• Complain

Longxiang Gao - Privacy-Preserving in Edge Computing (Wireless Networks)

Here you can read online Longxiang Gao - Privacy-Preserving in Edge Computing (Wireless Networks) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Springer, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Longxiang Gao Privacy-Preserving in Edge Computing (Wireless Networks)

Privacy-Preserving in Edge Computing (Wireless Networks): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Privacy-Preserving in Edge Computing (Wireless Networks)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues.

In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions.

In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Longxiang Gao: author's other books


Who wrote Privacy-Preserving in Edge Computing (Wireless Networks)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Privacy-Preserving in Edge Computing (Wireless Networks) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Privacy-Preserving in Edge Computing (Wireless Networks)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Privacy-Preserving in Edge Computing Wireless Networks Series - photo 1
Book cover of Privacy-Preserving in Edge Computing
Wireless Networks
Series Editor
Xuemin Sherman Shen
University of Waterloo, Waterloo, ON, Canada

The purpose of Springers Wireless Networks book series is to establish the state of the art and set the course for future research and development in wireless communication networks. The scope of this series includes not only all aspects of wireless networks (including cellular networks, WiFi, sensor networks, and vehicular networks), but related areas such as cloud computing and big data. The series serves as a central source of references for wireless networks research and development. It aims to publish thorough and cohesive overviews on specific topics in wireless networks, as well as works that are larger in scope than survey articles and that contain more detailed background information. The series also provides coverage of advanced and timely topics worthy of monographs, contributed volumes, textbooks and handbooks.

Indexing: Wireless Networks is indexed in EBSCO databases and DPLB

More information about this series at http://www.springer.com/series/14180

Longxiang Gao , Tom H. Luan , Bruce Gu , Youyang Qu and Yong Xiang
Privacy-Preserving in Edge Computing
1st ed. 2021
Logo of the publisher Longxiang Gao School of Information Technology - photo 2
Logo of the publisher
Longxiang Gao
School of Information Technology, Deakin University, Burwood, VIC, Australia
Tom H. Luan
School of Cyber Engineering, Xian Dianzi University, Xian, Shaanxi, China
Bruce Gu
College of Engineering and Science, Victoria University, Melbourne, VIC, Australia
Youyang Qu
School of Information Technology, Deakin University, Melbourne, VIC, Australia
Yong Xiang
School of Information Technology, Deakin University, Melbourne, VIC, Australia
ISSN 2366-1186 e-ISSN 2366-1445
Wireless Networks
ISBN 978-981-16-2198-7 e-ISBN 978-981-16-2199-4
https://doi.org/10.1007/978-981-16-2199-4
The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.

The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore

Preface

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing, and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing, and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues.

In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy-preserving schemes will be further introduced in the following chapters. Chapter summarizes this monograph and proposes future research directions.

In summary, this book introduces the following techniques in edge computing: (1) describes an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; (2) describes an SDN-based clustering method to solve the location-aware privacy problems in edge computing; and (3) describes a novel blockchain-based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy preserving in edge computing.

Longxiang Gao
Tom H. Luan
Bruce Gu
Youyang Qu
Yong Xiang
Melbourne, VIC, Australia Xian, China Melbourne, VIC, Australia Melbourne, VIC, Australia Melbourne, VIC, Australia
March 2021
Acronyms
AP

Affinity propagation

AWGN

Additive white Gaussian noise

CCDF

Complementary cumulative distribution function

CCDP

Classic customizable differential privacy

CDN

Information centric network

CDP

Classic -differential privacy

CNN

Condensed nearest neighbor

CP-ABE

Ciphertext policy-attribute based encryption

DDoS

Distributed denial-of-service attack

DDSDP

Dynamic dual-scheme -customized differential privacy

DHT

Distributed hash table

DP

Differential privacy

DSL

Dynamic solution layer

EWM

Entropy weight method

FDMA

Frequency division multiple access

FL

Federated learning

FL-Block

Blockchain-enabled federated learning

GCA

Grid-based clustering algorithm

ICN

Information centric network

IIoTs

Industrial Internet of Things

IoTs

Internet of Things

LTE

Long-term evolution

MDP

Markov decision process

MDP-PPFC

Markov decision process based privacy preserving

NE

Nash equilibrium

PCP

Privacy-preserving content-based publish

PoW

Proof of work

PPFA

Privacy preserving fog-enabled aggregation

QoS

Quality of service

ReLU

Rectified linear unit

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Privacy-Preserving in Edge Computing (Wireless Networks)»

Look at similar books to Privacy-Preserving in Edge Computing (Wireless Networks). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Privacy-Preserving in Edge Computing (Wireless Networks)»

Discussion, reviews of the book Privacy-Preserving in Edge Computing (Wireless Networks) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.