Amazon cover image
Image from Amazon.com

Privacy Preservation in IoT: Machine Learning Approaches [electronic resource] : A Comprehensive Survey and Use Cases /

By: Contributor(s): Material type: TextTextSeries: SpringerBriefs in Computer SciencePublisher: Singapore : Springer Nature Singapore : Imprint: Springer, 2022Edition: 1st ed. 2022Description: XI, 119 p. 39 illus., 36 illus. in color. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9789811917974
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.8 23
  • 323.448 23
LOC classification:
  • QA76.9.A25
  • JC596-596.2
Online resources:
Contents:
Chapter 1 Introduction -- Chapter 2 Current Methods of Privacy Protection in IoTs -- Chapter 3 Decentralized Privacy Protection of IoTs using Blockchain-Enabled Federated Learning -- Chapter 4 Personalized Privacy Protection of IoTs using GAN-Enhanced Differential Privacy -- Chapter 5 Hybrid Privacy Protection of IoT using Reinforcement Learning -- Chapter 6 Future Directions -- Chapter 7 Summary and Outlook.
In: Springer Nature eBookSummary: This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Chapter 1 Introduction -- Chapter 2 Current Methods of Privacy Protection in IoTs -- Chapter 3 Decentralized Privacy Protection of IoTs using Blockchain-Enabled Federated Learning -- Chapter 4 Personalized Privacy Protection of IoTs using GAN-Enhanced Differential Privacy -- Chapter 5 Hybrid Privacy Protection of IoT using Reinforcement Learning -- Chapter 6 Future Directions -- Chapter 7 Summary and Outlook.

This book aims to sort out the clear logic of the development of machine learning-driven privacy preservation in IoTs, including the advantages and disadvantages, as well as the future directions in this under-explored domain. In big data era, an increasingly massive volume of data is generated and transmitted in Internet of Things (IoTs), which poses great threats to privacy protection. Motivated by this, an emerging research topic, machine learning-driven privacy preservation, is fast booming to address various and diverse demands of IoTs. However, there is no existing literature discussion on this topic in a systematically manner. The issues of existing privacy protection methods (differential privacy, clustering, anonymity, etc.) for IoTs, such as low data utility, high communication overload, and unbalanced trade-off, are identified to the necessity of machine learning-driven privacy preservation. Besides, the leading and emerging attacks pose further threats to privacy protection in this scenario. To mitigate the negative impact, machine learning-driven privacy preservation methods for IoTs are discussed in detail on both the advantages and flaws, which is followed by potentially promising research directions. Readers may trace timely contributions on machine learning-driven privacy preservation in IoTs. The advances cover different applications, such as cyber-physical systems, fog computing, and location-based services. This book will be of interest to forthcoming scientists, policymakers, researchers, and postgraduates.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in