• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Theses
    • Theses - Higher Degree by Research
    • View Item
    • Home
    • Griffith Theses
    • Theses - Higher Degree by Research
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • Privacy and Security in Ubiquitous Computing: Service Delivery and Identity in Intelligent Environments

    Thumbnail
    View/Open
    Chatfield_2010_02Thesis.pdf (2.607Mb)
    Author(s)
    Chatfield, Craig
    Primary Supervisor
    Hexel, Rene
    Other Supervisors
    von Hellens, Liisa
    Year published
    2010
    Metadata
    Show full item record
    Abstract
    Ubiquitous computing describes computing technologies that are designed to be embedded in tools and in our environment, providing computational support for user interaction and service delivery. Intelligent environments are context-aware computing environments that deliver services using ubiquitous computing technologies. These environments provide users with services tailored to the users’ preferences and the current state of the environment. The development and implementation of these environments is challenging due to their potential ability to gather information on the environment’s occupants and context. The information ...
    View more >
    Ubiquitous computing describes computing technologies that are designed to be embedded in tools and in our environment, providing computational support for user interaction and service delivery. Intelligent environments are context-aware computing environments that deliver services using ubiquitous computing technologies. These environments provide users with services tailored to the users’ preferences and the current state of the environment. The development and implementation of these environments is challenging due to their potential ability to gather information on the environment’s occupants and context. The information collection, when combined with advanced data-mining techniques, has unprecedented potential to invade users’ privacy. The invasion of privacy is a significant concern to users, and must be addressed before intelligent environments can gain widespread acceptance. The use of ubiquitous computing technologies also poses unique challenges for service delivery and network security. By definition, ubiquitous computing describes computing that has faded into the background, allowing users to use the services and technologies as easily as they would more tangible physical objects. This integration into our world raises the question that if a service is inconspicuous enough to blend into the background, how can we allow users to identify previously unused services? Information security within intelligent environments is complicated by the physical availability of much of the environment’s hardware (which leaves it vulnerable to being tampered with). These privacy and security concerns raise the need for a ubiquitous computing infrastructure that will allow private interaction and the effective delivery of personalised and identity-restricted services. Owing to the large variety of services they could provide, it has been suggested that intelligent environments will one day cover most of our daily lives (for example our homes, offices, public transport networks or shopping centres). This requires a common approach be taken to users’ interaction with intelligent environments, and suggests a shared infrastructure will be required to support users’ interactions with different environments. User privacy requirements necessitate that this infrastructure be independently operated from the intelligent environments (and its service providers). Further privacy and interaction requirements highlight the need for user-controlled identity management structures and anonymous environmental interaction.
    View less >
    Thesis Type
    Thesis (PhD Doctorate)
    Degree Program
    Doctor of Philosophy (PhD)
    School
    School of Information and Communication Technology
    DOI
    https://doi.org/10.25904/1912/1262
    Copyright Statement
    The author owns the copyright in this thesis, unless stated otherwise.
    Item Access Status
    Public
    Subject
    Ubiquitous computing
    Context-aware computing environments
    Intelligent environments
    Publication URI
    http://hdl.handle.net/10072/367314
    Collection
    • Theses - Higher Degree by Research

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander