Pervasive Computing
eBook - ePub

Pervasive Computing

Next Generation Platforms for Intelligent Data Collection

Ciprian Dobre, Fatos Xhafa, Ciprian Dobre, Fatos Xhafa

Partager le livre
  1. 548 pages
  2. English
  3. ePUB (adapté aux mobiles)
  4. Disponible sur iOS et Android
eBook - ePub

Pervasive Computing

Next Generation Platforms for Intelligent Data Collection

Ciprian Dobre, Fatos Xhafa, Ciprian Dobre, Fatos Xhafa

DĂ©tails du livre
Aperçu du livre
Table des matiĂšres
Citations

À propos de ce livre

Pervasive Computing: Next Generation Platforms for Intelligent Data Collection presents current advances and state-of-the-art work on methods, techniques, and algorithms designed to support pervasive collection of data under ubiquitous networks of devices able to intelligently collaborate towards common goals.

Using numerous illustrative examples and following both theoretical and practical results the authors discuss: a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography, and developments related to pervasive computing components for intelligently collecting data, resource, and data management issues; the importance of data security and privacy in the era of big data; the benefits of pervasive computing and the development process for scientific and commercial applications and platforms to support them in this field.

Pervasive computing has developed technology that allows sensing, computing, and wireless communication to be embedded in everyday objects, from cell phones to running shoes, enabling a range of context-aware applications. Pervasive computing is supported by technology able to acquire and make use of the ubiquitous data sensed or produced by many sensors blended into our environment, designed to make available a wide range of new context-aware applications and systems. While such applications and systems are useful, the time has come to develop the next generation of pervasive computing systems. Future systems will be data oriented and need to support quality data, in terms of accuracy, latency and availability.

Pervasive Computing is intended as a platform for the dissemination of research efforts and presentation of advances in the pervasive computing area, and constitutes a flagship driver towards presenting and supporting advanced research in this area.

Indexing: The books of this series are submitted to EI-Compendex and SCOPUS

  • Offers a coherent and realistic image of today's architectures, techniques, protocols, components, orchestration, choreography, and development related to pervasive computing
  • Explains the state-of-the-art technological solutions necessary for the development of next-generation pervasive data systems, including: components for intelligently collecting data, resource and data management issues, fault tolerance, data security, monitoring and controlling big data, and applications for pervasive context-aware processing
  • Presents the benefits of pervasive computing, and the development process of scientific and commercial applications and platforms to support them in this field
  • Provides numerous illustrative examples and follows both theoretical and practical results to serve as a platform for the dissemination of research advances in the pervasive computing area

Foire aux questions

Comment puis-je résilier mon abonnement ?
Il vous suffit de vous rendre dans la section compte dans paramĂštres et de cliquer sur « RĂ©silier l’abonnement ». C’est aussi simple que cela ! Une fois que vous aurez rĂ©siliĂ© votre abonnement, il restera actif pour le reste de la pĂ©riode pour laquelle vous avez payĂ©. DĂ©couvrez-en plus ici.
Puis-je / comment puis-je télécharger des livres ?
Pour le moment, tous nos livres en format ePub adaptĂ©s aux mobiles peuvent ĂȘtre tĂ©lĂ©chargĂ©s via l’application. La plupart de nos PDF sont Ă©galement disponibles en tĂ©lĂ©chargement et les autres seront tĂ©lĂ©chargeables trĂšs prochainement. DĂ©couvrez-en plus ici.
Quelle est la différence entre les formules tarifaires ?
Les deux abonnements vous donnent un accĂšs complet Ă  la bibliothĂšque et Ă  toutes les fonctionnalitĂ©s de Perlego. Les seules diffĂ©rences sont les tarifs ainsi que la pĂ©riode d’abonnement : avec l’abonnement annuel, vous Ă©conomiserez environ 30 % par rapport Ă  12 mois d’abonnement mensuel.
Qu’est-ce que Perlego ?
Nous sommes un service d’abonnement Ă  des ouvrages universitaires en ligne, oĂč vous pouvez accĂ©der Ă  toute une bibliothĂšque pour un prix infĂ©rieur Ă  celui d’un seul livre par mois. Avec plus d’un million de livres sur plus de 1 000 sujets, nous avons ce qu’il vous faut ! DĂ©couvrez-en plus ici.
Prenez-vous en charge la synthÚse vocale ?
Recherchez le symbole Écouter sur votre prochain livre pour voir si vous pouvez l’écouter. L’outil Écouter lit le texte Ă  haute voix pour vous, en surlignant le passage qui est en cours de lecture. Vous pouvez le mettre sur pause, l’accĂ©lĂ©rer ou le ralentir. DĂ©couvrez-en plus ici.
Est-ce que Pervasive Computing est un PDF/ePUB en ligne ?
Oui, vous pouvez accĂ©der Ă  Pervasive Computing par Ciprian Dobre, Fatos Xhafa, Ciprian Dobre, Fatos Xhafa en format PDF et/ou ePUB ainsi qu’à d’autres livres populaires dans Ciencia de la computaciĂłn et ProgramaciĂłn paralela. Nous disposons de plus d’un million d’ouvrages Ă  dĂ©couvrir dans notre catalogue.

