - Nov 2008
Office Max - Nov 2008
 
Rebranding thinkThin
Rebranding thinkThinRebranding thinkThin
Rebranding thinkThin
 
Doc17
Doc17Doc17
Doc17
 
Sam.Emeney
Sam.EmeneySam.Emeney
Sam.Emeney
 
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"Алексей Солнцев "Компетенции IT-специалиста XXI столетия"
Алексей Солнцев "Компетенции IT-специалиста XXI столетия"
 
GLPCAwards2015-KonradRzadzinski
GLPCAwards2015-KonradRzadzinskiGLPCAwards2015-KonradRzadzinski
GLPCAwards2015-KonradRzadzinski
 
Артикуляционная гимнастика. Советы родителям
Артикуляционная гимнастика. Советы родителямАртикуляционная гимнастика. Советы родителям
Артикуляционная гимнастика. Советы родителям
 
презентация
презентация презентация
презентация
 
Demographics and target audience
Demographics and target audienceDemographics and target audience
Demographics and target audience
 
Robert Burks
Robert BurksRobert Burks
Robert Burks
 
Retail Management by devesh bagga v1.0
Retail Management by devesh bagga v1.0Retail Management by devesh bagga v1.0
Retail Management by devesh bagga v1.0
 

Similar to Ubiquitous computing-and-its-privacy

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceBRNSSPublicationHubI
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing Govind Raj
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegenceLovely Singla
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPallav Kumar
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing cocarmanl5wisc
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstractPriti Punia
 

Similar to Ubiquitous computing-and-its-privacy (20)

Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
O017328693
O017328693O017328693
O017328693
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ambient Intelligence Ambient Intelligence
Ambient Intelligence Ambient IntelligenceAmbient Intelligence Ambient Intelligence
Ambient Intelligence Ambient Intelligence
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadaditya806802
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 

Recently uploaded (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
home automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasadhome automation using Arduino by Aditya Prasad
home automation using Arduino by Aditya Prasad
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 

Ubiquitous computing-and-its-privacy

  • 2.  Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available
  • 3.  At their core, all models of ubiquitous computing share a vision of small, inexpensive, robust networked processing devices, distributed at all scales throughout everyday life and generally turned to distinctly common-place ends. For example, a domestic ubiquitous computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly. Another common scenario posits refrigerators "aware" of their suitably tagged contents, able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food.  Ubiquitous computing presents challenges across computer science: in systems design and engineering, in systems modeling, and in user interface design. Contemporary human-computer interaction models  three basic forms for ubiquitous system devices (see also smart device): tabs, pads and boards.  Tabs: wearable centimeter sized devices  Pads: hand-held decimeter-sized devices  Boards: meter sized interactive display devices.
  • 4.
  • 5.  Manage information quickly, efficiently and effortlessly  Smart Environments will be embedded with computing technologies that will be mostly out-of- sight  Removes complexity of new technologies  Convenient access to revlevant information stored on networks, allowing them to easily take action anywhere, anytime.  Environment will be supplemented with interconned digital technologies. Interconnectivity will eliminate mundane tasks
  • 6.  Pervasive Computing is not entirely secure.  Frequent line connections that are broken.  Slow connections.  Very expensive operating costs.
  • 7.  Privacy is already a concern with the WWW  Much more dramatic in ubiquitous computing environment  Unlimited coverage (sensors everywhere)  Loss of awareness ( invisible computing)  New type of data (location, health, habits,….)  More Knowledge though context  Anonymity hard to achieve  Difficulty in explicit notice or consent by user
  • 8.  Privacy is greatly complicated by ubiquitous computing.  Mechanisms such as location tracking, smart spaces, and use of anathor monitor user actions on an almost continuous basis.  As a user becomes more dependent on a ubiquitous computing system, the system becomes more knowledgeable about that user’s movements, behavior patterns and habits.
  • 9.  Marc Langhenrich, “Privacy by Design: principles of Privacy-Aware Ubiquitous Systems,’’ in the proceding of Ubicomp 2001.  Notice  Adequate Security  Access and Resourse
  • 10.  The subject Whose information is collected must be notified.  Environment where it is often difficult for data subjects to realize that data collection is actually taking place  Necessary to have not only mechanisms to declare collection practices(i.e, privacy politics),but also efficient ways to communiate these to the user (i.e, ploicy announcement).
  • 11.  Needs to provide a way for users to access their personal information in a simple way through standardized interfaces(i.e., data access).  Users should be informed about the usage of their data once it is stored, similar to call-lists that are often part of monthly phone bills (i.e, usage logs).
  • 12.  It is not necessary to increase the security level to an extent when it is not worth the intrusion.  We need to employ robust security features only in situation with highly sensitive data transfer  Financial transaction  Transfer of medical informaton
  • 13.  Privacy is possible in ubiquitous computing environment  Let people know about collections  Let people query, update, delete their own data  Let people know about each usage  Solutions need not be perfect to be useful  Trusting fair information practices  Trusting collectors to keep their promises  Trusting the legal system
  • 14.  Removal of wires in the networks computing available to every where  Information can be accessed when and where it is needed  But still privacy and security major drawbacks of the ubiquitous computing.