SlideShare a Scribd company logo
1
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (50)
Drilling Down - The Difficult Problems (27)
 4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.2
 [LTL:] Hypothesis: Talking about “balancing proactivity and
transparency” (see the paper) seems author’s mistake
 Balancing of X an Y is needed only when:
 More X can be obtained by reducing Y AND More Y can be obtained
by reducing X
 Here can have 100% proactivity with either 0% or 100%
transparency
 [LTL:] Finding (“balancing”) proper level of transparency for
proactivity
 If too little or too much of proactivity transparency annoys a user
 => The goal of proactivity transparency is defeated
 Need careful PERV design
 Finding the proper transparency level by:
 System’s self-tuning
 A mobile user’s need & tolerance for proactivity (UNTP) are likely
to be closely related to his level of expertise on a task & his
familiarity with his environment
 A system that can infer UNTP by observing user behavior &
context is better positioned to find the proper balance
2
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (51)
Drilling Down - The Difficult Problems (28)
 4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont3
 Historically, transparency (not just for proactivity) was the ideal
in system design
 E.g., caching is attractive in distributed file systems because it is
completely transparent
 Ironically, sometimes users are hurt/annoyed by complete
transparency
 E.g., servicing a cache miss on a large file over a low-bandwidth
wireless network — so slow that most users would rather be
asked first by the system if they really need the file
 However, too many questions from file system can annoy the user
That is, again annoyed by too low level of transparency
 A solution to this dilemma (suggested by Coda File System [21])
 On a cache miss, Coda consults an internally-maintained user
patience model to predict whether the user will not be
annoyed by a transparent fetch request
 If so, the fetch is handled transparently (user interaction is
suppressed)
 Many subtle problems arise in designing a system that walks
the fine line between annoying visibility & inscrutable (hard to
understand) transparency
3
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (52)
Drilling Down - The Difficult Problems (29)
 4.7. Balancing Transparency in Proactivity – some research
problems:
 How are individual user preferences and tolerances specified and
taken into account?
 Are these static or do they change dynamically?
 What cues can such a system use to determine if [LTL:] transparency
level is too low/high?
 Is explicit interaction with the user to obtain this information acceptable?
 Or, would such explicit interaction to obtain be an annoyance too?
 Can one provide systematic design guidelines to application designers
to help in this task?
 Can one retrofit [transparency] balancing mechanisms into existing
applications?
4
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (53)
Drilling Down - The Difficult Problems (30)
 4.8) Privacy and Trust
 Privacy is greatly complicated by PERV
 Was already a thorny problem in DISTR and MOBI
 Some PERV mechanisms “spy” on user actions on an
almost continuous basis
 E.g., location tracking, smart spaces, use of surrogates
 As a user becomes more dependent on PERV =>
PERV obtains more information about the user
 I.e., about user’s movements, behavior patterns, habit, …
 Exploiting this information is critical to successful
proactivity & self-tuning
 Unless use of information is strictly controlled, it can hurt the user
 Illegitimate uses ranging from targeted spam to blackmail.
 Potential for serious loss of privacy may deter knowledgeable
users from using a PERV system
5
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (54)
Drilling Down - The Difficult Problems (31)
 4.8) Privacy and Trust - cont.
 Mutual trust between infrastructure & users in PERV
 Greater reliance on infrastructure => users must trust
infrastructure to a considerable extent
 Conversely, the infrastructure needs to be confident of
the users’ identity and authorization levels before
responding to their requests
 It is a difficult challenge to establish this mutual trust with
minimal intrusiveness (= mimnimal visibility & thus maximum
transparency)
 System identifies/authorizes users in intrusive (visible)
way
6
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (55)
Drilling Down - The Difficult Problems (32)
 4.8. Privacy and Trust - cont
 Privacy and trust are likely to be enduring problems in
pervasive computing
 Privacy and trust – some research questions:
 How does one strike the right balance between seamless system
behavior and the need to alert users to potential loss of privacy?
 What are the mechanisms, techniques and design principles relevant
to this problem? How often should the system remind a user that his
actions are being recorded? When and how can a user turn off
monitoring in a smart space?
 What are the authentication techniques best suited to PERV?
 Are password-based challenge-response protocols such as Kerberos
[36] adequate or are more exotic techniques such as biometric
authentication [15] necessary?
 What role, if any, can smart cards [14] play?
 How does one express generic identities in access control?
 E.g., how does one express security constraints such as ‘‘Only the
person currently using the projector in this room can set its lighting
level?’’ Or: ‘‘Only employees of our partner companies can negotiate
QoS properties in this smart space?’’
7
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (56)
Drilling Down - The Difficult Problems (33)
 4.9) Impact on Layering [of the System]
 A recurring theme in this paper: the merging of
information from diverse layers of a PERV system to
produce an effective response
 E.g., Scenario 1 shows the value of combining low-level resource
information (network bandwidth) with high-level context
information (airport gate information)
 Proactivity and adaptation based on corrective actions =>
exposure of much more information across layers
 Much more than is typical in systems today
 We want layering – it has benefits
 Cleanly separates abstraction from implementation
 Thus consistent with sound software engineering
 Conducive to standardization
 Encourages the creation of modular software components
8
© 2007 by Leszek T. Lilien
Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001
Pervasive Computing vs. Distributed Systems & Mobile Computing (57)
Drilling Down - The Difficult Problems (34)
 4.9) Impact on Layering [of the System] – cont.
 Deciding how to decompose a complex system into layers
or modules is nontrivial
 Remains very much an art rather than a science
 The two most widely-used guidelines for layering
 Parnas’ principle of information hiding [26]
 Saltzer et al.’s end-to-end principle[28]
Both developed long before pervasive computing was
conceived
 Parnas’ - early 1970’s
 Saltzer et al.’s - early 1980’s

