Title :
Avoiding Privacy Violation for Resource Sharing in Ad hoc Networks of Pervasive Computing Environment
Author :
Asif, KM ; Ahamed, Sheikh I. ; Talukder, Nilothpal
Author_Institution :
Marquette Univ., Milwaukee
Abstract :
Users of handheld devices may want to share services resources with each other in pervasive computing environment. Availability of information regarding users may lead to privacy violations while communicating with others for services and resources. Providing a model to resolve this issue in centralized or distributed environment is not desirable or not feasible if we really want to achieve ubiquity. In this paper, we present a privacy aware model for resource sharing in pervasive computing environment with an illustrative example. Our model exploits the concepts of policies and ordered binary decision diagrams.
Keywords :
ad hoc networks; binary decision diagrams; data privacy; resource allocation; telecommunication security; ubiquitous computing; ad hoc network; handheld device; ordered binary decision diagram; pervasive computing; privacy violation; resource sharing; Ad hoc networks; Availability; Boolean functions; Data structures; Handheld computers; Personal digital assistants; Pervasive computing; Privacy; Resource management; Wireless sensor networks;
Conference_Titel :
Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International
Conference_Location :
Beijing
Print_ISBN :
0-7695-2870-8
DOI :
10.1109/COMPSAC.2007.84