UbiCom Book Slides (Abridged Version) Chapter 12 Management of Smart Devices, Environments & Interaction Stefan Poslad http://www.eecs.qmul.ac.uk/people/stefan/ubicom Ubiquitous computing: smart devices, environments and interaction 1 Chapter 12: Overview Chapter 12 focuses on: • Managing Smart Devices in – Virtual ICT Environments – Human User-Centred Environments – Physical Environments • Internal system properties: distributed, autonomous Ubiquitous computing: smart devices, environments and interaction 2 Related Chapter Links • Manage devices as part of human centred activities (Section 5.6.5) • OS management of system ICT resources (Section 3.4) • Intelligent Interaction Management (Chapter 9) • Self, Autonomous System Management (Chapter 8) • Challenges & outlook is related to Management (Chapter 13) Ubiquitous computing: smart devices, environments and interaction 3 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 4 Process and Application Management by the OS • In high resource smart devices MTOS manages ??? (Section 3.4.3). • In energy constrained portable devices, OS also manages power (section 4.3.4). • In mobile devices, OS & network support for mobile senders & receivers (section 11.7.6). Ubiquitous computing: smart devices, environments and interaction 6 Network-Oriented Management • Network viewpoint of ICT systems defines 2 main components (Section 3.1.2) – Computer nodes: system management – Network elements to interlink them: network management • Traditionally, a distinction is made between network management and system management although these two are inherently linked Ubiquitous computing: smart devices, environments and interaction 7 Network-Oriented Management • 2 approaches to manage heterogeneous content and applications with different requirements for jitter, delays and packet loss. 1. Keep management support in core network simple 2. management support in core network Ubiquitous computing: smart devices, environments and interaction 8 FCAPS • Why is good system management needed? • System & network downtime leads to lost revenue, opportunities and productivity. Ubiquitous computing: smart devices, environments and interaction 9 FCAPS • Standardization of common network management functions referred to as FCAP • FCAPS functions defines basic requirements for managing distributed computers and hence UbiCom systems. • TMN model for managing Open Systems within a telecommunications network defines four logical layers • FCAPS management functions spread across these logical layers. Ubiquitous computing: smart devices, environments and interaction 10 TMN Model Implementing FCAPS • Many computer service vendors offer client-server type implementations of FCAPS functions via various APIs, • Can support via – – – – SNMP. ICMP HTTP Open source implementations Ubiquitous computing: smart devices, environments and interaction 12 Simple Network Management Protocol (SNMP) model Main components of model consist of: • Network elements: things to be managed or not • Agent • proxies • Managers • network management information database MIB) • simple network management protocol (SNMP) Ubiquitous computing: smart devices, environments and interaction 13 SNMP SNMP use to Manage UbiCom Can use EDA to support management events including SNMP events (Section 3.3.3.6). SNMP benefits for UbiCom • ???? SNMP challenges for UbiCom • ??? Ubiquitous computing: smart devices, environments and interaction 15 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 16 Monitoring • Monitoring obtains the information required to support management functions. • Typical information includes ? • Monitoring can be configured how? Ubiquitous computing: smart devices, environments and interaction 17 Monitoring • . Monitoring involves three separate processes: – analysis – filtering – auditing. Ubiquitous computing: smart devices, environments and interaction 18 Monitoring • 2 main methods or protocols to monitor networked devices or hosts are to use – ICMP – SNMP Ubiquitous computing: smart devices, environments and interaction 19 Accounting • Track service usage and inform authorities about usage and usage costs • Set limits on resource usage. • Automatic handling when usage exceeds limits. Ubiquitous computing: smart devices, environments and interaction 20 ICMP • Internet Control Message Protocol or ICMP can be used to? • Protocol defines? – • ICMP Cons? Ubiquitous computing: smart devices, environments and interaction 21 Configuration Management Objectives: • Set or modify parameters that control routine operation • Track resources defined by their resource descriptions • Track changes in status of resources such as failures • Manage activation and deactivation of resources Ubiquitous computing: smart devices, environments and interaction 22 Configuration Management • A configuration is used as a specification of the settings that are – Variant: e.g., ?? – Invariant : e.g., ?? • Configuration management involves 4 main management functions: – ?? • Drivers for reconfiguration ? Ubiquitous computing: smart devices, environments and interaction 23 ReConfiguration Management Side effects of reconfiguration • Systems need to interrupt their service and reboot themselves for reconfiguration changes to take effect. • Configuration