Secure and efficient data extraction for ubiquitous computing applications

Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous compu...

Full description

Bibliographic Details
Main Author: Tan, Chiu Chiang
Format: Others
Language:English
Published: W&M ScholarWorks 2010
Subjects:
Online Access:https://scholarworks.wm.edu/etd/1539623571
https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3362&context=etd
id ndltd-wm.edu-oai-scholarworks.wm.edu-etd-3362
record_format oai_dc
spelling ndltd-wm.edu-oai-scholarworks.wm.edu-etd-33622019-05-16T03:23:14Z Secure and efficient data extraction for ubiquitous computing applications Tan, Chiu Chiang Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous computing systems are built using small, embedded devices with limited computational, storage and communication abilities. A common requirement for many ubiquitous computing applications is to utilize the data from these small devices to perform more complex tasks. For critical applications such as healthcare or medical related applications, there is a need to ensure that only authorized users have timely access to the data found in the small device. In this dissertation, we study the problem of how to securely and efficiently extract data from small devices.;Our research considers two categories of small devices that are commonly used in ubiquitous computing, battery powered sensors and battery free RFID tags. Sensors are more powerful devices equipped with storage and sensing capabilities that are limited by battery power, whereas tags are less powerful devices with limited functionalities, but have the advantage of being operable without battery power. We also consider two types of data access patterns, local and remote access. In local data access, the application will query the tag or the sensor directly for the data, while in remote access, the data is already aggregated at a remote location and the application will query the remote location for the necessary information, The difference between local and remote access is that in local access, the tag or sensor only needs to authenticate the application before releasing the data, but in remote access, the small device may have to perform additional processing to ensure that the data remains secure after being collected. In this dissertation, we present secure and efficient local data access solutions for a single RFID tag, multiple RFID tags, and a single sensor, and remote data access solutions for both RFID tag and sensor. 2010-01-01T08:00:00Z text application/pdf https://scholarworks.wm.edu/etd/1539623571 https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3362&context=etd © The Author Dissertations, Theses, and Masters Projects English W&M ScholarWorks Computer Sciences
collection NDLTD
language English
format Others
sources NDLTD
topic Computer Sciences
spellingShingle Computer Sciences
Tan, Chiu Chiang
Secure and efficient data extraction for ubiquitous computing applications
description Ubiquitous computing creates a world where computers have blended seamlessly into our physical environment. In this world, a "computer" is no longer a monitor-and-keyboard setup, but everyday objects such as our clothing and furniture. Unlike current computer systems, most ubiquitous computing systems are built using small, embedded devices with limited computational, storage and communication abilities. A common requirement for many ubiquitous computing applications is to utilize the data from these small devices to perform more complex tasks. For critical applications such as healthcare or medical related applications, there is a need to ensure that only authorized users have timely access to the data found in the small device. In this dissertation, we study the problem of how to securely and efficiently extract data from small devices.;Our research considers two categories of small devices that are commonly used in ubiquitous computing, battery powered sensors and battery free RFID tags. Sensors are more powerful devices equipped with storage and sensing capabilities that are limited by battery power, whereas tags are less powerful devices with limited functionalities, but have the advantage of being operable without battery power. We also consider two types of data access patterns, local and remote access. In local data access, the application will query the tag or the sensor directly for the data, while in remote access, the data is already aggregated at a remote location and the application will query the remote location for the necessary information, The difference between local and remote access is that in local access, the tag or sensor only needs to authenticate the application before releasing the data, but in remote access, the small device may have to perform additional processing to ensure that the data remains secure after being collected. In this dissertation, we present secure and efficient local data access solutions for a single RFID tag, multiple RFID tags, and a single sensor, and remote data access solutions for both RFID tag and sensor.
author Tan, Chiu Chiang
author_facet Tan, Chiu Chiang
author_sort Tan, Chiu Chiang
title Secure and efficient data extraction for ubiquitous computing applications
title_short Secure and efficient data extraction for ubiquitous computing applications
title_full Secure and efficient data extraction for ubiquitous computing applications
title_fullStr Secure and efficient data extraction for ubiquitous computing applications
title_full_unstemmed Secure and efficient data extraction for ubiquitous computing applications
title_sort secure and efficient data extraction for ubiquitous computing applications
publisher W&M ScholarWorks
publishDate 2010
url https://scholarworks.wm.edu/etd/1539623571
https://scholarworks.wm.edu/cgi/viewcontent.cgi?article=3362&context=etd
work_keys_str_mv AT tanchiuchiang secureandefficientdataextractionforubiquitouscomputingapplications
_version_ 1719185822602756096