More Related Content

PPT
Sec.0a--Intro to pervasive computing 7.ppt
PPT
Sec.0a--Intro to pervasive computing 5.ppt
PPT
Sec.0a--Intro to pervasive computing 2.ppt
PPT
Sec.0a--Intro to pervasive computing 6.ppt
PDF
mnjkhhjggfhjkl;kjhgf hgghgfffd hghzss.pdf
PPT
Sec.0a--Intro to pervasive computing 9.ppt
PDF
PPT
Sec.0a--Intro to pervasive computing 4.ppt
Sec.0a--Intro to pervasive computing 7.ppt
Sec.0a--Intro to pervasive computing 5.ppt
Sec.0a--Intro to pervasive computing 2.ppt
Sec.0a--Intro to pervasive computing 6.ppt
mnjkhhjggfhjkl;kjhgf hgghgfffd hghzss.pdf
Sec.0a--Intro to pervasive computing 9.ppt
Sec.0a--Intro to pervasive computing 4.ppt

Similar to Sec.0a--Intro to pervasive computing 8.ppt (20)

PPT
Sec.0a--Intro to pervasive computing 1.ppt
PPTX
Lecture03.pptx
DOCX
DISTRIBUTED SYSTEM.docx
PDF
chapter 1-Introductionkkkclll;;;x;lc,.pdf
PDF
Intro ds 1
PDF
Security Attacks And Solutions On Ubiquitous Computing Networks
PDF
A New And Efficient Hybrid Technique For The Automatic...
DOCX
Distributed system Tanenbaum chapter 1,2,3,4 notes
PPTX
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
PDF
Lecture 1 distriubted computing
PPTX
Introduction to Distributed System
PPTX
01 - Introduction to Distributed Systems
PDF
DS Unit I to III MKU Questions.pdf
PDF
9fcfd50a69d9647585
PPT
Chap 01 lecture 1distributed computer lecture
PDF
A multi agent based decision mechanism for incident reaction in telecommunica...
PDF
A multi agent based decision mechanism for incident reaction in telecommunica...
PDF
METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE A...
PDF
Metric for Evaluating Availability of an Information System : A Quantitative ...
PDF
A security decision reaction architecture for heterogeneous distributed network
Sec.0a--Intro to pervasive computing 1.ppt
Lecture03.pptx
DISTRIBUTED SYSTEM.docx
chapter 1-Introductionkkkclll;;;x;lc,.pdf
Intro ds 1
Security Attacks And Solutions On Ubiquitous Computing Networks
A New And Efficient Hybrid Technique For The Automatic...
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed System Unit 1 Notes by Dr. Nilam Choudhary, SKIT Jaipur
Lecture 1 distriubted computing
Introduction to Distributed System
01 - Introduction to Distributed Systems
DS Unit I to III MKU Questions.pdf
9fcfd50a69d9647585
Chap 01 lecture 1distributed computer lecture
A multi agent based decision mechanism for incident reaction in telecommunica...
A multi agent based decision mechanism for incident reaction in telecommunica...
METRIC FOR EVALUATING AVAILABILITY OF AN INFORMATION SYSTEM: A QUANTITATIVE A...
Metric for Evaluating Availability of an Information System : A Quantitative ...
A security decision reaction architecture for heterogeneous distributed network
Ad