conflicts may also become common in multi domains managed UbiCom systems • Users can misconfigure devices Ubiquitous computing: smart devices, environments and interaction 24 Reconfiguration Management Easing Configuration & Avoiding Misconfiguration • Ideally, zero manual configuration of devices by users. • Devices should support automatic remote service discovery • Devices should support automatic device installation Ubiquitous computing: smart devices, environments and interaction 25 Fault Management • A fault is defined as the cause of one or more observed error, or abnormal, events. • Fault Management or Safety management concerns maintaining core ICT service operations. • Fault management overlaps with security management How? Ubiquitous computing: smart devices, environments and interaction 26 Fault Management • Detect the fault type of events that lead to system failure. • Organise and manage fault cascades in which a root fault leads to numerous child faults, generally the child faults should be suppressed. • Report faults to an appropriate authority or manager. • Automatic correction and handling of some faults. Ubiquitous computing: smart devices, environments and interaction 27 Fault Management • Fault management is crucial for maintaining the operation of critical infrastructures through monitoring, detecting, preventing and anticipating anomaly events – E.g., utility distribution, telecomms, transport, logistics, intelligent HVAC, banking, medicine etc. • Fault or safety management involves: – – – – – – – fault prevention, fault prediction, fault event monitoring, fault detection, fault diagnosis, fault handling fault-tolerance. Ubiquitous computing: smart devices, environments and interaction 28 Fault Management • Faults may be random or non-deterministic • Causes? Ubiquitous computing: smart devices, environments and interaction 29 Performance Management • Collect network statistics using polling or event push • Evaluate performance under normal and degraded conditions • Monitor events that exceed thresholds etc. Ubiquitous computing: smart devices, environments and interaction 30 Performance Management • Sometimes it may not be possible to specify absolute single point boundaries for system • There are several specific ways to manage performance: – Best effort – QoS – SLA. Ubiquitous computing: smart devices, environments and interaction 31 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 32 Security management • Security management concerns – assessment of risk of threats which cause some loss of value to system assets – heightened through any system vulnerabilities or weaknesses and developing – maintaining appropriate safeguards or security controls to protect assets against threats • 3 basic types of safeguard: – Detection, – Prevention – Correction • Both detection and correction offer a priori protection • Correction offers a posterior protection. Ubiquitous computing: smart devices, environments and interaction 33 Security Safeguards UbiCom System security can be modelled in terms of: • Viewpoints of sets of Safeguards that protect the system Assets (the items of value in a system) • against Threats (actions that actively value of assets) • V-SAT model of security Ubiquitous computing: smart devices, environments and interaction 34 V-SAT Model for Security Management 35 V-SAT Model for Security Management Example • Threat – Sender masquerade • Asset – Information about real sender shared with fake sender – Actions requested by a fake sender are performed by receiver. • Safeguards – Authenticate caller identity – Call back real sender – Strong password based access control Ubiquitous computing: smart devices, environments and interaction 36 Security Policies • Security management involves specifying 2 main relationships: – of threats against assets – of safeguards against assets. • A security policy specifies? – . • Security policies are often represented using? Ubiquitous computing: smart devices, environments and interaction 37 Risk Assessment • Risk assessment is used to model: – – – – the assets of value in a system their loss in value in relation to the probability of the threat happening and to the probability of the threat succeeding. • Information on which to quantify the risk of threats can be based upon? Ubiquitous computing: smart devices, environments and interaction 38 Encryption support for Confidentiality, Authentication and Authorisation • Core security techniques to safeguard distributed systems use – encryption & decryption, – symmetric or asymmetric keys, – to support confidentiality, authentication and authorisation. • Encryption algorithm or cipher: transforms clear or plain content into encrypted content using an encryption key. • Decryption algorithm: transform encrypted content back into plain content using a corresponding decryption key. Ubiquitous computing: smart devices, environments and interaction 39 Encryption support for Confidentiality, Authentication and Authorisation • In symmetric encryption, same key is used for encryption and decryption – Key needs to be kept secret – a secret key. • Key challenge here is how to distribute secret keys while keeping them confidential in transit. – ?? Ubiquitous computing: smart devices, environments and interaction 40 