• Title/Summary/Keyword: Pervasive Computing

Search Result 109, Processing Time 0.029 seconds

Vision and Research Challenges of the Next Generation Knowledge Management Systems : A Pervasive Computing Technology Perspective (편재형 컴퓨팅 기술을 적용한 차세대형 지식경영시스템의 비전과 연구 이슈)

  • Yoo, Keedong;Kwon, Ohbyung
    • Knowledge Management Research
    • /
    • v.10 no.1
    • /
    • pp.1-15
    • /
    • 2009
  • As pervasive computing technology, which aims to get linked to useful knowledge, information or services anytime, anywhere, using any devices and/or artifacts, is proliferating, desirable impacts on knowledge management systems are now available. The pervasive computing technology will potentially enable the knowledge management systems to realize individualization and socialization and ultimately increase the knowledge processing productivity. However, researchers who apply the pervasive computing methodologies to novel way of knowledge management have been very few. These result in unsatisfactory consideration of establishing pervasive knowledge management systems. Hence, the purpose of this paper is to cast the vision of pervasive knowledge management and search for a couple of possible research issues and possibilities. This paper suggests a framework of ubiDSS, an amended knowledge management system for the next generation deploying pervasive and autonomous knowledge acquisition capabilities of ubiquitous computing technologies. Also the CKAM, context-based knowledge acquisition module, is illustrated as a prototype of future knowledge management systems.

  • PDF

Authentication Mechanism for Pervasive Computing Environments (Pervasive Computing 환경을 위한 인증기법에 관한 연구)

  • 정철현;송주석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.35-38
    • /
    • 2002
  • 시대의 흐름에 따라 컴퓨팅 환경에서도 많은 변화가 이루어져 왔다. 이는 컴퓨팅 환경이 초기 독립적인 환경에서 네트워크를 이용한 분산환경으로, 이이서 무선통신을 이용한 이동통신으로 발전되어 왔음을 의미한다. 이에 따라, 언제/어디에서나 원하는 자원에 접근할 수 있는 환경이 제공되게 되었고, 이동성을 지원하는 Mobile IP, Ad Hoc 등의 개념에 의해 제한된 환경에서의 컴퓨팅이 아닌 이동이 가능한 환경에서의 컴퓨팅으로 확장되기에 이르렀다. 현재에 이르러서는 디바이스의 소형화를 통해 사용자의 이동성을 극대화시키는 개념인 “Pervasive Computing”에 대한 연구가 활발히 진행 중에 있다. 이러한 Pervasive 컴퓨팅 환경에서도 보안기능에 대한 기능이 최근 중요시되고 있다. 특히 pervasive computing 환경은 기존의 컴퓨팅 환경과는 차별화 되는 특징들을 내포하고 있기 때문에 상호 인증의 제공이 필요하다. 본 논문에서는 Pervasive Computing 환경에서 현재 진행중인 인증 기법에 대한 연구들을 알아본 후, 이러한 인증기법들의 취약점을 보완할 수 있는 상호 인증을 고려한 새로운 인증 기법을 제안하고자 한다.

  • PDF

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

  • Lim, Shin-Young;Chung, Lawrence;Helal, Sumi;Yang, Hen-I
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.9 no.3
    • /
    • pp.198-205
    • /
    • 2009
  • In this paper, design of framework architecture of pervasive computing system providing seamless inter space interactions between private and public smart spaces is presented. The seamless inter space interaction issues are related to establishing user's service environment by allocating relevant resources in a new location where there are no prior settings for the user or where there are current users already being served in the new location. In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other. As users move about, they will have to roam from private smart space to public smart space and vice versa. When they enter a new island of smart space, they will have to setup their devices and service manually to get the same or different services they had at the previous location. Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing. The framework architecture will provide seamless inter space interactions initiated by changes in users' location to acquire negotiations of resources for new and current residents regarding service provision with limited available networked devices.

Proactive Friend Recommendation Method using Social Network in Pervasive Computing Environment (퍼베이시브 컴퓨팅 환경에서 소셜네트워크를 이용한 프로액티브 친구 추천 기법)

  • Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.43-52
    • /
    • 2013
  • Pervasive computing and social network are good resources in recommendation method. Collaborative filtering is one of the most popular recommendation methods, but it has some limitations such as rating sparsity. Moreover, it does not consider social network in pervasive computing environment. We propose an effective proactive friend recommendation method using social network and contexts in pervasive computing environment. In collaborative filtering method, users need to rate sufficient number of items. However, many users don't rate items sufficiently, because the rating information must be manually input into system. We solve the rating sparsity problem in the collaboration filtering method by using contexts. Our method considers both a static and a dynamic friendship using contexts and social network. It makes more effective recommendation. This paper describes a new friend recommendation method and then presents a music friend scenario. Our work will help e-commerce recommendation system using collaborative filtering and friend recommendation applications in social network services.