More from ahmadfaisal744721 (14)

PDF
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
PPTX
Intoduction to Graph.pptx
PPT
Introduction to Android.ppt
PPT
Topics-Ch4Ch5.ppt
PPTX
db design and maintenance part 1.pptx
PPTX
Chapter 4v4 Network protocols and standards 2.pptx
PPTX
Chapter 4v4 Network protocols and standards 1.pptx
PPTX
Chapter 3v3 Mobile communication systems.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
PPTX
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
PPT
Sec.0a--Intro to pervasive computing 3.ppt
PPTX
write no image.pptx
PPT
Topics-Ch4Ch5.ppt
PPT
javascript-basics.ppt
Introduction+to+AngularJS+with+logo+from+digital+ocean.pdf
Intoduction to Graph.pptx
Introduction to Android.ppt
Topics-Ch4Ch5.ppt
db design and maintenance part 1.pptx
Chapter 4v4 Network protocols and standards 2.pptx
Chapter 4v4 Network protocols and standards 1.pptx
Chapter 3v3 Mobile communication systems.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 2.pptx
Chapter 2v4 Pervasive Computing systems, design and infrastructure 1.pptx
Sec.0a--Intro to pervasive computing 3.ppt
write no image.pptx
Topics-Ch4Ch5.ppt
javascript-basics.ppt
Ad

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PDF
System and Network Administration Chapter 2
PDF
Nekopoi APK 2025 free lastest update
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
ai tools demonstartion for schools and inter college
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PPTX
Computer Software and OS of computer science of grade 11.pptx
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
Digital Strategies for Manufacturing Companies
System and Network Administration Chapter 2
Nekopoi APK 2025 free lastest update
Design an Analysis of Algorithms II-SECS-1021-03
ai tools demonstartion for schools and inter college
Wondershare Filmora 15 Crack With Activation Key [2025
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
CHAPTER 2 - PM Management and IT Context
How to Choose the Right IT Partner for Your Business in Malaysia
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Reimagine Home Health with the Power of Agentic AI​
Navsoft: AI-Powered Business Solutions & Custom Software Development
How to Migrate SBCGlobal Email to Yahoo Easily
wealthsignaloriginal-com-DS-text-... (1).pdf
Computer Software and OS of computer science of grade 11.pptx
PTS Company Brochure 2025 (1).pdf.......
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Which alternative to Crystal Reports is best for small or large businesses.pdf
Upgrade and Innovation Strategies for SAP ERP Customers