Asymmetric Encryption • Also called public key encryption algorithms • Public key is made available in an unrestricted fashion and used for encryption by the sender. • Private key, used to decrypt a message in the receiver & is kept secret by the receiver. • Private key cannot be derived from the public key. • This eases the problem of the sender and receiver having to somehow share the same secret key. • Public key encryption enables the public keys used for encryption to be made public. Ubiquitous computing: smart devices, environments and interaction 41 Authentication • Authorisation often involves authentication – • Although public key encryption can be used for authentication, a key issue is how does someone know that the public key belongs to a particular identity? • Anyone could claim that they hold a particular identity? • Something or someone is needed to attest that a particular identity is bound to a particular identity. – ??? Ubiquitous computing: smart devices, environments and interaction 42 Authentication • Mainstream approach involve identity certificate authorities. • In open environment, greater flexibility is useful in order for one party to authorise another party to act on their behalf. • Can some restrictions be removed to enable flexibility? • Cam we have Security without identification: privacy? Ubiquitous computing: smart devices, environments and interaction 43 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 44 Part ?: Overview • An analysis of the use of smart mobile devices reveals an increased risks compared to desktop computers • to secure middleware, • to secure access devices • to secure content, Ubiquitous computing: smart devices, environments and interaction 45 Securing the System and its Middleware Some examples of threats through the use of seamless (wireless) networks: • A) Compromised phones can as free-loader users in a local network; • B) Remote users can overload a network, preventing access by a local user; • C) Local and remote users can eavesdrop on a normal user. Ubiquitous computing: smart devices, environments and interaction 46 Securing the System and its Middleware Disappearing Security Perimeter Causes • use of seamless networks of IP networks everywhere, • Mobile users • Wireless access: interfere RF interference, eavesdropping • use of Unknown, Untrusted intermediaries: man- in-themiddle attack • connection in a session by a user to the wrong service • These increase risk of security breaches • Solutions? Ubiquitous computing: smart devices, environments and interaction 48 Securing Middleware • Some preventive and corrective type safeguards to handle denial of service threats to mobile devices have also been dealt with elsewhere • Remote Back-ups & occasional synchronisation (Section 12) • Remote-access model can be used to support a distributed UVE type desktop on the mobile device (Section 4.2) • Mobile devices can be designed to deal with the threat of volatile remote service access (Section 3.3.3.9) • Techniques based upon self-healing and self-protecting can also be used (Section 10.4) Ubiquitous computing: smart devices, environments and interaction 49 Securing Access Devices Devices may be left unsecure: • Because their owners expect that they will remain under their physical control, • When Devices are discarded: – • Often, devices with inbuilt network security are supplied in a wide open access mode without any security Ubiquitous computing: smart devices, environments and interaction 50 Securing Access Devices Risks of unsecure terminal • Tampering Solutions • tamper-proof devices • tamper-resistant devices • tamper-evident devices Ubiquitous computing: smart devices, environments and interaction 51 Securing Access Devices: To the Owner How to decide who owns & controls a smart device? • A policy model to support secure transient association could be used. – E.g., Resurrecting Duckling security policy Ubiquitous computing: smart devices, environments and interaction 52 Securing Access in Low Resource Devices • Low resource devices may lack the resources compute encryption or decryption within a reasonable amount of time. – Problems? – Solutions? , e.g., use Guy Fawkes protocol etc • Low resource devices may be prevented from conserving energy by preventing hibernation or sleep modes in device – – – – Sleep deprivation attack Barrage attack Problems? Solutions? Ubiquitous computing: smart devices, environments and interaction 53 Securing Information • Access to information is simpler to manage if it can be secured in the static sense at the point of access or where it resides using access control systems based upon policy management. • However, the design of highly distributed systems such as P2P systems (Section 3.2.6), inherently supports decentralized file sharing, allowing peer users a greater degree of autonomous control over their data and resources. • P2P system designs can also be designed to make file sharing anonymous so that a receiver may not known from which other peer computer, its information originated from. Ubiquitous computing: smart devices, environments and interaction 54 Securing Information • The aim of DRM is to secure distribution of content by restricting copying or conversion by consumers and owners – to balance between owners