Seminar Report On PRIVACY & SECURITY IN HIGHLY DYNAMIC SYSTEMS
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
super
Active In SP
**

Posts: 43
Joined: Jun 2009
#1
17-06-2009, 12:09 PM


Seminar Report
On
PRIVACY & SECURITY IN
HIGHLY DYNAMIC SYSTEMS




.htm   PRIVACY & SECURITY IN HIGHLY DYNAMIC SYSTEMSS.htm (Size: 61.09 KB / Downloads: 158)

INTRODUCTION
Highly Dynamic System (HDS) is a collection of heterogeneous and decentralized nodes in a wireless network. The devices are differing in their size, shape, storage capacity, mobility, connectivity etc. We can add new devices into HDS according to our needs and also remove certain devices that are not working properly from the system. The applications in this system are service-oriented and distributed. Systems in healthcare, entertainment, traffic control and retail are some examples of HDS.The way in which HDS are used raises a number of issues, particularly with regard to privacy and security. So it is necessary, to provide certain measures in order to provide privacy and security. For this here we discuss two methods, Personalization and Usage Control. These methods are not based on access control, rather based on the usage of personal data.

HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution. Computers are more or less the same. First, there is no discontinuity in the technology. Second, only the corporation of low-cost computers, advanced interfaces to the physical world, and increased and affordable bandwidth define how useful computers are for processing, storing, and communicating information.
The mainframe and PCs eras are characterized by different hardware and software, a different style of use and new applications. Highly dynamic systems (HDS) consisting of heterogeneous, decentralized nodes in wireless networks. The devices differ in size, storage capacity, connectivity , mobility, processing power and user interfaces. The applications in HDS are service oriented and distributed. We already interact today with HDS systems in health services, traffic control, entertainment, and retail. The success factor of Highly Dynamic Systems will be non-technically motivated and will be found in the properties to dynamically handle openness and adapt to changes. Dynamic handling of Openness: HDS are not specified for a given task and limited space. They experience a continuous extension. Dynamic adaptation to Changes: Interaction with HDS is not pre- specified and the usage is determined during utilization. The way HDS are used raises a number of trustworthiness issues, particularly with regard to privacy and security. Security is often equated with access control, which consist of authentication and authorization and is realized in such a way that unauthorized operations are identified in advance. Any access rights contradict with the openness and adaptation properties of HDS.
Privacy is the possibility to control the distribution and use of personal data. All the existing privacy technologies are based on security technologies, and are only effective in a predefined setting. The seminar and presentation Privacy and Security in HDS insights into some of the challenges involved in realized security and privacy in HDS. Here it proposes a privacy solution that is not based on access control, but unconditionally accepts any form of data collection and provides the possibility to verify the usage of this data.
For implementing privacy and security mechanisms, here we use two methods:
I.Personalization in HDS.
II.Distributed Usage Control.

PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected and mobile communication involving devices of all sizes and bandwidths are used in various ways. Highly dynamic information systems (HDS) are emerging, bringing new challenges for the management of information systems: having to cope with components that enter and leave the system spontaneously and be autonomous in their actions. The changing and possibly conflicting requirements of the single component must be taken into account, which demands must be able to contend with the constant growth of communicated data rapidly collected and accumulated in various forms.
Solving the challenges of HDS is accompanied by a prospect economic potential. A first realization is the present rollout of RFID by major retail groups worldwide. Currently, cost savings through process automation are of prime importance but the use of this technology in retailing goes beyond mere productivity improvements. Tagging items with RFID chips in combination with other wireless technologies, equipping customers with mobile communication devices, and using sensor network allow, for example, personalizing services that have so for been successfully used in client-server e-commerce scenarios.
Reply
paayal
Active In SP
**

Posts: 1
Joined: Feb 2010
#2
08-02-2010, 10:32 PM

applications of reactive powder concrete
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#3
18-02-2011, 04:06 PM


.pdf   1263.pdf (Size: 220.01 KB / Downloads: 53)
PRIVACY & SECURITY INHIGHLY DYNAMIC SYSTEMS
INTRODUCTION

