CFP last date
20 June 2024
Reseach Article

Classification and Handling of Anonymity in Pervasive Middleware

by G.Radhamani, K.Vanitha, D.Rajeswari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 17 - Number 6
Year of Publication: 2011
Authors: G.Radhamani, K.Vanitha, D.Rajeswari
10.5120/2223-2833

G.Radhamani, K.Vanitha, D.Rajeswari . Classification and Handling of Anonymity in Pervasive Middleware. International Journal of Computer Applications. 17, 6 ( March 2011), 28-31. DOI=10.5120/2223-2833

@article{ 10.5120/2223-2833,
author = { G.Radhamani, K.Vanitha, D.Rajeswari },
title = { Classification and Handling of Anonymity in Pervasive Middleware },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 17 },
number = { 6 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume17/number6/2223-2833/ },
doi = { 10.5120/2223-2833 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:04:54.545538+05:30
%A G.Radhamani
%A K.Vanitha
%A D.Rajeswari
%T Classification and Handling of Anonymity in Pervasive Middleware
%J International Journal of Computer Applications
%@ 0975-8887
%V 17
%N 6
%P 28-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Pervasive devices are deployed in the world anywhere at any time that makes an adaption to the changes in the dynamic environment based on the user mobility. New device enquiry, registration and adaption are major issues in such pervasive devices. As well as handling unacknowledged communication that causes anonymity is also a considerable issue. Above aspects referred as anonymity in pervasive computing. Middleware is an intermediate software application that connects pervasive devices. Therefore in this paper we define the presence of anonymity in pervasive environments using the said issues. We also analyze and compare few middleware applications for handling anonymity.

References
  1. Vesa Kautto, “Middleware for Pervasive Computing”, HUT, Telecommunications Software and Multimedia Laboratory, 2001.
  2. Christian Becker, Gregor Schiele, Holger Gubbels and Kurt Rotherme, “BASE -A Micro broker- Based Middleware for Pervasive Computing ” University of Stuttgart Institute of Parallel and Distributed Systems (IPVS), Breitwiesenstr. 20-22, 70565 Stuttgart, Germany.
  3. Roberto Speicys Cardoso, Pierre-Guillaume Raverdy and Valeŕie Issarny, “A Privacy-Aware Service Discovery Middleware for Pervasive Environments”, Inria Rocquencourt 78153 Le Chesnay, France.
  4. Stelios Dritsas, Dimitris Gritzalisa, Costas Lambrinoudakis, “Protecting privacy and anonymity in pervasive computing: trends and perspectives”, Volume 23 Issue 3, August 2006.
  5. Stephen S. Yau, Fariaz Karim, YuWang, Bin Wang and Sandeep K.S. Gupta, “Reconfigurable Context Sensitive Middleware for Pervasive Computing”, Arizona State Arizona State Volume 1 Issue 3, July 2002.
  6. Seth Holloway, Drew Stovall, Jorge Lara-Garduno and Christine Julien, “Opening Pervasive Computing to the Masses Using the SEAP Middleware”, Mobile and Pervasive Computing Group, The University of Texas at Austin , March 2009.
  7. R. Jason Weiss and J. Philip Craiger, “Ubiquitous Computing”, University of Nebraska–Omaha, Volume 39 Number 4 April 2002.
  8. Wassim Masri, Zoubir Mammeri, "Middleware for Wireless Sensor Networks: A Comparative Analysis," IFIP International Conference on Network and Parallel Computing Workshops, September 2007.
  9. Václav Slováček, Miroslav Macík and Martin Klíma “Development Framework for Pervasive Computing Applications”, Czech Technical University in Prague, Faculty of Electrical Engineering, Department of Computer Graphics and Interaction, September 2009.
  10. Md.Atiqur Rahman, “Middleware for wireless sensor networks: Challenges and Approaches”, April 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Pervasive device Anonymity Middleware Adaptation