making several copies for personal use on several devices – versus someone distributing content for free or selling on content illegally. • Is DRM a suitable model for distributing content in a UbiCom environment? Ubiquitous computing: smart devices, environments and interaction 55 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 56 SOA Management • UbiCom system functions can be modelled as services (Section 3.2.4) & then managed as services. • Increasingly, systems management occurs – at a human social organisational level using policies and SLAs – to complement management at the ICT level of the system in terms of data throughput and transaction rate. Ubiquitous computing: smart devices, environments and interaction 57 Metrics for Evaluating the Use of SOA • Metrics to evaluate use of SOAs in pervasive environments: – – – – – service density, service availability, service potential, service impact service redundancy. • Two metrics for service composition are proposed: – service composition length – service composition sustainability. Ubiquitous computing: smart devices, environments and interaction 58 Distributed Resource Management & the Grid • What is a Grid (review)? – • GRID Resource Management System (RMS) component supports adaptability, extensibility, and scalability, allowing systems with different administrative policies: – – – – – to interoperate while preserving site autonomy, to co-allocate resources, to support load-balancing, to set and maintain quality of service to meet computational cost constraints. Ubiquitous computing: smart devices, environments and interaction 59 Grid model for Managing UbiCom Resources Challenges (review)? • UbiCom system resources vs. Grid computing resources • Managing resources must be considered at 2 different levels: – system level – application level • Management at both levels simultaneously is challenging because they have different performance goals. Ubiquitous computing: smart devices, environments and interaction 60 SLA Management of Services • In some SOA models, services are modelled more specifically as specifications of sets of operations that can be offered as part of a contract or a Service Level Agreement (SLA) between providers and users. • Contract specifies quantifiable operational targets or outcomes for service levels. • The operation of the services can then be monitored to see if any deviations from these targets occur. • Important applications for use of SLA for management? Ubiquitous computing: smart devices, environments and interaction 61 SLAs & Performance Audits • SLAs need performance models of 2 types of behaviour: – load performance – system performance. • Load model models the workload applied to the system and incorporates the behaviour of the users, • System model models the performance of services as these process user requests. • SLAs used in UbiCom systems also require models of how SLAs for individual services can be aggregated when individual services are combined into composite services Ubiquitous computing: smart devices, environments and interaction 62 Policy-based Service Management Core applications for policy-based management? • Security based policy-based management, particularly access control and user privacy management • Network-based management • Service management, mobility and context-aware management. • User level policy management can be used as part of a vision of iHCI (Section 5) • Autonomic computing (Section 10.4). Ubiquitous computing: smart devices, environments and interaction 63 Policy-based Service Management • Instead of managing the detailed low level (re)configuration of parts of the system, the user specifies high-level policies for the system using some policy model. • Policies can e represented in a range of representations – Light-weight KRs to heavy-weight KRs (Section 8.4) • Policy conflicts can arise because multiple policies may be triggered during the same point of an executing process. Ubiquitous computing: smart devices, environments and interaction 64 Policy Conflicts How to resolve policy conflicts? • Use of priorities • More specific rule takes precedence • Analysis of policies to assess merger of policies, • Use of negotiation (Chapter 9) • Use of voting (Chapter 9) Ubiquitous computing: smart devices, environments and interaction 65 Pervasive Work Flow Management for Services • Workflow as a means to compose & orchestrate services is discussed in Section 3.3.4. • Can manage pervasive workflows in terms of distributed control and distributed task assignment. • Here each device to be managed is assigned a role for the workflow and needs to have the local resources (fat client) to execute a local workflow engine. • Devices and the services or work offered can be dynamically discovered and scheduled. Ubiquitous computing: smart devices, environments and interaction 66 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 67 Information Management • Information management is central to UbiCom system management. • Any aspect of the system that needs to be managed operations can be modelled as information and then managed using information management techniques. • What Information characteristics that need to be managed? – information volume, persistence, integrity, distribution, discovery, namespace