{"title":"Ubiquitous Computing and its Security Concerns","authors":"Omar Ahmed Al-Motwakel, Ammar T. Zahary","doi":"10.1109/ICOICE48418.2019.9035152","DOIUrl":null,"url":null,"abstract":"This paper describes the perception of Ubiquitous as well as its security concerns. The recent deploying of smart devices increase the ubiquitous computing, the emanated computing allows anytime & anywhere computing to be possible. With the raise of technology will increase the concerns about security as well as privacy. Thus, it is important to be aware about every technology before using it. This paper explains the information and the security of Ubiquitous computing, Internet Of the Things, and Context Aware, to increase knowledge about ubiquitous terminologies and provide tips that will help in the real word for the technology provider as well as the technology users. The ubiquitous information will provide the awareness about Ubiquitous terminologies (terms), technologies, uses, and tools, as well as the advantages of ubiquitous computing. This paper also shows the concern of the security and privacy of ubiquitous computing and describes the ubiquitous technologies that could be helpful. Ubiquitous computing is increasingly recognized as a serious, worldwide public security and privacy concern; therefore, this paper explains the disadvantages of ubiquity, and the risks of ubiquity. Finally, this paper ends with some security and privacy techniques that are suggested in ubiquitous computing protection.","PeriodicalId":109414,"journal":{"name":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 First International Conference of Intelligent Computing and Engineering (ICOICE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOICE48418.2019.9035152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper describes the perception of Ubiquitous as well as its security concerns. The recent deploying of smart devices increase the ubiquitous computing, the emanated computing allows anytime & anywhere computing to be possible. With the raise of technology will increase the concerns about security as well as privacy. Thus, it is important to be aware about every technology before using it. This paper explains the information and the security of Ubiquitous computing, Internet Of the Things, and Context Aware, to increase knowledge about ubiquitous terminologies and provide tips that will help in the real word for the technology provider as well as the technology users. The ubiquitous information will provide the awareness about Ubiquitous terminologies (terms), technologies, uses, and tools, as well as the advantages of ubiquitous computing. This paper also shows the concern of the security and privacy of ubiquitous computing and describes the ubiquitous technologies that could be helpful. Ubiquitous computing is increasingly recognized as a serious, worldwide public security and privacy concern; therefore, this paper explains the disadvantages of ubiquity, and the risks of ubiquity. Finally, this paper ends with some security and privacy techniques that are suggested in ubiquitous computing protection.