Secure Communications and Data Management in Ubiquitous Services
Ching‐Hsien Hsu,Jong Hyuk Park,Laurence T. Yang,Mário M. Freire
DOI: https://doi.org/10.1002/dac.1057
2009-01-01
International Journal of Communication Systems
Abstract:In the last few years, we have observed an explosive growth of ubiquitous computing, which is emerging as the next generation information technology. This new paradigm has been embodied into tremendous service models through numerous ubiquity-related technologies, such as web, ad hoc, sensor networks, and ambient intelligence to provide computing and communication services anytime and anywhere. Parallel to this, wireless communication technologies have evolved to a stage where they are capable of connecting cyber and physical domains. In such an era, computers in the traditional sense gradually fade from view, making information and communication mediated by computers available anywhere and anytime through devices that are embedded in our environment, completely interconnected, intuitive, effortlessly portable, and constantly available. Although ubiquitous service presents exciting enabling opportunities, the benefits will only be reaped if security aspects and data management can be appropriately addressed. As a result, to realize the advantages of ambient intelligence and services in ubiquitous environments, it requires the security issues and data management to be suitable for its applications. Therefore, secure communication and data management are important challenges for commerce, the public sector, academia and for the individuals. For example, threats exploiting infirmities of user interfaces, operating systems, networks, and wireless communications give rise to new concerns about loss of confidentiality, integrity, privacy, and availability. How can these risks be avoided to an acceptable level? This special issue is intended to foster the dissemination of state-of-the-art research in the area of secure ubiquitous services including security models, security systems, secure data management, and novel applications associated with its utilization wherein security and privacy are the indefeasible rights of individuals to control the ways in which personal information is obtained, processed, distributed, shared, and used by any other entity. This special issue includes eight papers from researchers in Taiwan, China, Tunisia, Canada, Korea, Germany, Hong Kong, and Mexizo, who have demonstrated the effectiveness and efficiency