and interoperability. • These in turn are affected by information characteristics – E.g., hardness, richness and structure – Soft & Rich Information can be equated to intelligent system knowledge representations (Section 8.4)? Ubiquitous computing: smart devices, environments and interaction 68 Information • Data: raw input into data processes • Output the processed data is called information. • In practice these definitions of data & information overlap. • Focus of data management seems to be information storage , in practice is on information retrieval. • Information can be defined as a structure or syntax • Each type of information application & information provider uses different data structures for storage and retrieval. • Semantics & interpretation of information is often implicit & vaaries Ubiquitous computing: smart devices, environments and interaction 69 Rich versus Lean and Soft versus Hard Information • Current ICT system support for managing data focuses on lean, hard data used for specific operational tasks • However, Individual humans often use richer, softer data for daily activities & strategic business & organisational activities Ubiquitous computing: smart devices, environments and interaction 70 Operational Information Management Organisations’ information management focuses on: • Alphanumeric operational data • Multimedia operational data • Analysing data to make decisions about how well different parts of business are operating. • These are represented as lean, hard data, acquired in TPSs & stored in spread-sheets, file systems or RDBMSs. Ubiquitous computing: smart devices, environments and interaction 71 Personal Information Management • In terms of the use of information in daily activities of individuals there is a similar gap between – operational information to support daily tasks – versus information to support long term user activities & goals. • There are several key challenges here – ?? Ubiquitous computing: smart devices, environments and interaction 72 Managing the Information Explosion • numbers of UbiCom applications • range and No. of interactive devices that can sense the analogue physical world and can read and record multichannel, multimedia content • -> requires an ability to leverage and to cope with data explosion – E.g., in the My e-Director 2012 project, http://www.elec.qmul.ac.uk/people/stefan/projects/myed.html, – Aim is to make more audio-video recorded information sources available from multiple camera angles – to allow users to direct which camera angles, episodes in live sports events they view Ubiquitous computing: smart devices, environments and interaction 73 Managing the Information Explosion • Several studies have attempted to estimate the amount of information to be managed. • World produces new data at a rate of 2-3 exabytes / year. • How much data is generated to record a personal memory of visual and audio inputs of an individual throughout a typical lifetime (~80 years)? • Multimedia content is harder to manage compared to alphanumeric text. Why? Ubiquitous computing: smart devices, environments and interaction 74 Managing Lean & Hard Data: Using RDBMSs Why use RDBMSs to manage data? • ?? Challenges in using RDBMS to manage lean, hard data ? • Move from network-centric and application centric data manage approach to a data centric management approach which is network and application agnostic. Ubiquitous computing: smart devices, environments and interaction 75 Managing Metadata • Metadata, also referred to annotations, is information to self-describe data. • Ideally metadata should be stored with and bound to the data it is about. • Main benefits of the use of metadata are? • Challenges in using metadata? Ubiquitous computing: smart devices, environments and interaction 76 Managing Metadata • Metadata can be classified as: – application specific versus generic – Intensional vs. extensional data vs. internal data schema • Benefit of a metadata model for UbiCom systems to separate these concerns – ??? Ubiquitous computing: smart devices, environments and interaction 77 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 78 Service Management Models for Human User & Physical Environments • Dominant service management model used in smart devices is that they use a Remote Service Access Points (RSAP) model. • This is designed to advertise services in static and centralised directories and to bundle the services on offer at multi-service access portals that can be downloaded and installed locally in order to maintain services on the device. • Other service management models exist which differ with respect to: – how services are accessed – how service changes are managed Ubiquitous computing: smart devices, environments and interaction 79 Service Management Models for Human User & Physical Environments Service Management Models • Stand-alone • Services as Appliances • Remote Service Access Points • Service Contract • User Service Pool • Software as a Service (SaaS) • Self-managing Ubiquitous computing: smart devices, environments and interaction 80 Models that Reduce Complexity for User Management • For some users, the complexity of learning to use, to operate and to manage such systems is overwhelming because users may attempt to install services that are