Inter-space Interaction Issues Impacting Middleware Architecture of Ubiquitous Pervasive Computing

  • Lim, Shin-Young;Helal, Sumi
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.1
    • /
    • pp.42-51
    • /
    • 2008
  • We believe that smart spaces, offering pervasive services, will proliferate. However, at present, those islands of smart spaces should be joined seamlessly with each other. As users move about, they will have to roam from one autonomous smart space to another. When they move into the new island of smart space, they should setup their devices and service manually or not have access to the services available in their home spaces. Sometimes, there will conflicts between users when they try to occupy the same space or use a specific device at the same time. It will also be critical to elder people who suffer from Alzheimer or other cognitive impairments when they travel from their smart space to other visited spaces (e.g., grocery stores, museums). Furthermore our experience in building the Gator Tech Smart House reveals to us that home residents generally do not want to lose or be denied all the features or services they have come to expect simply because they move to a new smart space. The seamless inter-space interaction requirements and issues are raised automatically when the ubiquitous pervasive computing system tries to establish the user's service environment by allocating relevant resources after the user moves to a new location where there are no prior settings for the new environment. In this paper, we raise and present several critical inter-space interactions issues impacting middleware architecture design of ubiquitous pervasive computing. We propose requirements for resolving these issues on seamless inter-space operation. We also illustrate our approach and ideas via a service scenario moving around two smart spaces.

A Pervasive P3P Negotiation Mechanism for Robust Ubiquitous services

  • Kwon, Oh-Byung
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.411-416
    • /
    • 2007
  • Only a few P3P-based privacy aware systems address the discrepancy between a service provider's privacy policy and the user's typical concerns-hence, putting service usage at risk. Moreover, since users are typically nomadic in pervasive computing services, their specific privacy concerns would dynamically change according to the surrounding context. This leads us to develop a dynamically adjusting P3P-based policy for a personalized, privacy-aware service as a core element of secure pervasive computing. Hence, the purpose of this paper is to propose a pervasive P3P-based negotiation mechanism for privacy control which functions in a dynamic and flexible way.

  • PDF

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

A novel route restoring method upon geo-tagged photos

  • Wang, Guannan;Wang, Zhizhong;Zhu, Zhenmin;Wen, Saiping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1236-1251
    • /
    • 2013
  • Sharing geo-tagged photos has been a hot social activity in the daily life because these photos not only contain geo information but also indicate people's hobbies, intention and mobility patterns. However, the present raw geo-tagged photo routes cannot provide information as enough as complete GPS trajectories due to the defects hidden in them. This paper mainly aims at analyzing the large amounts of geo-tagged photos and proposing a novel travel route restoring method. In our approach we first propose an Interest Measure Ratio to rank the hot spots based on density-based spatial clustering arithmetic. Then we apply the Hidden Semi-Markov model and Mean Value method to demonstrate migration discipline in the hot spots and restore the significant region sequence into complete GPS trajectory. At the end of the paper, a novel experiment method is designed to demonstrate that the approach is feasible in restoring route, and there is a good performance.

Adaptive Advertisement for Resource Monitoring in Ad Hoc Pervasive Environment (애드 혹 퍼베이시브 환경에서 자원 모니터링을 위한 환경에 적응적인 광고 기법)

  • Kwak, Kyung-Man;Huerta-Canepa, Gonzalo;Lee, Dong-Man
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06d
    • /
    • pp.449-454
    • /
    • 2008
  • 최근의 개인 휴대 장치들의 급속한 발전에 힘입어 pervasive computing 환경은 인프라 시스템의 제약에서 벗어나 개인 장치들의 협력에 의해서 상황에 맞는 서비스를 제공 받을 수 있도록 변하고 있다. 하지만 이러한 ad hoc pervasive 환경은 기존의 스마트 스페이스에서 보다 동적인 변화가 더욱 많은 환경이기 때문에 pervasive computing을 위한 기능들 중에서도 자원 관리가 가장 중요한 역할을 해야 한다. Pervasive computing 환경에서 자원 관리는 자원 모니터링(Resource Monitoring), 자원 발견(Resource Discovery), 자원 할당(Resource Allocation), 자원 적응(Resource Adaptation)의 4가지의 주요 기능으로 구분 될 수 있고, 동적인 변화가 많은 환경에서는 무엇보다도 자원 모니터링이 가장 중요시 되어야 한다. 자원 모니터링에서 정보의 수집은 pull이나 push 방식으로 이루어질 수 있는데, pull 방식은 사용자 요구에 맞춰 요구 했을 때의 가장 최신의 정보를 모아 줄 수 있다. 따라서 이는 자원 발견에 가장 적합하지만 언제 정보 수집을 요청할지는 정보 소비자의 입장에서는 알 수 없기 때문에 push 방식이 다른 여러 기능들을 지원하기 위해서 보다 적절하다. 하지만 대부분의 push 방식은 주기적으로 자신의 정보를 광고하는 방식으로 이루어 진다. 하지만 상황 적응(adaptation)입장에서 봤을 때 특정 수준의 민첩성을 요구하기 위해서는 광고주기를 조절 해야 하고, 이때 필요 이상으로 네트워크의 사용량을 늘릴 수 있다. 뿐만 아니라 변화가 많은지 적은지 등의 각 단말의 상황은 무시된 채 모든 단말들이 동일한 주기로 정보를 광고한다. 이러한 문제점을 해결 하기 위해서 본 논문은 자원 정보 제공자의 상황을 고려한 자원 정보 광고 기법을 제안한다.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF