VIEWS: 11 PAGES: 16 POSTED ON: 7/5/2011
Security and Privacy in Ubiquitous Computing Agenda Project issues? Ubicomp quick overview Privacy and security discussion David Nguyen – guest student More discussion Course surveys Ubiquitous Computing (Ubicomp) Move beyond desktop machine Computing is embedded everywhere in the environment Known by many things… – “off the desktop”, “out of the box”, pervasive, invisible, wearable, calm, anytime/anywhere/any place, … Marc Weiser: The father of ubicomp Chief Technologist Xerox PARC Began Ubiquitous Computing Project in 1988 1991 Scientific American article got the ball rolling Key quotes: “The most profound technologies are those that disappear” “embodied virtuality" Ubicomp Notions Computing capabilities, any time, any place “Invisible” resources Machines sense users’ presence and act accordingly Ubicomp is ... Related to: – mobile computing – wearable computing – augmented reality In contrast with: – virtual reality Some scenarios – the office Smart meeting room – Automatically adjusts room conditions – automatically links the devices everyone is using to each other and the display so people can easily push and pull information – Shares needed info with remote participants – Automatically creates a meeting record for everyone there, stores it properly, etc… Some scenarios – the home Rooms adjust to people and activities – turn on lights, don’t bother family during dinner, etc... Reminds or alerts people of activities (soccer game at 7), problems (heater malfunctioning), needs (out of milk) Records family memories – first steps, Christmas… Helps communicate and connect with outside family members – shared audio / video / photos / message boards, etc. Locates your keys, favorite sweater, that important document Monitors your health and alerts to problems Some scenarios – in the world Easily find your way around and to desired places, stores and tourist sites Get information relevant to where you are and what you are doing Access your personal information, check email, check on your house, from your mobile device no matter where you are Let friends and family check on you and know what’s going on and where you are Meet and socialize with new people and old friends Play games in the environment Technology Many scenarios require knowing a subset of the following: – who the user is – where the user is located – where various objects are located – the conditions in the environment – Infer what people are doing and want to do Using a variety of sensors, networking infrastructures, middleware, distributed software systems And a variety of input and output devices General questions What are security implications for Ubicomp? How does this differ from what we’ve talked about so far? What are privacy implications and how does this differ? What should we be doing now to prepare for Ubicomp apps? Tradeoffs Are we better with or without lots of privacy in this new world? (benefits outweigh negatives) Examples: – Your car monitors how safely you drive, insurance companies adjust rates accordingly. What if the end effect is lowering accident rates? – You have several applications that help persuade you to get more exercise and be healthier, monitored by your doctor. Your insurance rates are lowered if you are successful. – Your home can easily record and organize hard-to-get moments, like your child’s first steps and first words. But your spouse can also use this to replay your exact words in that argument last night. Privacy by design Notice: How invisible should protections be? Consent: How can explicit consent be achieved? What requires it? Anonymity: can we achieve anonymity? When should we still remain anonymous? From whom? Proximity: how can this be used for security and privacy? Big Stick What is the Big Stick principle? Why is this relevant to Ubicomp? In what scenarios is this sufficient? In what scenarios is this not sufficient? Case study: RFID Radio Frequency Identification – Tags on objects with unique ID, readers provide power, work from some distance away Where is it being used now? What are the security issues? What are the privacy issues? What are potential solutions?
Pages to are hidden for
"Ubicomp"Please download to view full document