Reference: [1] TeamSpace paper

Slides:



Advertisements
Similar presentations
DISTRIBUTED COMPUTING PARADIGMS
Advertisements

Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Secure Mobile IP Communication
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
ASNA Architecture and Services of Network Applications Research overview and opportunities L. Ferreira Pires.
Quality of Service in IN-home digital networks Alina Albu 7 November 2003.
Extending Instant Messaging to Provide Pervasive Personal Communication Wei Li, Fredrik Kilander and Carl Gustaf Jansson {liwei, fk, Department.
PhD course - Milan, March /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science.
Chapter 6 SECURE WIRELESS PERSONAL NETWORKS: HOME EXTENDED TO ANYWHERE.
Component Based Systems Analysis Introduction. Why Components? t Development alternatives: –In-house software –Standard packages –Components 60% of the.
Master Course /06/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
What is adaptive web technology?  There is an increasingly large demand for software systems which are able to operate effectively in dynamic environments.
Client-Server Computing in Mobile Environments
Cellular IP: Proxy Service Reference: “Incorporating proxy services into wide area cellular IP networks”; Zhimei Jiang; Li Fung Chang; Kim, B.J.J.; Leung,
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor:
Wireless Ad Hoc VoIP Thesis by: Patrick Stuedi & Gustavo Alonso Presentation by: Anil Kumar Marukala & Syed Khaja Najmuddin Ahmed.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
A Survey on Context-Aware Computing Center for E-Business Technology Seoul National University Seoul, Korea 이상근, 이동주, 강승석, Babar Tareen Intelligent Database.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
WORKFLOW IN MOBILE ENVIRONMENT. WHAT IS WORKFLOW ?  WORKFLOW IS A COLLECTION OF TASKS ORGANIZED TO ACCOMPLISH SOME BUSINESS PROCESS.  EXAMPLE: Patient.
Bluetooth Remote Control This paper appears in: Information and Communication Technologies, ICTTA '06. 2nd On page(s): Location: Damascus.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
1 System Models. 2 Outline Introduction Architectural models Fundamental models Guideline.
Presenter: Dipesh Gautam.  Introduction  Why Data Grid?  High Level View  Design Considerations  Data Grid Services  Topology  Grids and Cloud.
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
SEE_INNOVA SEE_INNOVA partners on the winning SIV Projects – Sofia Municipality Bridging Regions in Europe Final Event, Budapest, November, 2014.
Distributed Systems: Concepts and Design Chapter 1 Pages
CPET 565 Mobile Computing Systems Context-Aware Computing (2) Lecture 11 Hongli Luo Indiana University-Purdue University Fort Wayne.
The Design of a Collaborative Learning Environment in a Mobile Technology Supported Classroom, Concept of Fraction Equivalence Sui Cheung KONG Department.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Anonymity on Web Transaction Department of Computer Science Ball State University Research Methods - CS 689 Uday Adhikari 7 th Dec
György Kálmán, Josef Noll IEEE Symposium on Wireless Pervasive Computing, Santorini, Greece Speaker: 黃韋綸 User Controlled Content Access.
Introduction to IT Lecture – 01.
An Architecture to Support Context-Aware Applications
Olga Ratsimor Vladimir Korolev Anupam Joshi Timothy Finin Department of Computer Science and Electrical Engineering University of Maryland Baltimore County.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Seminar on Service Oriented Architecture Distributed Systems Architectural Models From Coulouris, 5 th Ed. SOA Seminar Coulouris 5Ed.1.
Johnson Carmichael Kay Kummerfeld Hexel1 Context Evidence and Location Authority the disciplined management of sensor data into context models.
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
Smart Instant HKU Context-aware Instant Messenger for Mobile Users Supervisor: Dr.Cho-Li Wang CS Final Year Project (Year )
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Mobile IP 순천향대학교 전산학과 문종식
Gaia An Infrastructure for Active Spaces Prof. Klara Nahrstedt Prof. David Kriegman Prof. Dennis Mickunas
多媒體網路安全實驗室 A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for mobile Networks 作者 :Zhiguo Wan,Kui Ren,Bart.
Office 365 is cloud- based productivity, hosted by Microsoft. Business-class Gain large, 50GB mailboxes that can send messages up to 25MB in size,
C ONTEXT AWARE SMART PHONE YOGITHA N. & PREETHI G.D. 6 th SEM, B.E.(C.S.E) SIDDAGANGA INSTITUTE OF TECHNOLOGY TUMKUR
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Supporting Mobile Collaboration with Service-Oriented Mobile Units
Ad-hoc Networks.
July 3, 2015 MuSIC (co-located with ICME) 2015, Torino, Italy
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Chapter 18 MobileApp Design
Sentio: Distributed Sensor Virtualization for Mobile Apps
Principles/Paradigms Of Pervasive Computing
Letsignit, an Automated Signature Solution for Microsoft Office 365 and Microsoft Exchange, Provides Efficiency in Branding and Customization OFFICE.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Presentation transcript:

