000 05286nam a22006375i 4500
001 978-981-16-2199-4
003 DE-He213
005 20240423125410.0
007 cr nn 008mamaa
008 210601s2021 si | s |||| 0|eng d
020 _a9789811621994
_9978-981-16-2199-4
024 7 _a10.1007/978-981-16-2199-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aGao, Longxiang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aPrivacy-Preserving in Edge Computing
_h[electronic resource] /
_cby Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang.
250 _a1st ed. 2021.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2021.
300 _aXII, 113 p. 59 illus., 39 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aWireless Networks,
_x2366-1445
505 0 _aChapter 1 An Introduction to Edge Computing -- Chapter 2 Privacy Issues in Edge Computing.-Chapter 3 Context-Aware Privacy-Preserving in Edge Computing -- Chapter 4 Location-Aware Privacy Preserving in Edge Computing -- Chapter 5 Blockchain based Decentralized Privacy Preserving in Edge Computing -- Chapter 6 Conclusion and Future Research Issues.
520 _aWith the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing. .
650 0 _aComputer networks .
650 0 _aData protection
_xLaw and legislation.
650 0 _aMobile computing.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aApplication software.
650 1 4 _aComputer Communication Networks.
650 2 4 _aPrivacy.
650 2 4 _aMobile Computing.
650 2 4 _aMobile and Network Security.
650 2 4 _aComputer and Information Systems Applications.
700 1 _aLuan, Tom H.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aGu, Bruce.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aQu, Youyang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aXiang, Yong.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811621987
776 0 8 _iPrinted edition:
_z9789811622007
776 0 8 _iPrinted edition:
_z9789811622014
830 0 _aWireless Networks,
_x2366-1445
856 4 0 _uhttps://doi.org/10.1007/978-981-16-2199-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c177494
_d177494