Context Aware System Security

Read Complete Research Material



CONTEXT AWARE SYSTEM SECURITY

Context Aware System Security

Context Aware System Security

Introduction

Context can be defined as any information which is used in characterizing the entity's situation. The examples of context are as following location, time, temperature, noise, connectivity of network, the bandwidth of communication etc. The information of context can be gathered through different sources; these sources are as follows sensors, hardware devices or user's preferences, applications, data fusion, through context-aware systems. The context can be classified as external, internal, entities, attributes. The context information can also be defined as information that can be used to classify the condition of an entity. An entity can be defined as any type of asset of a computing system. The context information provider (CIP) can be defined as any entity which gives the information of the context. The system is known as context aware when it uses any context information previous to or in the duration of service stipulation, the objective of this system is to identify the users [1].

The context aware system can be defines as ability of adaptation of the operations to the current context without the explicit of user interference/involvement. And the aim of it is to increase the stability as well as effectiveness of the context. It is basically a computing system that's purpose is to show analogous capabilities that are adaptable. It consists of various components. It is realized that in today's world the need of additional components of the infrastructure are necessary in order to lessen the context aware applications' complexity and in improving its maintainability and in promoting the reusing of it [2].

The Context-awareness system is rising as a significant part of the future wireless systems. Particularly it is very important for personalizing the following concepts like intelligence of ambient and the ubiquitous computing totally rely on context information. There are several security challenges included in the context aware systems like integrity, secrecy, and the accessibility of the context information and the privacy of the end user. But the question is that at what degree the information of the context should be used so that it doesn't raise the security issues. While applying the context information can have an impact on the adaptation of the ubiquitous computing .for context information there are various architectures develop for bolstering, acquisition and reasoning two of them are Context Toolkit Architecture and the Context Broker Architecture. In The Context Toolkit Architecture the objective is to facilitate the development and the deployment of context-aware applications. The Context Broker Architecture deals in proposing architecture for the discovery, acquisition and reasoning about the information of the context. It includes the mechanisms for protecting the privacy of the information of the context. Following are the basic components of the context toolkit architecture context widgets, interpreters, aggregators and a discoverer. Context widgets are basically that software component that gives access to information of the context. Aggregators gather all the important context information for a particular application. Interpreters gives the idea of the information of the context by ...
Related Ads