International Journal of Information Technology & Computer Science ( www.ijitcs.com ) Volume 15 Issue No 1, June 2014 ISSN ( online ) : 2091-1610 This paper was presented @International Conference on Future Computing & Communication System ( ICFCCS 2014 ) ( www.icfccs.com ) Dubai, UAE on May 11-12, 2014 : Copyright © International Journal of Information Technology & Computer Science ( IJITCS ) . 37 Anonymity Handling and Sensor Object Modeling for Pervasive Environments using VISA Processing Dr.G.Radhamani School of IT and Science, Dr.GRD College of Science, Coimbatore, India radhamani@grd.edu.in K.Vanitha School of IT and Science, Dr.GRD College of Science, Coimbatore, India vanitha.k@grd.edu.in Angela Amphawan Research Laboratory of Electronics Electrical Engineering and Computer Science Department Massachusetts Institute of Technology, 02139 Cambridge, USA angelaa@mit.edu Abstract: Pervasive computing devices are configured for anywhere at any time services to adapt the changes in the dynamic environment with respect to the user mobility. The paper proposes a salient model for a log based anonymity handling in pervasive networks. The model defines a resource registry and sensor object modeling. Associability between the nodes are configured with an allied user interface in the environment. Resource registry refers to a record of information about the sensor nodes. A log book is maintained to keep track of the service discovery issues. New device enquiry, registration and adaption are major issues in such pervasive devices. These issues lead to unacknowledged communication that causes anonymity. This paper defines and discusses the presence of anonymity in pervasive environments due to aforementioned issues. Keywords- : Pervasive Computing; Service Discovery; Anonymity; Middleware. I. INTRODUCTION Personal computing is expanded to pervasive computing when the user interaction increases to many devices or computers. Pervasive computing provides an attractive vision for accessing information anywhere and anytime. Such environments gracefully integrate networked computing devices from tiny sensors to extremely dynamic and powerful devices with people and their ambient environments. A room, for example, might be saturated with hundreds of devices that provide information to people without seeking their active attention. Pervasive computing is the idea that almost any type of device can be embedded with chips to connect the device to an infinite network of other devices to provide convenient access to relevant information when and where it is needed. With respect to the development of applications for pervasive environments, a middleware can be used to bridge the gap between the application and the underlying operating systems and networks. One of the basic purposes of any middleware is to satisfy application requirements as well as to support the challenges and issues in computing devices. Dynamic changes of the environment reflect in the mobility and location change of the user or the device, data transfer between sensor nodes