• Nenhum resultado encontrado

Managing User Privacy in Ubiquitous Computing Applications

N/A
N/A
Protected

Academic year: 2017

Share "Managing User Privacy in Ubiquitous Computing Applications"

Copied!
5
0
0

Texto

(1)

MANAGING USER PRIVACY IN

UBIQUITOUS COMPUTING

APPLICATIONS

T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University,

Puducherry, India.

vengat.mailbox@gmail.com, dhavachelvan@gmail.com

A.RAMALINGAM

Department of MCA, Sri Manakula Vinayagar Engineering College, Puducherry, India

Ramalingam1972@gmail.com

R. BASKARAN

Department of Computer Science and Engineering, Anna University, Chennai, India.

baskaran.ramachandran@gmail.com

Abstract :

Ubiquitous computing applications occupied more research areas like medicine, banking and reporting applications that require user privacy. In this paper, privacy is detected as a set of parameters encapsulated in composite data entities called privons, through which, aim at infusing privacy into precision. The proposed scheme through real interaction in implementation of privons. The work implements as a privacy infusion into smart work place. Smart work place is designed for business. It allows managing an unlimited number of projects within an organization. Moreover, it offers a high level of flexibility when managing users, who have different access rights depending on the project. Access rights range from the basic read-only to the comprehensive full control level. We even extended this flexibility to projects: each project can have and individual structure and management style. The concept of privons as composite entity is introduced; comprising the privacy levels, date and services, developed for handling privacy for privacy management to reduce obtrusiveness privons is generated for all sessions that invoke transfer of information’s through these entities.

Keywords : Ubiquitous computing, Applications management, project management

1. Introduction

A The main objective is to develop a generic architecture for balancing the conflicting goals of privacy and traceability in Ubi-Comp settings. The key challenge is to design a framework capable of adapting to chaotic environment and integrate itself with the existing legacy systems. Protecting privacy of users in Ubiquous environment posses severe problems. Misuse of sensitive information collected and processed by sensors and a computer present in every aspect of life is a fundamental barrier to the acceptance of UbiComp. Once the personal data of a certain quality can be acquired, traceability is required. Users in the Ubiquos environment had problem to protect the sensitive data. It cause huge impact in the production they mainly concentrate to protect the data with their own customized way. Project member had huge problem to differentiate their working and non working hours. Their own third party had the huge problem to accessing their data.

Ubiquitous computing, in today’s world, usually implies embedding the technology unobtrusively within all manner of everyday computers or appliances that can potentially transmit and receive information among each other [1]. In light of these developments, it is complacent to assume that social and organizational controls over accessibility of personal information are sufficient [2], or that intrusions into privacy will ultimately become acceptable when traded against potential benefits [3], [4]. Such an assumption could leave individual users with a heavy burden of responsibility to ensure that they do not, even inadvertently, intrude on others. It also leaves them with limited control over their own privacy.

(2)

also imperative that users are made aware of the limitations and constraints of the system. For example, a kitchen system that helps a person maintain groceries in the house will have sensing limitations, which may be dynamic, based on sensors and situations. Effective use of this tool requires understanding what the sensing system missed so that a person can compensate. As ubicomp systems rely on implicit sensing that is naturally ambiguous or errorprone, designers must help users comprehend the limitations of the system [6]. A frequent definition of information privacy is “the claim of individuals, groups or institutions to determine for themselves when, how, and to what extent information about them is communicated to others” [7]. Despite this definition, “not sharing information” is a fundamental aspect of privacy. The real privacy concerns people have today revolves around who has access to what information rather than what information is collected [8]. The ethics of privacy can emanate from the fact that “knowledge is power”. It is essential to have fine-grained control over privacy-sensitive information.

One of the key concepts of ubiquitous computing is empowering technology to create a convenient environment surrounding the user which merges physical and computational infrastructures into an integrated information oriented habitat [9]. One of the challenges in deploying ubiquitous computing services on a significant scale is making adequate provision for handling personal privacy. The objectives of privacy and ubiquity are polar in nature. On the one hand, to ensure ubiquity, the applications are tuned to gather more information about the user to perform their tasks better. On the other hand, the more the application knows about the user, the greater is the threat to the user’s privacy [10]. To develop a scheme that infuses privacy and the context of an event in the middleware of the ubiquitous computing framework is a significant challenge.s.

2. System Overview

Architecture is developed that allows user to customize Privacy. This architecture, shown in figure 1, requires appropriate protection mechanisms for the collection, access, usage and dissemination of personal data considering transparency and usability issues. The users are concerned to actually exercise the control on privacy. It is important to determine, in which situations the privacy need to be balanced, and therefore which parties may be allowed to exercise control on this balance.

(3)

The part of each and every module plays a vital role in the implementation of the work and it is explained here briefly.

2.1.Package Used

 System – Contains all of the classes for creating user interfaces and for painting graphics and images. It is a powerful header file as far as the .net framework is concerned.

 System.Drawing - Contains all of the classes for creating user interfaces and for painting graphics and images. A user interface object such as a button or a scrollbar is called, in system.drawing terminology, a component. The system.drawing package contains several layout manager classes and an interface for building your own layout manager.

 System.Data - Contains all the things needed for the database access from the .net applications. When this package is imported it supports the overall database support.

 System.Data.Oledb – Contains all the things which are required for the Open Linking and Embedding Data Base.

