User Information Security Context-Aware Services in a Cloud Environment

Article Preview

Abstract:

Users in the ubiquitous mobile environment have provided services that match the surrounding context and the location of their own. As Cloud Computing has been spreading widely, users and service providers enables to use resource or service cheaply and easily without owning all the resource needed. The development of mobile devices and the spread of wireless network help share and exchange information and resources more easily. Therefore users are able to use the information and service more free than previous wire network due to development of wireless network and device. Previous studies of these form was a study on the provided service mainly, but they did not regard on user's location, environment and preference. Therefore, this paper, we use the profile and the user's situation information that contains personal information security, preferences. We are able to provide more accurate service than previous techniques through techniques and systems suggested in this paper.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

578-583

Citation:

Online since:

December 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Weiser. Hot topics-ubiquitous computing, IEEE Computer, 26(10), pp.71-72, October (1993).

DOI: 10.1109/2.237456

Google Scholar

[2] Schilit, BN., Adams, N., Want, R., Context-aware computing applications, Proc. IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, pp.85-90, (1994).

DOI: 10.1109/wmcsa.1994.16

Google Scholar

[3] M. H. (1998), Design Principles for intelligent environment", In Proc. The Fiftennth National Conference on Artificial Intelligence(AAAI, 98), Madison, Wisconsin, pp.547-554.

Google Scholar

[4] H. S. Lee, J. H. Lee (2007), A Study on the Sensor based on Context Aware Inference System for Ubiquitous Housing, Architectural Institute of Korea, Vol. 27, No. 1, pp.53-56.

Google Scholar

[5] Cloud Security Alliance, Guidance for Identity & Access Management V2. 1. http: /www. cloudsecurityalliance. org/guidance/csaguide-dom12. pdf, (2010).

Google Scholar

[6] Amazon, Amazon Elastic Compute Cloud(Amazon EC2), http: /aws. amazon. com/ec2.

DOI: 10.1007/978-1-4842-2841-8_2

Google Scholar

[7] T.R. Gruber, A translation approach to portable ontologies. Know ledge Acquisition 5, 2, 199-220, (1993).

Google Scholar

[8] M. Roman, C. Hess, R. Cerqueira, A. Ranganathan, R. Campbell and K. Nahrstedt, Gaia: A Middleware Platform for Active Spaces, ACM SIGMOBILE Mobile Computing and Communications Review, Vol. 6, No. 4, (2002).

DOI: 10.1145/643550.643558

Google Scholar

[9] Guanling Chen, David Kotz, A Survey of Context-Aware Mobile Computing Research, Dartmouth Computer Science Technical Report TR2000-381, (2000).

Google Scholar

[10] T. Gu et al, An Ontology Based Context Model in Intelligent Environments, Proc. of Communication Networks and Distributed Systems Modeling and Simulation Conference, (2004).

Google Scholar

[11] Annie Chen, Context-Aware Collaborative Filtering System: Predicting the User's Preference in the Ubiquitous Computing Environment, LoCA 2005, Volume 3479, pp.244-253.

DOI: 10.1007/11426646_23

Google Scholar