reference 1 teamspace paper n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Reference: [1] TeamSpace paper PowerPoint Presentation
Download Presentation
Reference: [1] TeamSpace paper

Loading in 2 Seconds...

play fullscreen
1 / 1

Reference: [1] TeamSpace paper - PowerPoint PPT Presentation


  • 88 Views
  • Uploaded on

Personal Server 2. Personal Server 1. PAN. Anonymizer Proxy Server 1. Anonymizer Proxy Server 2. Personal Area Network. Personal Area Network. People and Facilities in the Vicinity. Local Infra-structure Service.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Reference: [1] TeamSpace paper' - tausiq


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
reference 1 teamspace paper

Personal

Server 2

Personal

Server 1

PAN

Anonymizer

Proxy

Server 1

Anonymizer

Proxy

Server 2

Personal Area

Network

Personal Area

Network

People and Facilities in the Vicinity

Local Infra-structure Service

To further decrease the tractability, the pseudonym name should be alterable as the situation varies, e.g., when location changes or after certain time period

Anonymizer

Proxy

Server

Abstract Pseudonym

e.g., user-123@anony.org

Untrustworthy

Parties

(Occasionally visited

places or persons)

Personal

Area

Network

Real World Implementation

Introduction

The ACAS project has developed a conceptual middleware solution to provide adaptive applications a simple access of distributed context information. This solution is built upon a number of components (named context entities), which interact with each other to form a Context Network to ensure a

desirable delivery of required information.

This poster addresses the issues toward realizing the proposed solution in the circumstance of real life, specifically about the issues of how to acquire context information from users with respect to their economical affordability and personal privacy

protection.

Building Personal Context-AwareSystems- Realizing ACAS infrastructure forpersonal useWei Li Computer and Systems Sciences DepartmentRoyal Institute of Technology

  • Bluetooth Detector: a convenient way of providing user’s location (and other) context.
  • Short range radio (~10m, adjustable!)
  • Commonly available
  • Less power consumption
  • Give rich Information (more than just MAC address)
  • Accessible over the net:
    • e.g.,use Telnet:
    • > TelnetServerHost 8989
    • > Subscribe Appeared
    • > Subscribe Disappeared
    • > Subscribe Present
    • > …
    • > Quit (or Exit)
  • Person Centric System View
  • The Personal Serverworks as a central and persistent online representative of a user (figure 1) :
    • Resides on user’s home network (e.g., their home desktop PCs)
    • Holds a central storage of user’s context information as well as other entities like context manager, context server etc.
    • Acts as a remote mediator to assist user’s local communication and interaction taking consideration of their situations

<?xmlversion="1.0"encoding="UTF-8"?>

<BTDevListcategory="present"amount="2"detector="070f546796103"location="FuseLab Pentagon">

<BTDeviceaddress=" 08001719c4b6"type="Computer: Handheld PC/PDA“

service="Networking ,Object Transfer , Audio"timestamp="11147V1607531; Fri

Apr 29 01:40:07 CET 2005"presentFrom="11147V1607531; Fri Apr 29 01:40:07

CEST 2005">skype:liwei</BTDevice>

<BTDeviceaddress="000ad91452ee"type="Phone: Smart phone"service="Limited

Discovery , Object Transfer"timestamp="11147V1607481; Fri Apr 29 01:40:07

CEST 2005"presentFrom="11147V1607481; Fri Apr 29 01:40:07 CEST

2005">msn:liwei@hotmail.com</BTDevice>

</BTDevList>

Figure 1.Central Personal Server: three types of context reports arrive from difference sources: continuous context updates from user’s familiar places (e.g., home and office); irregular context reports from user’s mobile devices when their connections are intermittent; and occasional context exchange with the unfamiliar people and environment in the user’s vicinity. Each place and user may have a central context entity which aggregates the associated information

and manages the access to it.

  • Pseudonym Based Context Sharing
  • The Anonymizer Proxy Server helps to provide user privacy protection by hiding user’s real identity with pseudonyms when
  • communicating with untrustworthy parties (Figure ):
    • A pseudonym is an abstract (literally neutral) URI pointing to the user’s Anonymizer Proxy
    • The Anonymizer Proxy Server is hosted by a user trusted third party to provide a mapping service between user’s abstract URI and the real communication identity.
    • A number of pseudonym is agreed between user’s mobile system and the Anonymizer Proxy before hand
    • These agreed pseudonyms will be noticed (via detection) by the local parties in the proximity. And the unfamiliar parties can use this detected pseudonym to send context requests or reports to the Anonymizer Proxy Server
    • The Anonymizer Proxy Server will decide where and how to forward the context requests to the user’s context system based on knowledge of pseudonym mapping
    • The Personal Context System will also decide whether to reply the request directly or go through the Anonymizer Proxy Server again

The server produces four types of events for subscribers (context consumers): appearing, appeared, disappeared and present.

Each event consists of a list of devices, the device name in the example is set with user’s IM account

Reference:

[1] TeamSpace paper

  • IM Networks: an alternative realization of pseudonym based context sharing

Personal Server with IM URI: yahoo:abc@yahoo.com

IM Networks

SIP, MSN, Yahoo, Skype …

Local Infra-structure Service

Anonymizer Proxy Server

Name device with user’s Personal Server IM URI, like: yahoo:abc@yahoo.com

Bluetooth Detector

Dynamic associationwithBluetooth discovery

Figure 2. A Dynamically FormedContext Network with Anonymity Support: the personal server controls the access of personal data according to the user’s permission; while the Anonymous Proxy Server helps to decrease user tractability caused by context sharing. With these two components, the user is provided better

protection for their personal data.

  • Demo Application: adding context (location) awareness to legacy software services (TeamSpace [1])

Auto Mode:

Manual Mode:

Conclusion:

By making more use of the available hardware and software technologies, we can lower the entry of context aware systems by encouraging and providing support for normal users to actively participate in constructing individual context systems which we hope will

have big impact for putting context system into real life

use.