Highly Dynamic System (HDS) is a collection of heterogeneous anddecentralized nodes in a wireless network. The devices are differing in theirsize, shape, storage capacity, mobility, connectivity etc. We can add newdevices into HDS according to our needs and also remove certain devicesthat are not working properly from the system.The applications in this system are service-oriented and distributed. Systemsin healthcare, entertainment, traffic control and retail are some examples ofHDS.The way in which HDS are used raises a number of issues, particularlywith regard to privacy and security. So it is necessary, to provide certainmeasures in order to provide privacy and security. For this here we discusstwo methods, Personalization and Usage Control. These methods are notbased on access control, rather based on the usage of personal data.
HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution.Computers are more or less the same. First, there is no discontinuity in thetechnology. Second, only the corporation of low-cost computers, advancedinterfaces to the physical world, and increased and affordable bandwidthdefine how useful computers are for processing, storing, and communicatinginformation.The mainframe and PCs eras are characterized by different hardware andsoftware, a different style of use and new applications. Highly dynamicsystems (HDS) consisting of heterogeneous, decentralized nodes in wirelessnetworks. The devices differ in size, storage capacity, connectivity ,mobility, processing power and user interfaces. The applications in HDS areservice oriented and distributed.We already interact today with HDS systems in health services, trafficcontrol, entertainment, and retail. The success factor of Highly DynamicSystems will be non-technically motivated and will be found in theproperties to dynamically handle openness and adapt to changes
.•Dynamic handling of Openness: HDS are not specified for a giventask and limited space. They experience a continuous extension.
• Dynamic adaptation to Changes: Interaction with HDS is not prespecifiedand the usage is determined during utilization.The way HDS are used raises a number of trustworthiness issues,particularly with regard to privacy and security. Security is often equatedwith access control, which consist of authentication and authorization and isrealized in such a way that unauthorized operations are identified inadvance. Any access rights contradict with the openness and adaptationproperties of HDS.Privacy is the possibility to control the distribution and use of personal data.All the existing privacy technologies are based on security technologies, andare only effective in a predefined setting. The seminar and presentation Privacy and Securityin HDS insights into some of the challenges involved in realized securityand privacy in HDS.Here it proposes a privacy solution that is not based on access control, butunconditionally accepts any form of data collection and provides thepossibility to verify the usage of this data.For implementing privacy and security mechanisms, here we use twomethods
I.Personalization in HDS.
II.Distributed Usage Control.
PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected andmobile communication involving devices of all sizes and bandwidths areused in various ways. Highly dynamic information systems (HDS) areemerging, bringing new challenges for the management of informationsystems: having to cope with components that enter and leave the systemspontaneously and be autonomous in their actions.The changing and possibly conflicting requirements of the singlecomponent must be taken into account, which demands must be able tocontend with the constant growth of communicated data rapidly collectedand accumulated in various forms.Solving the challenges of HDS is accompanied by a prospect economicpotential. A first realization is the present rollout of RFID by major retailgroups worldwide. Currently, cost savings through process automation areof prime importance but the use of this technology in retailing goes beyondmere productivity improvements.Tagging items with RFID chips in combination with other wirelesstechnologies, equipping customers with mobile communication devices, andusing sensor network allow, for example, personalizing services that have sofor been successfully used in client-server e-commerce scenarios.Online retailers use the Internet today on a larger scale to recommend theirnew products and services to known customers according to their previouspurchases or interests. Based on these collected data we can classify theservices into three. They are:i. Personalized Services.ii. Individualized Services.iii. Universal Services.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  REDTACTON A SEMINAR REPORT project girl 2 567 25-04-2016, 03:58 PM
Last Post: mkaasees
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,451 31-03-2015, 09:08 AM
Last Post: Guest
  seminar report on cyber terrorism pdf jaseelati 0 331 23-02-2015, 01:49 PM
Last Post: jaseelati
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 292 13-02-2015, 02:01 PM
Last Post: jaseelati
  seminar report on internet of things jaseelati 0 379 29-01-2015, 04:51 PM
Last Post: jaseelati
  nano ic engine seminar report jaseelati 0 322 21-01-2015, 01:43 PM
Last Post: jaseelati
  google glass seminar report pdf jaseelati 0 345 21-01-2015, 01:41 PM
Last Post: jaseelati