Abstract

This paper describes the perception of Ubiquitous as well as its security concerns. The recent deploying of smart devices increase the ubiquitous computing, the emanated computing allows anytime & anywhere computing to be possible. With the raise of technology will increase the concerns about security as well as privacy. Thus, it is important to be aware about every technology before using it. This paper explains the information and the security of Ubiquitous computing, Internet Of the Things, and Context Aware, to increase knowledge about ubiquitous terminologies and provide tips that will help in the real word for the technology provider as well as the technology users. The ubiquitous information will provide the awareness about Ubiquitous terminologies (terms), technologies, uses, and tools, as well as the advantages of ubiquitous computing. This paper also shows the concern of the security and privacy of ubiquitous computing and describes the ubiquitous technologies that could be helpful. Ubiquitous computing is increasingly recognized as a serious, worldwide public security and privacy concern; therefore, this paper explains the disadvantages of ubiquity, and the risks of ubiquity. Finally, this paper ends with some security and privacy techniques that are suggested in ubiquitous computing protection.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.