18-02-2011, 04:06 PM
1263.pdf (Size: 220.01 KB / Downloads: 63)
PRIVACY & SECURITY INHIGHLY DYNAMIC SYSTEMS
INTRODUCTION
Highly Dynamic System (HDS) is a collection of heterogeneous anddecentralized nodes in a wireless network. The devices are differing in theirsize, shape, storage capacity, mobility, connectivity etc. We can add newdevices into HDS according to our needs and also remove certain devicesthat are not working properly from the system.The applications in this system are service-oriented and distributed. Systemsin healthcare, entertainment, traffic control and retail are some examples ofHDS.The way in which HDS are used raises a number of issues, particularlywith regard to privacy and security. So it is necessary, to provide certainmeasures in order to provide privacy and security. For this here we discusstwo methods, Personalization and Usage Control. These methods are notbased on access control, rather based on the usage of personal data.
HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution.Computers are more or less the same. First, there is no discontinuity in thetechnology. Second, only the corporation of low-cost computers, advancedinterfaces to the physical world, and increased and affordable bandwidthdefine how useful computers are for processing, storing, and communicatinginformation.The mainframe and PCs eras are characterized by different hardware andsoftware, a different style of use and new applications. Highly dynamicsystems (HDS) consisting of heterogeneous, decentralized nodes in wirelessnetworks. The devices differ in size, storage capacity, connectivity ,mobility, processing power and user interfaces. The applications in HDS areservice oriented and distributed.We already interact today with HDS systems in health services, trafficcontrol, entertainment, and retail. The success factor of Highly DynamicSystems will be non-technically motivated and will be found in theproperties to dynamically handle openness and adapt to changes
.•Dynamic handling of Openness: HDS are not specified for a giventask and limited space. They experience a continuous extension.
• Dynamic adaptation to Changes: Interaction with HDS is not prespecifiedand the usage is determined during utilization.The way HDS are used raises a number of trustworthiness issues,particularly with regard to privacy and security. Security is often equatedwith access control, which consist of authentication and authorization and isrealized in such a way that unauthorized operations are identified inadvance. Any access rights contradict with the openness and adaptationproperties of HDS.Privacy is the possibility to control the distribution and use of personal data.All the existing privacy technologies are based on security technologies, andare only effective in a predefined setting. The seminar Privacy and Securityin HDS insights into some of the challenges involved in realized securityand privacy in HDS.Here it proposes a privacy solution that is not based on access control, butunconditionally accepts any form of data collection and provides thepossibility to verify the usage of this data.For implementing privacy and security mechanisms, here we use twomethods
I.Personalization in HDS.
II.Distributed Usage Control.
PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected andmobile communication involving devices of all sizes and bandwidths areused in various ways. Highly dynamic information systems (HDS) areemerging, bringing new challenges for the management of informationsystems: having to cope with components that enter and leave the systemspontaneously and be autonomous in their actions.The changing and possibly conflicting requirements of the singlecomponent must be taken into account, which demands must be able tocontend with the constant growth of communicated data rapidly collectedand accumulated in various forms.Solving the challenges of HDS is accompanied by a prospect economicpotential. A first realization is the present rollout of RFID by major retailgroups worldwide. Currently, cost savings through process automation areof prime importance but the use of this technology in retailing goes beyondmere productivity improvements.Tagging items with RFID chips in combination with other wirelesstechnologies, equipping customers with mobile communication devices, andusing sensor network allow, for example, personalizing services that have sofor been successfully used in client-server e-commerce scenarios.Online retailers use the Internet today on a larger scale to recommend theirnew products and services to known customers according to their previouspurchases or interests. Based on these collected data we can classify theservices into three. They are:i. Personalized Services.ii. Individualized Services.iii. Universal Services.