incompatible or too fragile to use with a particular service infrastructure. • Several types of service management model can minimise user management: – put the know-how and ‘intelligence’ to manage services into a generic service infrastructure, e.g., the Grid model; – use biologically inspired management. – Use service pools – Use appliance model etc – These are dealt with elsewhere in this chapter. Ubiquitous computing: smart devices, environments and interaction 81 User Task and Activity Based Management • Much of what is termed Personal Computers and personal computing is more suited towards office workers that work on single fixed tasks, in a relatively uninterrupted manner, for long periods of time. • In contrast there are other types of worker activity, that are prone to be interrupted, nomadic, of short duration and where multiple user activities are likely to be interleaved and used to achieve multiple user goals. • In user-centred services, users’ context for ICT events and service reconfiguration can be expressed at multiple knowledge viewpoints, – e.g., using the mental model of different users. HCI support for this is described in Section 5.5. KnowledgeUbiquitous computing: smart devices, environments and interaction 82 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 83 Privacy Requirements: Identity Management Identity management concerns: • Hiding the identity of users unless users give consent or their identity has to be legally known to someone • Managing various identity attributes and tokens of an individual person Ubiquitous computing: smart devices, environments and interaction 84 Biometric User Identification • These identify people by a unique biological characteristic: • Biometric systems can be based upon: – Behavioural trait, e.g., ??? – Physiological trait, e.g., ??? Ubiquitous computing: smart devices, environments and interaction 85 Biometric User Identification: Applications • Signature based identification is routinely used. Problems? – E.g., in banking ,but its accuracy is variable. • Finger-print identification is less routinely used – E.g., to detect crime; for security to access devices & resources – Complemented by use of DNA profiling to identify people. • Retinal scans – at airports can be used for access control Ubiquitous computing: smart devices, environments and interaction 86 Biometric Identification: Pros & Cons • Advantages? • Disadvantages? Ubiquitous computing: smart devices, environments and interaction 87 Content-based Feature Extraction & Classification Biometric Identification: Design Issues • Typically involves processing a biometric print to extract a multi-dimensional set of features – E.g., face recognition may involve identifying multiple feature dimensions involving head, eyes, mouth and nose and interrelations. • Design Issues? Ubiquitous computing: smart devices, environments and interaction 89 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 90 Privacy Management • Violation of individual privacy is an oft quoted UbiCom peril • Privacy: person’s identity and personal information are kept confidential from others. • Partial privacy rather than complete privacy is used to interact in society and in business – Here a person consents and entrust others with their identity and personal information. – E.g., ecommerce or voting to elect representatives,. • Full privacy in society, is regarded by some as equally perilous as a lack of privacy. Why? • There are many societal issues concerning privacy. Ubiquitous computing: smart devices, environments and interaction 91 Privacy Requirements • Anonymity versus Authentication • Unlinkability • Unobservability • Notifications, rights and consent Ubiquitous computing: smart devices, environments and interaction 92 Lack of Privacy • Causes for privacy invasion? – Personalisation • It becomes easier to identify who people are and what their behaviours are, referenced in time and space. – Why? Ubiquitous computing: smart devices, environments and interaction 93 Privacy: Safeguards • Several potential safeguards to protect personal privacy: – PET & PIT – Trusted Provider-based Platforms & policies – Privacy legislation • Multilateral approach to personal privacy is needed. Why? How? Ubiquitous computing: smart devices, environments and interaction 94 Privacy-Invasive Technologies versus Privacy Enhanced Technologies • Smart devices can be classified into whether or not they: – Invade privacy, Privacy-Invasive Technologies (PIT) or – Enhance privacy, Privacy Enhanced Technologies (PET) (Clarke, 2001). • However, in practice, there is more of a range from strong PET, through weak PET, to weak PIT, to strong PIT. • Idea of strong PET systems is to avoid use of 3rd party trust. • UbiCom device, designed to act as a weak PET – Can in practice end up being used as a weak PIT. Why? Ubiquitous computing: smart devices, environments and interaction 95 Entrusted Regulation of User Privacy to Service Providers • Platform for Privacy Preferences Project, P3P, developed by W3C, has been recommended as an industry standard, providing a simple, automated way for users to gain more control over the use of personal information on Web sites that they visit. • At its most basic level, P3P is a standardized set of multiple-choice