Reference: [1] TeamSpace paper Building Personal Context-Aware Systems - Realizing ACAS infrastructure for personal use Wei Li Computer and Systems Sciences Department Royal Institute of Technology Introduction The ACAS project has developed a conceptual middleware solution to provide adaptive applications a simple access of distributed context information. This solution is built upon a number of components (named context entities), which interact with each other to form a Context Network to ensure a desirable delivery of required information. This poster addresses the issues toward realizing the proposed solution in the circumstance of real life, specifically about the issues of how to acquire context information from users with respect to their economical affordability and personal privacy protection. Real World Implementation Bluetooth Detector: a convenient way of providing user’s location (and other) context. Short range radio (~10m, adjustable!) Commonly available Less power consumption Give rich Information (more than just MAC address) Accessible over the net: e.g., use Telnet : > Telnet ServerHost 8989 > Subscribe Appeared > Subscribe Disappeared > Subscribe Present > … > Quit (or Exit) PAN Local Infra-structure Service Person Centric System View The Personal Server works as a central and persistent online representative of a user (figure 1) : Resides on user’s home network (e.g., their home desktop PCs) Holds a central storage of user’s context information as well as other entities like context manager, context server etc. Acts as a remote mediator to assist user’s local communication and interaction taking consideration of their situations <?xml version="1.0" encoding="UTF-8" ?> <BTDevList category="present" amount="2" detector="070f546796103" location="FuseLab Pentagon"> <BTDevice address=" 08001719c4b6" type="Computer: Handheld PC/PDA“ service="Networking ,Object Transfer , Audio" timestamp="11147V1607531; Fri Apr 29 01:40:07 CET 2005" presentFrom="11147V1607531; Fri Apr 29 01:40:07 CEST 2005">skype:liwei</BTDevice> <BTDevice address="000ad91452ee" type="Phone: Smart phone" service="Limited Discovery , Object Transfer" timestamp="11147V1607481; Fri Apr 29 01:40:07 CEST 2005" presentFrom="11147V1607481; Fri Apr 29 01:40:07 CEST 2005">msn:liwei@hotmail.com</BTDevice> </BTDevList> Figure 1. Central Personal Server: three types of context reports arrive from difference sources: continuous context updates from user’s familiar places (e.g., home and office); irregular context reports from user’s mobile devices when their connections are intermittent; and occasional context exchange with the unfamiliar people and environment in the user’s vicinity. Each place and user may have a central context entity which aggregates the associated information and manages the access to it. Pseudonym Based Context Sharing The Anonymizer Proxy Server helps to provide user privacy protection by hiding user’s real identity with pseudonyms when communicating with untrustworthy parties (Figure ): A pseudonym is an abstract (literally neutral) URI pointing to the user’s Anonymizer Proxy The Anonymizer Proxy Server is hosted by a user trusted third party to provide a mapping service between user’s abstract URI and the real communication identity. A number of pseudonym is agreed between user’s mobile system and the Anonymizer Proxy before hand These agreed pseudonyms will be noticed (via detection) by the local parties in the proximity. And the unfamiliar parties can use this detected pseudonym to send context requests or reports to the Anonymizer Proxy Server The Anonymizer Proxy Server will decide where and how to forward the context requests to the user’s context system based on knowledge of pseudonym mapping The Personal Context System will also decide whether to reply the request directly or go through the Anonymizer Proxy Server again The server produces four types of events for subscribers (context consumers): appearing, appeared, disappeared and present. Each event consists of a list of devices, the device name in the example is set with user’s IM account Anonymizer Proxy Server 1 Personal Server 2 Personal Area Network People and Facilities in the Vicinity IM Networks: an alternative realization of pseudonym based context sharing Personal Server with IM URI: yahoo:abc@yahoo.com IM Networks SIP, MSN, Yahoo, Skype … Local Infra-structure Service Anonymizer Proxy Server Name device with user’s Personal Server IM URI, like: yahoo:abc@yahoo.com Bluetooth Detector Dynamic association with Bluetooth discovery Figure 2. A Dynamically Formed Context Network with Anonymity Support: the personal server controls the access of personal data according to the user’s permission; while the Anonymous Proxy Server helps to decrease user tractability caused by context sharing. With these two components, the user is provided better protection for their personal data. Demo Application: adding context (location) awareness to legacy software services (TeamSpace [1]) Personal Area Network Anonymizer Proxy Server Untrustworthy Parties (Occasionally visited places or persons) Abstract Pseudonym e.g., user-123@anony.org To further decrease the tractability, the pseudonym name should be alterable as the situation varies, e.g., when location changes or after certain time period Auto Mode: Manual Mode: Reference: [1] TeamSpace paper Conclusion: By making more use of the available hardware and software technologies, we can lower the entry of context aware systems by encouraging and providing support for normal users to actively participate in constructing individual context systems which we hope will have big impact for putting context system into real life use.