Accountable Communication in Ubiquitous Computing

  • I. S. N. PradeepEmail author
  • K. Athmaram
  • K. Mritymjaya Rao
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1054)


This is a cognitive computing era with Internet of things (IoT) revolution, and ubiquitous computing concept is going to come alive soon. Today, we depend on our smart devices almost for every reason. Most of the gadgets designed to habituate private information sharing mechanisms to fellow users via social media. However, dependency and security are two sides of the coin. With reference to existing literature, various means of security recommendations in server/hosting device/cloud point view like private set insertion (PSI) protocol, private information retrieval (PIR) protocol, etc. but inadequate details present on how to control the sharing at end-user’s end. The research is motivated by practical usage of certain gadgets, while they started sharing the statistical reports in social media, along with important private information, where we could not control the flow even after the uninstallation/disabling the usage of the app. Thus, the purpose of study is to portray that privacy matters are not seriously considered by citizens as gadgets give fun and dynamic adoptability for distinct services. Many a times, the information is being shared is irrespective of the actual needs of what to share. Thus, the research tried to provide a client-level ergonomic solution for privacy control. Our contribution towards this research is to build a simple user interface (UI)-based accountable information sharing method with the help of multimedia elements (text, images, audio and video) and integration of notifications in regional language by using Unicode to interact with all types of end-users in order to build an acceptable pervasive (ubiquitous) computing systems with reliability to serve all kinds of business or domestic deployable purposes with minimized social security anomalies.


Ubiquitous computing Privacy and security Interactive Multimedia Accountable communication Open source 


  1. 1.
    Yaici, M., Ameza, S., Houari, R., Hammachi, S.: Private Data Protection in Ubiquitous ComputingGoogle Scholar
  2. 2.
    Image Source: Ossia Inc.Google Scholar
  3. 3.
    Images Source: Xiaomi Mi-Fit AppGoogle Scholar
  4. 4.
    Joey Ranting’s BlogGoogle Scholar
  5. 5.
    Rosenheck, L.: Learning with Ubiquitous ComputingGoogle Scholar
  6. 6.
    Posland, S.: Ubiquitous Computing: Smart Devices, Environments and Interactions. Wiley Publishing (2009)Google Scholar
  7. 7.
    Mishra, A.K., Yadav, P., Singh, L.: Essential Characteristics for Ubiquitous ProjectsGoogle Scholar
  8. 8.
    Sharma, P., Goel, N.: Security Issues in Ubiquitous Computing: A Literature ReviewGoogle Scholar
  9. 9.
    Pfitzmann, A.: Multilateral Security in Communications, Chapter Technologies for Multilateral Security, pp. 85–91. Addison-Wesley-Longman (1999)Google Scholar
  10. 10.
    Rannenberg, K., Pfitzmann, A., M¨uller, G.: Multilateral Security in Communications, Chapter IT Security and Multilateral Security, pp. 21–29. Addison-Wesley-Longman (1999)Google Scholar
  11. 11.
    M¨uller, G., Rannenberg, K., (ed.). Multilateral Security in Communications. Addison-Wesley Longman (1999)Google Scholar
  12. 12.
    Gudymenko, I., Borcea-Pfitzmann, K.: Privacy in Ubiquitous ComputingGoogle Scholar
  13. 13.
    Duan, Y., Canny, J.: Protecting User Data in Ubiquitous Computing: Towards Trustworthy EnvironmentsGoogle Scholar
  14. 14.
    Creese, S., Reed, G.M., Roscoe, A.W. Sanders, J.W.: Security and trust for ubiquitous communication. In: Keith Edwards, W., Grinter, R.E. (eds.) At Home with Ubiquitous Computing: Seven ChallengesGoogle Scholar
  15. 15.
    Keith Edwards, W., Grinter, R.E.: At Home with Ubiquitous Computing: Seven ChallengesGoogle Scholar
  16. 16.
    Weiser, Mark: The computer for the 21st century. Sci. Am. 265(3), 66–75 (1991)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • I. S. N. Pradeep
    • 1
    Email author
  • K. Athmaram
    • 1
  • K. Mritymjaya Rao
    • 2
  1. 1.Department of Computer ScienceDravidian UniversityKuppamIndia
  2. 2.Department of Computer ScienceKakatiya UniversityWarangalIndia

Personalised recommendations