• Title/Summary/Keyword: Context-aware Computing

Search Result 293, Processing Time 0.03 seconds

A Context Model Comparison Methodology for Developing Generic Context Model used in Ubiquitous Multi-Services (유비쿼터스 멀티 서비스 개발에서의 일반적 상황모형 구축을 위한 상황모형 비교 평가방법론)

  • Park, Tae-Hwan;Kwon, Oh-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.1
    • /
    • pp.29-47
    • /
    • 2007
  • Acquiring context data in a timely and correct way is now regarded as one of the crucial characteristics of the proactive service which runs on ubiquitous computing environment. Moreover, context model should be well designed to provide a solid context-aware system. Since the ubiquitous computing systems aim to provide context-aware services everywhere with any available devices, legacy services which uses context models assuming single or limited domain should be extended enough to be useful even for multi-domain muli-services. This leads us to a motivation to build a generic context model with an appropriate type of model. Hence, the purpose of this paper is to propose a generic context model by assessing a variety of model types with a sort of evaluation measures.

  • PDF

Middleware for Context-Aware Ubiquitous Computing

  • Hung Q.;Sungyoung
    • Korea Information Processing Society Review
    • /
    • v.11 no.6
    • /
    • pp.56-75
    • /
    • 2004
  • In this article we address some system characteristics and challenging issues in developing Context-aware Middleware for Ubiquitous Computing. The functionalities of a Context-aware Middleware includes gathering context data from hardware/software sensors, reasoning and inferring high-level context data, and disseminating/delivering appropriate context data to interested applications/services. The Middleware should facilitate the query, aggregation, and discovery for the contexts, as well as facilities to specify their privacy policy. Following a formal context model using ontology would enable syntactic and semantic interoperability, and knowledge sharing between different domains. Moddleware should also provide different kinds of context classification mechanical as pluggable modules, including rules written in different types of logic (first order logic, description logic, temporal/spatial logic, fuzzy logic, etc.) as well as machine-learning mechanical (supervised and unsupervised classifiers). Different mechanisms have different power, expressiveness and decidability properties, and system developers can choose the appropriate mechanism that best meets the reasoning requirements of each context. And finally, to promote the context-trigger actions in application level, it is important to provide a uniform and platform-independent interface for applications to express their need for different context data without knowing how that data is acquired. The action could involve adapting to the new environment, notifying the user, communicating with another device to exchange information, or performing any other task.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Context-Aware Cooperative Query for u-Shopping Systems (u-쇼핑 시스템을 위한 상황인식적이고 협력적인 질의 시스템 개발)

  • Kwon, Ohbyung;Shin, Myung Keun
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.4
    • /
    • pp.61-72
    • /
    • 2006
  • Ubiquitous computing technologies become mature enough to be applied in acceptable ubiquitous services. In particular, in u-shopping area, personalized recommender systems which automatically collect the nomadic user-related context data and then provide them with products or shops in a flexible manner. However, legacy cooperative queries and context-aware queries so far do not come up with dynamically changing situations and ambiguous query commands, respectively. Hence, The purpose of this paper is to propose a personalized context-aware cooperative query that supports a multi-level data abstraction hierarchy and conceptual distance metric among node instances, while considering the user's context data. To show the feasibility of the methodology proposed in this paper, we have implemented a prototype system, CACO, in the area of site search in a large-scale shopping mall.

  • PDF

Design of Context-Aware Middleware in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 상황인식 미들웨어 설계)

  • Kim Hyo-Nam;Park Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.115-122
    • /
    • 2005
  • W These days, Ubiquitous is coming a more popular tool in mass communications and in advanced countries ubiquitous computing is commercialized. In Korea, we have studied the business models of the ubiquitous computing generation as well. Ubiquitous computing is the environment in which humans and computers coexist and properly work together. I would like to present a service infrastructure for a more efficient context-awareness than computing home networking system in this monograph. In the mean time, they have focused the context-awareness system on identifying users in the designated space and recognition. But I would like to focus on the middleware system structure for more efficient recognition.