Informations

Éditeur
Academic Press
Année
2016
ISBN
9780128037027
Part I
Automated Capture of Experiences with Easy Access
Chapter 1

On preserving privacy in cloud computing using ToR

A. Carniellia; M. Aiasha; M. Alazabb a Middlesex University, London, United Kingdom
b Macquarie University, Sydney, NSW, Australia

Abstract

The Internet allows for an efficient, inexpensive collection of information without surfers’ consents. This includes surfers’ preferences, interests or even credit card information. Furthermore, it is well known that some oppressive governments filter the information that can digitally reach their countries. Also, there are evidences that certain governments spy on citizens and organizations through intercepting phone calls, activities on social media and blogs. For Internet browsing, several methods of privacy-preserving and anonymizers have been developed. An example of such a technology is The Onion Router (ToR) network, which has been proven to guarantee users’ anonymity and privacy while they are browsing the Internet. However, with the wide deployment of virtualization solutions and the tremendous migration to cloud-based services, many online services have moved onto the cloud. This situation complicates the issue of preserving a client’s privacy and anonymity and raises a “question mark” as to the efficiency of current anonymizers in this new environment. To the best of our knowledge, few studies have been conducted to analyze the compatibility between the ToR network and this new emerging infrastructure. This paper presents a qualitative analysis of the feasibility and efficiency of the ToR in cloud infrastructure and the possibility of integrating these technologies.

Keywords

Privacy; Cloud computing; ToR; Anonymity; Compatibility analysis

1 Introduction

Over the past two decades, threats to users’ privacy and identities have been of rising concern for Internet surfers. According to a report on anonymity, privacy, and security online (Dingledine et al., 2004), most Internet users would like to be anonymous online, at least occasionally, but many think it is not possible to be completely anonymous. The reasons behind such a belief vary from the increasing number of data leakage scandals, to the increasing demands by surfers to not be observed by specific people, organizations, or governments. The report in Dingledine et al. (2004) shows that 55% of Internet users have taken steps online to remove or mask their digital footprints and to avoid their activities being monitored and traced. Such steps range from clearing cookies to encrypting their email and using virtual networks that mask their Internet Protocol (IP) address. Such an attitude is ascribed to the fact that certain authoritative bodies and governments tend to misuse their power and spy on their own people. Several governments also filter specific websites through their border gateways in order to prevent flows of information from reaching their countries (as is the case for People’s Republic of China, North Korea, Bahrain, Iran, Vietnam (Rininsland, 2012), or, most recently, Venezuela (Bajak, 2014)).
Obviously, governments justify these activities of wire-tapping and interception as measures to ensure the “National Security.” Nevertheless, because of the invasive nature of such methods, Internet dwellers began to design and develop software in the forms of browsing anonymizers and communication obfuscation techniques to maintain their privacy and anonymity in the cyber world. Furthermore, considering the situation and events in some parts of the world such as “The Arab Spring” in the Middle East, hiding one’s identity while browsing the Internet might be crucial for personnel safety in these oppressive countries.
This situation highlights the huge demand placed on security mechanisms for protecting users’ privacy and anonymity on the Internet. An example of such a mechanism that has been made freely available to users is called The Onion Router (ToR) (Fang et al., 2000; Danezis et al., 2010; Michael et al., 2010). ToR has been designed to make it possible for users to surf the Internet anonymously, so that their activities and locations cannot be discovered by government agencies, corporations, or anyone else. Compared with other anonymizers such as Invisible Internet Project (I2P) (Wang et al., 2011), ToR is more popular; has more visibility in the academic and hacker communities; and benefits from formal studies of anonymity, resistance, and performance.
ToR and other anonymizers were initially conceived to run over the traditional Internet. However, the emergence and wide adoption of cloud-based services raises huge doubts about the efficiency of these anonymizers if used with these new technologies. Furthermore, customers of cloud computing have more concerns about the secrecy of their data, due to the fact that such data are being moved from the client’s local devices to third party online storage. The purpose of this research is to analyze the feasibility of running the ToR network on top of an infrastructure embracing both the traditional and the cloud computing models.
The rest of the paper is organized as follows. Section 2 gives an overview of cloud computing architecture and sheds light on issues such as privacy and anonymity in cloud computing. Section 3 describes the ToR network. Our experiments to deploy ToR with cloud-based services are described in Section 4.

2 Overview of cloud computing

Arguably, there is not a single, unified definition for cloud computing. Being a relatively new concept, different institutions and researchers define cloud computing in their own way; obviously, the key features of the cloud remain the same in each definition. Foster et al. (in Zhao et al., 2008) give a very deterministic and perhaps complicated delineation of this new technology. They define cloud computing as “A large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet.” In this research, when referring to cloud computing, we avail ourselves of the following simpler description, given by Danish et al. (in Wang et al., 2011): “Cloud Computing technology is a new concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to consumers. Consumers can typically requests Cloud services via a web browser or web service.”
The statement is self-explanatory. In simple terms, cloud computing is a revolutionary way of providing users (who may be a single person or even medium-size companies) with all the kinds of IT resources that they may need in order to fulfill their IT infrastructure requirements. In a cloud computing environment, there are two main players: the cloud provider (CP) (who owns a very huge data center and loans hardware and software resources) and the cloud consumer (who pays a fee to use such resources). Three main categories (models) exist for cloud deployment: public cloud, private cloud, and hybrid cloud as shown in Fig. 1.
f01-01-9780128036631
Fig. 1 Types of cloud computing. From Ribeiro, M., 2010. Thoughts on Information Technology. https://it...

Table des matiĂšres