Loading

Privacy in Pervasive Computing Environment
Gnaneshwari G. R1, M. S. Hema2

1Gnaneshwari G R, Research Scholar, Sri Venkateshwara College of Engineering, Bangalore (Karnataka), India.
2M. S. Hema, Department of Computer Science, Aurora & Scientific Technological and Research Academy, Hyderabad (Telangana), India.
Manuscript received on 21 July 2019 | Revised Manuscript received on 03 August 2019 | Manuscript Published on 10 August 2019 | PP: 918-923 | Volume-8 Issue-2S3 July 2019 | Retrieval Number: B11730782S319/2019©BEIESP | DOI: 10.35940/ijrte.B1173.0782S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Pervasive computing evolved tremendously as an exciting new paradigm to provide data collection, computing, and communication services all the time and everywhere. It has introduced a new world of computing and became an integral part of many fields and application domains. It allows users to interact with wired and wireless networks that support any information technology. In spite of many advantages associated with pervasive computing, communication services have some security risks. For sensitive and confidential data there should be some security mechanisms. In this paper, we present privacy issues and challenges that are preventing people from adopting the pervasive computing environment and we give a survey on the solutions that have been carried to minimize risks.
Keywords: Privacy Preserving; Pervasive Computing Environment; Access Control; Authentication; Anonymity.
Scope of the Article: High Performance Computing