Sec.0a--Intro to pervasive computing 8.ppt

  • 1. 1 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (50) Drilling Down - The Difficult Problems (27)  4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont.2  [LTL:] Hypothesis: Talking about “balancing proactivity and transparency” (see the paper) seems author’s mistake  Balancing of X an Y is needed only when:  More X can be obtained by reducing Y AND More Y can be obtained by reducing X  Here can have 100% proactivity with either 0% or 100% transparency  [LTL:] Finding (“balancing”) proper level of transparency for proactivity  If too little or too much of proactivity transparency annoys a user  => The goal of proactivity transparency is defeated  Need careful PERV design  Finding the proper transparency level by:  System’s self-tuning  A mobile user’s need & tolerance for proactivity (UNTP) are likely to be closely related to his level of expertise on a task & his familiarity with his environment  A system that can infer UNTP by observing user behavior & context is better positioned to find the proper balance
  • 2. 2 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (51) Drilling Down - The Difficult Problems (28)  4.7) [LTL:] Proactivity and Its Transparency [Paper: Balancing Proactivity and Transparency] – cont3  Historically, transparency (not just for proactivity) was the ideal in system design  E.g., caching is attractive in distributed file systems because it is completely transparent  Ironically, sometimes users are hurt/annoyed by complete transparency  E.g., servicing a cache miss on a large file over a low-bandwidth wireless network — so slow that most users would rather be asked first by the system if they really need the file  However, too many questions from file system can annoy the user That is, again annoyed by too low level of transparency  A solution to this dilemma (suggested by Coda File System [21])  On a cache miss, Coda consults an internally-maintained user patience model to predict whether the user will not be annoyed by a transparent fetch request  If so, the fetch is handled transparently (user interaction is suppressed)  Many subtle problems arise in designing a system that walks the fine line between annoying visibility & inscrutable (hard to understand) transparency
  • 3. 3 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (52) Drilling Down - The Difficult Problems (29)  4.7. Balancing Transparency in Proactivity – some research problems:  How are individual user preferences and tolerances specified and taken into account?  Are these static or do they change dynamically?  What cues can such a system use to determine if [LTL:] transparency level is too low/high?  Is explicit interaction with the user to obtain this information acceptable?  Or, would such explicit interaction to obtain be an annoyance too?  Can one provide systematic design guidelines to application designers to help in this task?  Can one retrofit [transparency] balancing mechanisms into existing applications?
  • 4. 4 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (53) Drilling Down - The Difficult Problems (30)  4.8) Privacy and Trust  Privacy is greatly complicated by PERV  Was already a thorny problem in DISTR and MOBI  Some PERV mechanisms “spy” on user actions on an almost continuous basis  E.g., location tracking, smart spaces, use of surrogates  As a user becomes more dependent on PERV => PERV obtains more information about the user  I.e., about user’s movements, behavior patterns, habit, …  Exploiting this information is critical to successful proactivity & self-tuning  Unless use of information is strictly controlled, it can hurt the user  Illegitimate uses ranging from targeted spam to blackmail.  Potential for serious loss of privacy may deter knowledgeable users from using a PERV system
  • 5. 5 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (54) Drilling Down - The Difficult Problems (31)  4.8) Privacy and Trust - cont.  Mutual trust between infrastructure & users in PERV  Greater reliance on infrastructure => users must trust infrastructure to a considerable extent  Conversely, the infrastructure needs to be confident of the users’ identity and authorization levels before responding to their requests  It is a difficult challenge to establish this mutual trust with minimal intrusiveness (= mimnimal visibility & thus maximum transparency)  System identifies/authorizes users in intrusive (visible) way
  • 6. 6 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (55) Drilling Down - The Difficult Problems (32)  4.8. Privacy and Trust - cont  Privacy and trust are likely to be enduring problems in pervasive computing  Privacy and trust – some research questions:  How does one strike the right balance between seamless system behavior and the need to alert users to potential loss of privacy?  What are the mechanisms, techniques and design principles relevant to this problem? How often should the system remind a user that his actions are being recorded? When and how can a user turn off monitoring in a smart space?  What are the authentication techniques best suited to PERV?  Are password-based challenge-response protocols such as Kerberos [36] adequate or are more exotic techniques such as biometric authentication [15] necessary?  What role, if any, can smart cards [14] play?  How does one express generic identities in access control?  E.g., how does one express security constraints such as ‘‘Only the person currently using the projector in this room can set its lighting level?’’ Or: ‘‘Only employees of our partner companies can negotiate QoS properties in this smart space?’’
  • 7. 7 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (56) Drilling Down - The Difficult Problems (33)  4.9) Impact on Layering [of the System]  A recurring theme in this paper: the merging of information from diverse layers of a PERV system to produce an effective response  E.g., Scenario 1 shows the value of combining low-level resource information (network bandwidth) with high-level context information (airport gate information)  Proactivity and adaptation based on corrective actions => exposure of much more information across layers  Much more than is typical in systems today  We want layering – it has benefits  Cleanly separates abstraction from implementation  Thus consistent with sound software engineering  Conducive to standardization  Encourages the creation of modular software components
  • 8. 8 © 2007 by Leszek T. Lilien Based on: M. Satyanarayanan, “Pervasive Computing: Vision and Challenges,” IEEE Personal Communications, 2001 Pervasive Computing vs. Distributed Systems & Mobile Computing (57) Drilling Down - The Difficult Problems (34)  4.9) Impact on Layering [of the System] – cont.  Deciding how to decompose a complex system into layers or modules is nontrivial  Remains very much an art rather than a science  The two most widely-used guidelines for layering  Parnas’ principle of information hiding [26]  Saltzer et al.’s end-to-end principle[28] Both developed long before pervasive computing was conceived  Parnas’ - early 1970’s  Saltzer et al.’s - early 1980’s