  • PDF

A Study on Architecture of Access Control System with Enforced Security Control for Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경을 위한 보안통제가 강화된 접근제어 시스템 설계에 관한 연구)

  • Eom, Jung-Ho;Park, Seon-Ho;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.71-81
    • /
    • 2008
  • In the paper, we designed a context aware task-role based access control system(CAT-RACS) which can control access and prevent illegal access efficiently for various information systems in ubiquitous computing environment. CAT-RACS applied CA-TRBAC, which adds context-role concept for achieve policy composition by context information and security level attribute to be kept confidentiality of information. CA-TRBAC doesn't permit access when context isn't coincident with access control conditions, or role and task's security level aren't accord with object's security level or their level is a lower level, even if user's role and task are coincident with access control conditions. It provides security services of user authentication and access control, etc. by a context-aware security manager, and provides context-aware security services and manages context information needed in security policy configuration by a context information fusion manager. Also, it manages CA-TRBAC policy, user authentication policy, and security domain management policy by a security policy manager.

A Multi-Agent Approach to Context-Aware Optimization for Personalized Mobile Web Service (상황인지 기반 최적화가 가능한 개인화된 모바일 웹서비스 구축을 위한 다중에이전트 접근법에 관한 연구)

  • Kwon Oh-byung;Lee Ju-chul
    • Korean Management Science Review
    • /
    • v.21 no.3
    • /
    • pp.23-38
    • /
    • 2004
  • Recently the usage of mobile devices which enable the accessibility to Internet has been dramatically increased. Most of the mobile services, however, so far tend to be simple such as infotainment service. In order to fully taking advantage of wireless network and corresponding technology, personalized web service based on user's context could be needed. Meanwhile, optimization techniques have been vitally incorporated for optimizing the development and administration of electronic commerce. However, applying context-aware optimization mechanism to personalized mobile services is still very few. Hence, the purpose of this paper is to propose a methodology to incorporate optimization techniques into personalization services. Multi agent-based web service approach is considered to realize the methodology. To show the feasibility of the methodology proposed in this paper, a prototype system, CAMA-myOPt(Context-Aware Multi-Agent system for my Optimization), was implemented and adopted in mobile comparative shopping.

Context-Aware Security System for Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 상황인식 보안 시스템)

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.19-27
    • /
    • 2010
  • Many security issues occur in cloud computing service environment such as authentication, access control, and so on. In this paper, we propose an effective authentication and access control model which provide integrated management and control when we access various resources in cloud computing environment. To address these problems, we suggest a context-aware single sign-on and access control system using context-awareness, integrated authentication, access control, and OSGi service platform in cloud computing environment. And we show design and implementation of context-aware single sign-on and access control system. Also we verified the flexibility and convenience of the proposed system through multi fact based integrated authentication in cloud computing environment. We could provide flexible and secure seamless security service by user context in cloud computing environment.

Intelligent TV Recommendation Service Agent Using CAMUS Context-Aware Middleware (CAMUS 상황인식 미들웨어를 이용한 지능형 TV 추천 서비스 에이전트)

  • Moon, Ae-Kyung;Kim, Hyun;Lee, Seong-Jin;Lee, Soo-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.299-304
    • /
    • 2006
  • 기존에 개발된 사용자 선호 정보를 이용한 TV 추천 시스템은 대부분 사용자의 명시적인 요구에 따라 방송 프로그램을 추천하는 데 중점을 두고 개발되었다. 하지만, 유비쿼터스 환경이 도래함에 따라서 사용자의 요구에 따라 반응하는 수동적인 서비스 보다는 상황정보(Context)를 활용하여 능동적인 서비스를 지원할 수 있는 기술이 필요하다. 따라서 본 논문에서는 CAMUS(Context-Aware Middleware for URC Systems) 상황인식 미들웨어를 이용하여 사용자 위치 상황정보에 따라 능동적으로 추천할 수 있는 TV 추천 서비스 에이전트를 제안한다. 제안된 시스템은 CAMUS 기반 서비스 에이전트와 태스크를 구현함으로써, 상황정보에 따라 능동적으로 다채널에서 방송되는 프로그램 및 사용자의 선호도 정보를 분석하여 사용자가 원하는 프로그램을 추천한다.

  • PDF

Design and Implementation of Context-Aware Computing System based on UPnP Sensor Network (UPnP 센서네트워크 기반 상황인식 시스템의 설계 및 구현)

  • Kim, Jong-Pan;Oh, Am-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.185-193
    • /
    • 2010
  • In this paper, we Provide context-aware services based on UPnP Device Module including sensor unit in existing PLC network without additional infrastructure. so existing PLC devices are controlled based on knowledge context and can be used in a ubiquitous environment. And efficient remote control and device management based on UPnP can also be provided.