PRIVACY & SECURITY IN
HIGHLY DYNAMIC SYSTEMS
HIGHLY DYNAMIC SYSTEMS
Highly Dynamic System (HDS) is a collection of heterogeneous and decentralized nodes in a wireless network. The devices are differing in their size, shape, storage capacity, mobility, connectivity etc. We can add new devices into HDS according to our needs and also remove certain devices that are not working properly from the system. The applications in this system are service-oriented and distributed. Systems in healthcare, entertainment, traffic control and retail are some examples of HDS.The way in which HDS are used raises a number of issues, particularly with regard to privacy and security. So it is necessary, to provide certain measures in order to provide privacy and security. For this here we discuss two methods, Personalization and Usage Control. These methods are not based on access control, rather based on the usage of personal data.
HIGHLY DYNAMIC SYSTEMS
There had been no revolution in the early days of computer revolution. Computers are more or less the same. First, there is no discontinuity in the technology. Second, only the corporation of low-cost computers, advanced interfaces to the physical world, and increased and affordable bandwidth define how useful computers are for processing, storing, and communicating information.
The mainframe and PCs eras are characterized by different hardware and software, a different style of use and new applications. Highly dynamic systems (HDS) consisting of heterogeneous, decentralized nodes in wireless networks. The devices differ in size, storage capacity, connectivity , mobility, processing power and user interfaces. The applications in HDS are service oriented and distributed. We already interact today with HDS systems in health services, traffic control, entertainment, and retail. The success factor of Highly Dynamic Systems will be non-technically motivated and will be found in the properties to dynamically handle openness and adapt to changes. Dynamic handling of Openness: HDS are not specified for a given task and limited space. They experience a continuous extension. Dynamic adaptation to Changes: Interaction with HDS is not pre- specified and the usage is determined during utilization. The way HDS are used raises a number of trustworthiness issues, particularly with regard to privacy and security. Security is often equated with access control, which consist of authentication and authorization and is realized in such a way that unauthorized operations are identified in advance. Any access rights contradict with the openness and adaptation properties of HDS.
Privacy is the possibility to control the distribution and use of personal data. All the existing privacy technologies are based on security technologies, and are only effective in a predefined setting. The seminars Privacy and Security in HDS insights into some of the challenges involved in realized security and privacy in HDS. Here it proposes a privacy solution that is not based on access control, but unconditionally accepts any form of data collection and provides the possibility to verify the usage of this data.
For implementing privacy and security mechanisms, here we use two methods:
I.Personalization in HDS.
II.Distributed Usage Control.
PERSONALIZATION IN HDS
Objects of everyday use are becoming increasingly interconnected and mobile communication involving devices of all sizes and bandwidths are used in various ways. Highly dynamic information systems (HDS) are emerging, bringing new challenges for the management of information systems: having to cope with components that enter and leave the system spontaneously and be autonomous in their actions. The changing and possibly conflicting requirements of the single component must be taken into account, which demands must be able to contend with the constant growth of communicated data rapidly collected and accumulated in various forms.
Solving the challenges of HDS is accompanied by a prospect economic potential. A first realization is the present rollout of RFID by major retail groups worldwide. Currently, cost savings through process automation are of prime importance but the use of this technology in retailing goes beyond mere productivity improvements. Tagging items with RFID chips in combination with other wireless technologies, equipping customers with mobile communication devices, and using sensor network allow, for example, personalizing services that have so for been successfully used in client-server e-commerce scenarios.