2.2. Module Description

Employees can submit their timesheet when they believe that the time is complete and correct. And also they submit the activities sheet with respect to the timesheet. Every employees fills out his/her time sheet on a weekly basis. When time sheets are completed, users can send an approval request to their Project Manager. Project Managers can then approve or reject time sheets. When time sheets are approved, Project Manager can see how much time each employee has spent on each project. This allows adapting the system’s behavior accordingly. Especially, the tasks of this component are filtering and aggregation of time tracking data, classification and anonymization of personal data. This way higher level context is generated and provided in several levels of granularity .Time tracking data and context that was acquired and processed is stored, temporarily or permanently.

It is assumed that each user is equipped with a personal trusted device ,a so called Minimal Entity(ME).The ME provides the main interface between the user and the environment .It allows a user to configure privacy and traceability preferences, to use pseudonyms, enables non-repudiation via digital signatures, provides configuration support and feedback mechanisms to the user about his current level of privacy. The transparency management component audits and documents any access to personal data in an accountable manner. It is a necessary component for traceability and privacy protection systems .parties and services that are allowed to access private data in specified cases should not routinely abuse this ability.

Fig. 2. Login with their respective role

(4)

component, and in its interplay with the identity management. Once access to sensitive data is granted to a third party or service, its further distribution needs to be controlled. Therefore, the proposed system devises a virtual environment component. It provides information flow control using trusted computing, thus uncontrollable profiling and linking of digital data is prevented.

Fig. 3. To view the various report in the organization

When implementing software, the correct implementation is more important than the software itself. This requires effective planning and efficient implementation. Implementation is a stage of project where theoretical design is turned into a working system. It involves careful planning, investigation of current system and its constraints on implementation, design of methods to achieve the changeover. It provides the detailed description about the implementation procedure and the deployment of the system.

3 Conclusions

Interpreting privacy is more of a fluid and malleable concept rather than a strict set of rules. To process the abstract nature of personal privacy and convert it into tangible issues, a ubiquitous computing framework encompassing privacy infusions essential. The user can also view the data currently designated as transparent, protected, and private and make modifications if necessary. The system implemented with a light-weight version of Precision for smart phones and ported our privacy infusion scheme onto these devices. This work is a part of the work on Precision, our system for Privacy Enhanced Context-aware Information Infusion in ubiquitous computing environments. In this work, The system implemented with an innovative scheme to infuse privacy into context aware information through composite entities of data, services, and privacy, called privons. As the Future work of this work the generated privons can be checked for authorization constraints help the policy architect design and express higher level organizational rules. The future work will be concentrated both non-temporal and history-based authorization constraints with the use of Object Constraint Language (OCL) and first-order Linear Temporal Logic (LTL).

References

[1] Mark Weiser, The future of ubiquitous computing on campus, Communications of the ACM, vol. 41, No. 1, Page(s):41–42, 1998.

[2] Radenkovic, M., and Lodge, T., Engaging the public through mass-scale multimedia networks, IEEE Journal of Multimedia, Volume

13, Issue 3, Page(s):12 – 15, July – Sept. 2006.

[3] Bell, G., Auspicious computing?, IEEE Journal of Internet Computing, Volume 8, Issue 2, March-April 2004, Page(s):83 – 85.

[4] Yong Liu, Connelly, K., SmartContacts: a large scale social context service discovery system, Fourth Annual IEEE International

Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2006, Page(s):388 – 392, 2006.

[5] Storz, O., Friday, A., Davies, N., Finney, J., Sas, C., and Sheridan, J., Public Ubiquitous Computing Systems: Lessons from the

e-Campus Display Deployments, IEEE Journal of Pervasive Computing, Volume 5, Issue 3, Page(s):40 – 47, July – Sept, 2006.

[6] Huang, E.M., Mynatt, E.D., Russell, D.M., and Sue, A.E., Secrets to success and fatal flaws: the design of large-display groupware,

(5)

[7] Westin, A., Privacy and Freedom, Atheneum, New York, 1967.

[8] Murakami, Y., Legal issues for realizing ubiquitous information society, SICE 2004 Annual Conference Volume 2, Page(s):1751 –

1755, 2004.

[9] Khedo, K.K., Context-Aware Systems for Mobile and Ubiquitous Networks, Proceedings of the International Conference on

Networking, International Conference on Systems and International Conference on Mobile Communications and Learning

Imagem

Fig. 2. Login with their respective role
Fig. 3. To view the various report in the organization

Referências

Documentos relacionados

Esta instituição tem capacidade para cinquenta crianças com idades compreendidas entre os três e os cinco / seis anos de idade e dá dois tipos de respostas aos seus utentes: a

A avaliação da função renal e hepática não foi realizada em 30% dos casos e 60% receberam prescrições nas quais foram evidenciadas interações medicamentosas em potencial..

Apesar de todas as dificuldades que enfrentamos lendo em posição de escuta, essas memórias das professoras-participantes, tanto daquelas que sentiram dificuldades em se lembrar,

A visão atual de uma possível unidade do conhe- cimento funciona mais como uma alusão, por analogia, à idéia de refundir o que está disperso. Esta idéia está ainda nos preliminares

São referenciados para o HMH os pacientes provenientes dos centros mais proximos, como o Hospital de reabilitação da Bomba Baixa que dista do HMH 5 quilometros, dos centros

Objectivos: Avaliar a composição corporal de crianças e adolescentes com diagnóstico deficiência primária da hormona de crescimento e com tratamento (Grupo 1).. Avaliar com

Verifica-se portanto, que a percentagem de docentes e funcionários que, consideram que não ou não sabem, se existe uma cultura estratégica, é demasiado elevada para uma

A revisão integrativa da literatura permitiu concluirmos que embora algumas ações tenham sido desenvolvidas com a finalidade de melhorar a cobertura vacinal e o