Safety
Safety and Security Enhancement for Privacy of Users in Pervasive Computing via P3P and APPEL Protocols
1Somayeh Jafari, 2Masumeh Jafari, 3Fatemeh Saberi, 4Rouhollah Yazdani, 5Shiva Darijani
1Department of Computer Engineering, Mashhad Branch, Islamic Azad University, Mashhad, Iran (Corresponding Author)
2Department of Computer Engineering, University of Pnu, Shahre Babak Center, Iran
3Department of Computer Engineering, University of Pnu, Shahre Babak Center, Iran
4Department of Computer Engineering, University of Azad, Kerman Center, Iran
5Department of Computer Engineering, University of Azad, Bam Center, Iran
Abstract: This paper explores the challenges facing pervasive computing deals. Pervasive computing environment and the future of computing is a new approach Computers and computing environments, and is intended to accommodate the daily lives of people And it should always be an invisible component. Security is a significant challenge in pervasive computing environment. In this paper, the security of AES has two key protocols. This paper addresses the issue of privacy as a complementary discussion of standards, protocols, tools and other related subjects has been analyzed with it. The key factor to preserve user privacy, without which it cannot be universal computation. Provide guidelines for appropriate interaction with the user-defined policies and compliance for working with user data collected by the central argument of this article. This approach uses a system that detects the position of the building is created based on wireless signal strength meter works.Privacy preservation is also using P3P and APPEL related protocols is done by the system. Finally, simulation results are presented. Method is to compare the simulation a similar system using both real system implementation and Privacy Policy and poster presentations of new models, Terms of service to users by comparing the time being.
[Somayeh Jafari, Masumeh Jafari, Fatemeh Saberi. Rouhollah Yazdani, Shiva Darijani, Safety and Security Enhancement for Privacy of Users in Pervasive Computing via P3P and APPEL Protocols. Life Sci J 2013; 10(7s):139-147] (ISSN: 1097-8135).http://www.lifesciencesite.com. 3
Keywords; Industrial security applications; Local area identification; Pervasive computing environments; Security supportive architectures.