Title: UIA - A User Information Architecture for Ubiquitous Computing
Name: Bryan Ford
E-mail: baford@mit.edu
Student: yes

Introduction

We are heading for a device information disaster. There are two clear symptoms. First, many people have dozens of devices which store information, but they are unable to organize and find that information. A given picture might be on a digital camera, a home PC, a laptop, an iPod Photo, or a cell phone. In many cases, knowing a file's location is not enough, because the device in question is on the far side of a firewall or not currently plugged into a PC's USB port.

The second symptom is that each person's collection of information devices is an isolated island. People cannot easily share pictures, documents, music, or videos with friends, family, or colleagues. Today one must upload the information from a device to a personal computer and then use e-mail, or transfer a file through a physical medium such as a USB key.

These problems are due to the rapid progress in information devices without a corresponding plan for global communication and sharing. The state of the art is local connectivity centered around a single PC that functions as a server (USB, Apple's rendezvous, uPNP). Only the PC can participate in global communication and sharing across the Internet. The information devices are not first-class global citizens, even though they have PC-like communication and storage capabilities.

The User Information Architecture

The User Information Architecture is an extension to the Internet architecture designed to allow global interaction and sharing among ubiquitous information devices. The UIA is based on two principles: (1) decoupling of device identification and communication security from physical connectivity; and (2) establishing device-to-device trust based on user-to-user social relationships. The decoupling principle makes it safe to expose devices to the Internet, because physical Internet attachment no longer directly exposes the device's high-level application services to arbitrary, unknown Internet hosts. The social-networking principle provides a decentralized trust model that is easily comprehensible to nontechnical users and makes end-to-end cryptographic security possible without needing a universal, centralized public key infrastructure (PKI).

These principles lead to the following design of UIA:

We have developed a first-generation prototype of UIA, which runs in user space on several popular operating systems, and can provide secure communication for existing, unmodified applications as well as applications designed specifically for UIA.