Context Awareness Information Sharing Service based on Location-based Communication Policy

Since more networking technologies and communication channels have been developed, Internet users have moved their roles from being strictly information consumers to both information consumers and producers. Moreover, users on nets might also be intermediaries, inter-actors, interferences or message providers, even service providers. Information on the Internet is dramatically growing. On one hand, it is good for all users to gain more information; on the other hands, it is getting more annoying to get too much information or too many messages daily. Some of them are useful, but the rest is annoying and useless. The useless information a user gets is often called “Spam”. When a user is unwilling to receive spam, it is his/her privilege to reject it. Many self-service web services are applied to categorize the incoming messages through rough site policies, especially on email servers. Junk emails are classified and put into a folder of spam if it fits a specified filter. Thus, a user does not have to read through the suspicious junk emails in his normal incoming folder. However, this spam is not trashed. When the user wants to read the junk email, those emails can still be found. When cellular phones are involved in our daily life, mobile messages become another fast growing issue. Unfortunately, junk mobile message filters are not provided in the mobile phone environment yet. Users are forced to receive every incoming message, and then manually choose to read or ignore it. If every acceptance or refusal requests users’ approval, the time wasted and nuisance is unacceptable. CAIS, which stands for Context Awareness Information Services, is proposed in this paper. CAIS is composed of several mobile services, so it provides a mobile context awareness communication based on the idea of information sharing and location based communication. It also contains a set of pre-defined policy, so users can only get and share the information on demand. By means of location based communication, the cost of transferring messages is negligible and information sharing is processed in silence.

[1]  J. Zeiss,et al.  Context-Based Privacy Protection for Location-Based Mobile Services using Pseudonyms , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[2]  Gregory D. Abowd,et al.  Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment , 1999, IBM Syst. J..

[3]  Lothar Fritsch,et al.  Privacy-Respecting Location-Based Service Infrastructures: A Socio-Technical Approach to Requirements Engineering , 2007, J. Theor. Appl. Electron. Commer. Res..

[4]  Gregory D. Abowd,et al.  Pervasive Computing and Autism: Assisting Caregivers of Children with Special Needs , 2007, IEEE Pervasive Computing.

[5]  Guanling Chen,et al.  A Survey of Context-Aware Mobile Computing Research , 2000 .

[6]  Gerald Quirchmayr,et al.  Transaction pseudonyms in mobile environments , 2007, Journal in Computer Virology.

[7]  Yokoyama Shigetoshi,et al.  An asynchronous messaging platform for context-aware service development , 2007 .

[8]  Uwe Hansmann,et al.  Pervasive Computing: The Mobile World , 2003 .

[9]  Licia Capra,et al.  for Context-Aware Applications , 2003 .

[10]  Alastair R. Beresford,et al.  Location privacy in ubiquitous computing , 2005 .

[11]  Saowanee Schou Context-based Service Adaptation Platform: Improving the User Experience towards Mobile Location Services , 2008, 2008 International Conference on Information Networking.

[12]  Stephen J. H. Yang,et al.  Context Aware Ubiquitous Learning Environments for Peer-to-Peer Collaborative Learning , 2006, J. Educ. Technol. Soc..

[13]  Nazleeni S. Haron,et al.  A RFID-based Campus Context-Aware Notification System , 2010, ArXiv.