security in pervasive computing environments

27

Upload: dan-bourke

Post on 01-Jul-2015

409 views

Category:

Technology


2 download

DESCRIPTION

a brief presentation on several approaches to managing security in pervasive computing environments. Won\'t make any damn sense without my notes, which are: not attached

TRANSCRIPT

Page 1: Security in Pervasive Computing Environments
Page 2: Security in Pervasive Computing Environments
Page 3: Security in Pervasive Computing Environments

Bruce Sterling, When Blobjects Rule The Earth, SIGGRAPH, Los Angeles, 2004

retreived 18/08/08, from http://www.viridiandesign.org/notes/401-450/00422_the_spime.html

Page 4: Security in Pervasive Computing Environments
Page 5: Security in Pervasive Computing Environments

So, how do you deal with privacy concerns in a pervasive computing environment?

Page 6: Security in Pervasive Computing Environments

The Virtual Wall model

Page 7: Security in Pervasive Computing Environments

Virtual Walls: Protecting Digital Privacy in Pervasive Environments

A. Kapadia, T. Henderson, J.J. Fielding & David KotzProceedings of the 5th International Conference on Pervasive Computing, number 4480 in LNCS, pages 162-

179, Toronto, Canada, May 2007. Springer-Verlag.

Page 8: Security in Pervasive Computing Environments
Page 9: Security in Pervasive Computing Environments

Most people can use this system!The system works, in the context it was created

Page 10: Security in Pervasive Computing Environments

But there are some problems!

Page 11: Security in Pervasive Computing Environments

Detail

Page 12: Security in Pervasive Computing Environments

Complexity

Page 13: Security in Pervasive Computing Environments

Limited Application

Page 14: Security in Pervasive Computing Environments

Interrupting User

Page 15: Security in Pervasive Computing Environments

Though the traces are not stored for long, they are centrally administered. This brings back Big Brother

fears!

Also, users actively dislike the idea of systems 'following them around', especially if they could be

compromised.

Page 16: Security in Pervasive Computing Environments

The Place Lab Challenge

✗ A challenge paper to the academic community✗ brief overview of a location-aware network✗ implementation and maintenance schemes✗ security discussion

Page 17: Security in Pervasive Computing Environments

Challenge: Ubiquitous Location-Aware Computing and the Place Lab Initiative.

B.N. Schilit, A. LaMarca, G. Borriello, W.G. Griswold, D.McDonald, E. Lazowska, A. Balachandran, J.I. Hong, & V. Iverson,

Proceedings of the ACM International Workshop on Wireless Mobile Applications and Services on WLAN (WMASH 2003), 29-35.

Page 18: Security in Pervasive Computing Environments

Client-end location determination!

Page 19: Security in Pervasive Computing Environments

Per-use/per-application privacy selectors

Page 20: Security in Pervasive Computing Environments

Fine-grained privacy levels

Page 21: Security in Pervasive Computing Environments

On the other hand, you need access to a (possibly quite large) database, in order to use the service.

Page 22: Security in Pervasive Computing Environments

There are also potential problems with Access Points which physically move.

Page 23: Security in Pervasive Computing Environments

Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in

location-based applicationsK. P. Tang, P. Keyani, J. Fogarty & J. I. Hong

Proceedings of the SIGCHI conference on Human Factors in computing systems, pages 93-102, Montréal, Québec, Canada, 2006

Page 24: Security in Pervasive Computing Environments
Page 25: Security in Pervasive Computing Environments

Location-centric data

Page 26: Security in Pervasive Computing Environments

Client-side computing

Page 27: Security in Pervasive Computing Environments

Ground-up security/privacy