questions, covering all the major aspects of a Web site's privacy policies. • Taken together, they present a clear snapshot of how a site handles personal information about its users. • P3P has several weaknesses? – ??? Ubiquitous computing: smart devices, environments and interaction 96 Legislative Approaches to Privacy • In a legislative approach to privacy, collectors of personal information are legally bound to provide a suitable means of notice and consent to users. • However, there are differences in legislative approaches to privacy internationally, – EU Data Privacy Directive incorporates a unique opt-in provision to give consent to personal information access by others. – U.S, data collectors presume consent, and require an affirmative opt-out by the user – Opt-in vs. opt out? Ubiquitous computing: smart devices, environments and interaction 97 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 98 Physical Environment Challenges: Management • Manage single dedicated tasks on embedded system using ASOS • Manage dust-sized devices that may get lost, move outside a prescribed management domain • Manage computer device interaction with physical environment • Manage interactions devices sited in unsupervised, shared physical spaces, e.g., wall mounted devices • Managing devices throughout their whole environment lifecycle including disposal. Ubiquitous computing: smart devices, environments and interaction 99 Context-Awareness Management 2 aspects of context management considered here: • using context-awareness itself to improve management of systems used for physical world activities and for human world activities • the operational management of context awareness throughout its life-cycle (Section 7.2). Ubiquitous computing: smart devices, environments and interaction 100 Context-aware Management of Physical and Human Activities • Several core applications of context-aware type systems to aid the management of the use of UbiCom systems: – Location-aware management of mobile goods and users to improve distribution or to reach a destination (Section 7.4), – Location-based access control – Service personalisation (Section 5.7..4) – ICT system management such as managing communication based upon the recipient’s ICT context (Section 7.6). – Context-aware Power Management (CAPM) – Context-aware Access Control Ubiquitous computing: smart devices, environments and interaction 101 Classifying User Activity as a Composite Context Classifying user activity upon a decision tree for individual contexts Context Management Challenges • Challenges in managing context-awareness is to perform context adaptation when faced with: – uncertainty, ambiguities, contradictions, logical inconsistencies, conflicts etc (Section 7.2.8). • Solutions – Data mining techniques – Prediction models – Learning Ubiquitous computing: smart devices, environments and interaction 103 Management of Tiny Devices • Critical part of the design of micro devices is very efficient power management – in terms of renewable, power storage and power consumption for both sensing, processing and data transmission, Section 4.3.4 • Complexity of design & verification as No. of available transistors grows – exponentially increasing productivity gap between these two. – How to tackle this? Ubiquitous computing: smart devices, environments and interaction 104 Managing Tiny Devices • Micro and nano devices may be untethered – i.e., are airborne or can be fluid born. – Can’t control movement, track them instead – It may be quite difficult to remove all instances of tiny devices , to contain them in a physical space etc • Micro and nano devices may be part of a larger system or environment • Embedded micro devices and macro devices often need to be left unattended for long periods, in relatively inaccessible environments – How to protect unattended devices? • If embedded devices face malicious or inadvertent failures – designed to be self-contained, to fail safe. Why? Ubiquitous computing: smart devices, environments and interaction 105 Chapter 12: Overview The slides for this chapter are split into several parts: • Part A: Core Management of UbiCom systems & CCI • Part B: Monitoring, Configuration, Fault & Performance Management • Part C: Security Management Basics • Part D: Security Management of Middleware, Terminals & Content • Part E: Service-Oriented Management of CCI • Part F: Information Management of CCI • Part G: Managing HCI • Part H: Privacy Management: Identification • Part I: Privacy Management: Requirements & Safeguards • Part J: Managing HPI Ubiquitous computing: smart devices, environments and interaction 106 Summary Ubiquitous computing: smart devices, environments and interaction 107 Revision For each chapter • See book web-site for chapter summaries, references, resources etc. • Identify new terms & concepts • Apply new terms and concepts: define, use in old and new situations & problems • Debate problems, challenges and solutions • See Chapter exercises on web-site Ubiquitous computing: smart devices, environments and interaction 108 Exercises: Define New Concepts • Service Appliance Ubiquitous computing: smart devices, environments and interaction 109 Exercise: Applying New Concepts Ubiquitous computing: smart devices, environments and interaction 110